yes.
it's an old attack, it will always be possible in the design of tor network given enough data and the overview of the network.
there are two ways you can counter the attack. either constant bitrate with decoy traffic (super wasteful) or high latency services (think email with 24h delivery time).
yes.
it's an old attack, it will always be possible in the design of tor network given enough data and the overview of the network.
there are two ways you can counter the attack. either constant bitrate with decoy traffic (super wasteful) or high latency services (think email with 24h delivery time). relay.primal.net
yes.
it's an old attack, it will always be possible in the design of tor network given enough data and the overview of the network.
there are two ways you can counter the attack. either constant bitrate with decoy traffic (super wasteful) or high latency services (think email with 24h delivery time). nostr.data.haus
yes.
it's an old attack, it will always be possible in the design of tor network given enough data and the overview of the network.
there are two ways you can counter the attack. either constant bitrate with decoy traffic (super wasteful) or high latency services (think email with 24h delivery time). nostr.fmt.wiz.biz
yes.
it's an old attack, it will always be possible in the design of tor network given enough data and the overview of the network.
there are two ways you can counter the attack. either constant bitrate with decoy traffic (super wasteful) or high latency services (think email with 24h delivery time). offchain.pub