Win / Conspiracies
Conspiracies
Sign In
DEFAULT COMMUNITIES All General AskWin Funny Technology Animals Sports Gaming DIY Health Positive Privacy
Reason: None provided.

This does not fingerprint users' computers, but rather websites based on the traffic patterns they generate.

From the abstract:

We conclude that, although WF attacks may be possible, it is likely infeasible to carry them out in the real world while monitoring more than a small set of websites.

Fingerprinting Attacks on Tor in the Real World https://www.usenix.org/conference/usenixsecurity22/presentation/cherubin

Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World (prepublication) https://www.usenix.org/system/files/sec22summer_cherubin.pdf

Video and slides of this upcoming presentation should be available in May 2022.

3 years ago
1 score
Reason: Original

This does not fingerprint users' computers, but rather websites based on the traffic patterns they generate.

From the abstract:

We conclude that, although WF attacks may be possible, it is likely infeasible to carry them out in the real world while monitoring more than a small set of websites.

Fingerprinting Attacks on Tor in the Real World https://www.usenix.org/conference/usenixsecurity22/presentation/cherubin

Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks on Tor in the Real World (prepublication) https://www.usenix.org/system/files/sec22summer_cherubin.pdf

3 years ago
1 score