Our analysis shows that 80% of all types of users may be de-anonymized by a relatively moderate Tor-relay adversary within six months.
What is a de anonymization attack on Tor?
Most attacks on Tor focus on identifying a relationship between a client and a server that are using the Tor network to communicate [41]. This process is known as de-anonymization [120]. The client has created a circuit in the Tor network to an exit node and the exit node communicates with the server.
What is traffic correlation?
Flow correlation analyzes the traffic on a set of links (observation points) inside the network and estimates the likelihood for each link to be on the path of the flow under consideration.