The process is done using traffic analysis.

They used CISCO routers in their research.

And since CISCO defines all major networking standards, it is applicable to every router available.

Researchers discover a way to de-anonymize the TOR network and identify the real user

Tor is susceptible to this kind of traffic analysis because it was designed for low-latency.

This kind of monitoring, even on a large scale does not require many resources.

spot_img

source: www.techworm.net