Good morning Jon, In addition to fingerprint correlation and AS choice, I also recall reading this paper about identifying hidden services using clock skew based on internal CPU temperature:
https://murdoch.is/papers/ccs06hotornot.pdf . The paper is older, but I’m curious if such an attack method is still effective? Make your day great, O: 715-377-0440, F:715-690-1029, W:
www.aileronit.com LinkedIn:
https://www.linkedin.com/in/IsaacGrover/ YouTube:
https://www.youtube.com/channel/UCqrwZNFKdR-guKtuQzFPObQ
|
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays