Cross-referencing the online/offline status of 87 monitored bridges against 186,935 Wikipedia users' edit sessions showed that 95.7% of users with 50 or more sessions matched zero bridges after winnowing. For users with 180 or more sessions (a surrogate for long-term pseudonymous activity), only 89 false positives remained among 2,329 users—a false positive rate of 0.000439—meaning that even if 10,000 Tor clients volunteer to bridge, on average only 4.4 bridges remain after the winnowing stage.
From 2009-mclachlan-risks — On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design
· §3.3
· 2009
· Workshop on Privacy in the Electronic Society
Implications
Long-term pseudonymous activity (daily blogging for 6 months or equivalent) while operating a bridge should be treated as a critical privacy risk and users should be warned; bridge operators must decouple their serving status from their surfing status to defeat the intersection attack.
Implement a biased-coin serving policy: measure the fraction of time f the operator runs Tor without active connections during a 'trial period,' then ensure Pr[serve|surf] = Pr[serve|¬surf] = f so serving status is statistically independent of surfing status.