Comment by whimsicalism
Comment by whimsicalism a day ago
? tor reroutes the packets so how would you identify who is visiting who? it's not just 'layers of encryption' it is layers of redirection
Comment by whimsicalism a day ago
? tor reroutes the packets so how would you identify who is visiting who? it's not just 'layers of encryption' it is layers of redirection
you mean inferring the website based on packet traffic pattern if you are the guard? yeah maybe possible, not sure how distinct each website footprint would be in practice
seems like it would also be challenging to hold up in actual legal proceedings
> you mean inferring the website based on packet traffic pattern if you are the guard?
Yeah, basically, but I was thinking that if you're analyzing a pattern going to the client, all you'd need is any point between the guard and the client (ie: an ISP).
If I visit facebook.com it's about 45 requests and 2.5MB of data. Are you saying that if I did that via Tor I would get a different circuit for each request or each individual packet?
Eventually the guard has to send the whole payload to me, right? Wouldn't that look similar every time if there's no obfuscation?