[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: Possible attack method?? Question..



(please correct me if I'm incorrect but...)

if the adversary controls your entry-guard (which is nearly impossible to detect and considered a 'strong' adversary) if the adversary controls input to your tunnel (like text in an email, which is easy)
and, if you do not use end to end encryption,

Then, the adversary can perform traffic analysis on the exit node, and the adversary can easily discover your true ip.


~Jon