FINDING · DETECTION

Tor encrypts payload but does not obscure traffic volume, leaving a residual publisher-vs-reader asymmetry: a user publishing a home video generates a markedly different upload/download ratio than one reading news. The paper also notes that website fingerprinting attacks — where the adversary pre-downloads hundreds of popular sites and matches traffic patterns to a Tor client's stream — remain possible even through bridge circuits, and are exacerbated by Tor's varying supported protocols (web vs. IM produce different timing signatures).

From 2006-dingledine-designDesign of a blocking-resistant anonymity system · §8.2 · 2006 · The Tor Project

Implications

Tags

censors
generic
techniques
traffic-shapewebsite-fingerprintflow-correlation
defenses
bridgesrandomization

Extracted by claude-sonnet-4-6 — review before relying.