文章
技术

挂上前置代理的墙内Tor用户点击墙内链接有多大概率可能暴露自己是Tor用户?

引用自:https://www.whonix.org/wiki/Warning#Confirmation_Attacks

The Tor design doesn't try to protect against an attacker who can see or measure both traffic going into the Tor network and also traffic coming out of the Tor network. That's because if you can see both flows, some simple statistics let you decide whether they match up.
That could also be the case if your ISP (or your local network administrator) and the ISP of the destination server (or the destination server itself) cooperate to attack you.
Tor tries to protect against traffic analysis, where an attacker tries to learn whom to investigate, but Tor can't protect against traffic confirmation (also known as end-to-end correlation), where an attacker tries to confirm a hypothesis by monitoring the right locations in the network and then doing the math.

可能性1.(比如政府的类似本站一类的文本或图文之类的轻量网站/网页)一个网页没加载完就能立刻发现是谁在墙内通过Tor访问墙内网站?
可能性2.访问多次才能发现是谁在墙内用Tor访问?
可能性3.此方法仅限理论有效, 实际上不可能发现?
你觉得哪种可能性更高或者真实情况是什么?

菜单
  1. Surge   Be the Light
  2. Olde1980  

    @Surge #154965
    你的答案是回答墙内用户与谷歌(编程随想与谷歌平台),这应该是安全的。
    但墙内用户与墙内(即链接开始和结束的位置在敌人的控制之下)是 "some simple statistics let you decide whether they match up."(这是楼主引用的原文)。
    如果你想查看或存档,你可以用这个工具直接存档谷歌缓存的纯文本页面以便查看并且杜绝连接到墙内。