Your fact-checks

Your fact-checks will appear here

factually
Support us
  • Home
  • Politics
  • Business
  • Society
  • Technology
  • Health
  • Science
  • Entertainment
Index/Topics/Tor Anonymity Risks

Tor Anonymity Risks

The Tor Project's approach to mitigating anonymity risks, including traffic correlation and routing attacks.

Fact-Checks

2 results
Feb 2, 2026

How does iCloud Private Relay differ technically from a VPN or Tor in terms of logs and operator visibility?

routes Safari traffic through two separate relays so no single operator can see both a user’s IP and destination, while a funnels all device traffic through a single operator that can in principle log...

Jan 14, 2026

What technical defenses has the Tor Project implemented to mitigate traffic correlation and routing attacks?

Tor acknowledges traffic correlation and routing (AS-level) attacks as among the most serious residual risks to low‑latency anonymity, and its engineering choices accept some of those risks while depl...

About
Blog
Contact
FAQ
Terms & ConditionsTerms
Privacy PolicyPrivacy
Manage data