mirror of
https://0xacab.org/anarsec/anarsec.guide.git
synced 2025-07-24 15:15:29 -04:00
e2ee integrate feedback and add SimpleX
This commit is contained in:
parent
01ef703770
commit
e07dc59bd2
8 changed files with 221 additions and 27 deletions
|
@ -64,7 +64,7 @@ You can mitigate this first issue by [**Tor bridges**](https://tails.boum.org/do
|
|||
|
||||
### 2. Protecting against determined, skilled attackers
|
||||
|
||||
An *end-to-end correlation* attack is a theoretical way that a global adversary could break Tor's anonymity:
|
||||
An [*end-to-end correlation* attack](/glossary/#correlation-attack) is a theoretical way that a global adversary could break Tor's anonymity:
|
||||
> A powerful adversary, who could analyze the timing and shape of the traffic entering and exiting the Tor network, might be able to deanonymize Tor users. These attacks are called *end-to-end correlation* attacks, because the attacker has to observe both ends of a Tor circuit at the same time. [...] End-to-end correlation attacks have been studied in research papers, but we don't know of any actual use to deanonymize Tor users.
|
||||
|
||||
You can mitigate the techniques available to powerful adversaries by **not using an Internet connection that is tied to your identity**, and by **prioritizing .onion links when available**.
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue