You must log in or register to comment.
If I understand correctly, stream isolation will route different connections through different circuits. If you’re doing two different things of a sensitive nature, open different browsers and applications, use random user-induced delays in your actions/responses and PGP-encrypt everything. And listen to what the TOR project says about the mitigations. I have some reading to do myself I guess
This attack has been known for years now. And tor is simply not able to defend against it without a complete redesign.
Redesign being I2P
What else you going to use?
I wish more people would try out I2P as a result. AFAIK, garlic routing makes this kind of attack impossible.
Insane 2lown Posse?
AFAIK it only makes it harder not impossible.