How do traffic-correlation and boundary-monitoring attacks technically work and what countermeasures exist for Tor users?
Traffic-correlation (end-to-end) and boundary-monitoring attacks identify who is communicating through Tor by statistically matching traffic patterns observed near the client (entry) and near the dest...