Add text for 'Fingerprint network traffic' entry in Adversary Attacks section authored by Richard Pospesel's avatar Richard Pospesel
......@@ -364,11 +364,12 @@ The adversary can perform the following attacks from a number of possible positi
1. **Fingerprint network traffic**
- **Positioning**
- Exit relays or upstream routers
- Middle relays or upstream routers
- Guard relays or upstream routers
- Local network, ISP, or upstream routers
Network traffic fingerprinting is an attempt by the adversary to recognize the encrypted traffic patterns of specific websites.
In the case of Tor, this attack would take place between the user and the guard relay, or at the guard relay itself.
1. **Exploit the browser or operating system**
- **Positioning**
......
......