Quantcast
Channel: Bountied questions - Information Security Stack Exchange
Viewing all articles
Browse latest Browse all 154

Can DeepCorr's correlation technique de-anonymize all Tor users?

$
0
0

https://people.cs.umass.edu/~amir/papers/CCS18-DeepCorr.pdf

https://www.youtube.com/watch?v=_OKLtKgEn4k

I have some questions about this "Deepcorr". Does "DeepCorr" really work that good? They say that "DeepCorr’s performance does not degrade with the number of test flows", but more people are using Tor more and more people browse websites (many of those are simple websites) with similar sizes around the same time, so how can they tell the source of the traffic using size and timing alone when other flows have similar features?

They said they used 1,000 circuits to browsed 50,000 sites (the top sites on Alexa) with each circuit browsing 50 sites and they also used regular Firefox browser instead of Tor browser. Could it be the reason for why it worked so good for them? Maybe Firefox generated some extra unique traffic that Tor browser wouldn't generate because of things like ads and cookies?

Can this attack work against hidden services (version 3) as well?


Viewing all articles
Browse latest Browse all 154

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>