Index/Topics/Tor de-anonymization methods

Tor de-anonymization methods

Methods used to de-anonymize Tor users, including metadata leaks, active network-level attacks, and direct compromises of endpoints or hidden services.

Fact-Checks

6 results
Jan 16, 2026
Most Viewed

Can my ISP detect that I am using Tor even if they can't see the sites I visit?

Tor prevents an ISP from reading the contents of web requests or learning the final sites visited because traffic is encrypted and routed through multiple relays . However, ISPs can usually tell that ...

Jan 18, 2026
Most Viewed

How do .onion (hidden service) addresses prevent exit-node exposure compared to HTTPS?

.onion addresses (Tor onion services) keep client and server traffic inside the Tor overlay so there is no traditional “exit” hop that can observe plaintext or IP endpoints, unlike standard HTTPS over...

Jan 18, 2026

How effective are Tor’s current path-selection algorithms against multi‑AS colluding adversaries in live network measurements?

Live-network studies and recent research converge on a clear but nuanced conclusion: Tor’s default (bandwidth-weighted, guard-based) path-selection leaves users exposed to multi‑AS colluding adversari...

Jan 18, 2026

What technical methods have researchers used to deanonymize Tor onion services through traffic correlation?

Researchers have used a range of traffic-correlation techniques to deanonymize Tor onion services, from large-scale passive correlation across ISPs to active, protocol-level manipulations that induce ...

Jan 18, 2026

Which option offers better protection against ISP and exit-node surveillance: Secure Core or Tor?

For hiding the fact of which sites are visited from a local ISP, a multi-hop VPN scheme often branded as “Secure Core” gives clearer protection because the ISP only sees an encrypted tunnel to the VPN...

Jan 15, 2026

What empirical measurements exist quantifying deanonymization success rates against modern Tor clients under different AS‑level adversaries?

Empirical work over the past decade has not produced a single, universal "success rate" for deanonymization of modern Tor clients by AS‑level adversaries; instead, measurement studies report the fract...