Potentially De-Anonymizing Attack Discovered in TOR

Potentially De-Anonymizing Attack Discovered in TOR

Evidence of traffic confirmation attacks found, relays removed

  • How to
  • By Gabriel Gache
  • June 14th, 2008
How Relays Work

How Relays Work

High-power switching devices

  • Mac
  • By Filip Truta
  • April 24th, 2008
Use Vidalia to Manage Tor on Mac OS X

Use Vidalia to Manage Tor on Mac OS X

Vidalia also helps users contribute to the Tor network by setting up and managing their own Tor relay