hey, there is a decent amount of academic research papers on this very question. If I remember correctly the tor project homepage does offer some resources. Some of these papers are quite technical, but even as a non infosec professional I was able to get the basic concept most of the times. greets
|
_______________________________________________ tor-relays mailing list tor-relays@xxxxxxxxxxxxxxxxxxxx https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays