Good morning Jon,

In addition to fingerprint correlation and AS choice, I also recall reading 
this paper about identifying hidden services using clock skew based on internal 
CPU temperature: https://murdoch.is/papers/ccs06hotornot.pdf .  The paper is 
older, but I'm curious if such an attack method is still effective?

Make your day great,
Isaac Grover, Senior I.T. Consultant
Aileron I.T. - " Because #ProactiveIsBetter "

O: 715-377-0440<tel:715-425-0440>, F:715-690-1029<tel:715-690-1029>, W: 
www.aileronit.com<http://www.aileronit.com/>

LinkedIn: https://www.linkedin.com/in/IsaacGrover/
YouTube: https://www.youtube.com/channel/UCqrwZNFKdR-guKtuQzFPObQ

_______________________________________________
tor-relays mailing list
[email protected]
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays

Reply via email to