Changes
Page history
Add text for 'Fingerprint network traffic' entry in Adversary Attacks section
authored
May 19, 2024
by
Richard Pospesel
Hide whitespace changes
Inline
Side-by-side
Design-Documents/Tor-Browser-Design-Doc.md
View page @
150c78bb
...
...
@@ -364,11 +364,12 @@ The adversary can perform the following attacks from a number of possible positi
1.
**Fingerprint network traffic**
- **Positioning**
- Exit relays or upstream routers
- Middle relays or upstream routers
- Guard relays or upstream routers
- Local network, ISP, or upstream routers
Network traffic fingerprinting is an attempt by the adversary to recognize the encrypted traffic patterns of specific websites.
In the case of Tor, this attack would take place between the user and the guard relay, or at the guard relay itself.
1.
**Exploit the browser or operating system**
- **Positioning**
...
...
...
...