FINDING · DETECTION

Tor-like anonymizing overlays are easily censored because they rely on centralized, publicly visible relay lists; governments can blacklist Tor nodes or monitor all Tor exit traffic so that traffic analysis can reveal the source. Traffic to or from Tor 'essentially advertises itself as probably worth tracking.'

From 2011-liu-torTor Instead of IP · §1–§2 · 2011 · Hot Topics in Networks

Implications

Tags

censors
cngeneric
techniques
ip-blockingflow-correlationactive-probing
defenses
tor

Extracted by claude-sonnet-4-6 — review before relying.