From b0c111813d518db1eab1acb690971d61c6daae2b Mon Sep 17 00:00:00 2001 From: anarsec Date: Fri, 30 Jun 2023 01:26:32 +0000 Subject: [PATCH] tor project link --- content/posts/tails/index.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/posts/tails/index.md b/content/posts/tails/index.md index 8d28a96..49db648 100644 --- a/content/posts/tails/index.md +++ b/content/posts/tails/index.md @@ -276,7 +276,7 @@ It is possible to send a document through an .onion link thanks to [OnionShare]( ***Make Correlation Attacks More Difficult*** -When you request a web page through a web browser, it is transmitted to you in small "packets" characterized by a specific size and timing (alongside other characteristics). When using Tor Browser, the sequence of transmitted packets can also be analyzed and assigned certain patterns. The patterns here can be matched with those of monitored websites on the Internet. To make this "correlation attack" more difficult, before connecting to a sensitive website you can open various other pages that require loading (such as streaming videos on a privacy-friendly website like kolektiva.media) in additional tabs of your browser. This will generate a lot of additional traffic, which will make the analysis of your pattern more difficult. +When you request a web page through a web browser, it is transmitted to you in small "packets" characterized by a specific size and timing (alongside other characteristics). When using Tor Browser, the sequence of transmitted packets can also be analyzed and assigned certain patterns. The patterns here can be matched with those of monitored websites on the Internet. To make this "correlation attack" more difficult, before connecting to a sensitive website you can open various other pages that require loading (such as streaming videos on a privacy-friendly website like kolektiva.media) in additional tabs of your browser. This is officiallly recommended by Tor - see [Do multiple things at once with your Tor client](https://blog.torproject.org/new-low-cost-traffic-analysis-attacks-mitigations/). This will generate a lot of additional traffic, which will make the analysis of your pattern more difficult. #### Included Software