This does not fingerprint users' computers, but rather websites based on the traffic patterns they generate.
From the abstract:
We conclude that, although WF attacks may be possible, it is likely infeasible to carry them out in the real world while monitoring more than a small set of websites.
Fingerprinting Attacks on Tor in the Real World https://www.usenix.org/conference/usenixsecurity22/presentation/cherubin
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World (prepublication) https://www.usenix.org/system/files/sec22summer_cherubin.pdf
Video and slides of this upcoming presentation should be available in May 2022.
This does not fingerprint users' computers, but rather websites based on the traffic patterns they generate.
From the abstract:
We conclude that, although WF attacks may be possible, it is likely infeasible to carry them out in the real world while monitoring more than a small set of websites.
Fingerprinting Attacks on Tor in the Real World https://www.usenix.org/conference/usenixsecurity22/presentation/cherubin
Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World (prepublication) https://www.usenix.org/system/files/sec22summer_cherubin.pdf