A new analysis of website fingerprinting (WF) attacks aimed at the Tor web browser has revealed that it's possible for an adversary to glean a website frequented by a victim, but only in scenarios where the threat actor is interested in a specific subset of the websites visited by users. "While attacks can exceed 95% accuracy when monitoring a small set of five popular websites, indiscriminate (
from The Hacker News https://ift.tt/3ngXQxS
Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment