Feb 5, 2026
How have state-level surveillance programs successfully deanonymized Tor users, and what mitigations worked?
State-level actors have repeatedly used traffic-correlation and timing analysis, malicious or subverted relays, and active denial-of-service (DoS) manipulations of Tor circuits to and hidden services,...