How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation

2016 
A popular choice for anonymous Internet communication, the Tor network uses entry, relay, and exit nodes to hide the traffic's origin. However, an investigation that involved running real applications and website requests through Tor revealed numerous agglomerations of exiting traffic that an attacker could exploit.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    7
    References
    7
    Citations
    NaN
    KQI
    []