The source is “this is a known weakness of tor and always has been”, there have been a number of white papers and conference talks on this over the years.
When tor was developed it was known what the weakness was. Mitigation is possible, but you can not certainly say 100% that tor will anonymize you, unfortunately.
The exit nodes being the weakness in tor has always been known, any actor capable of monitoring and capturing enough traffic on exit nodes can correlate it, at that point you have to track it.
Tor alone can not protect you, but it is a pretty significant tool. You need defense in depth if you intend to protect your identity.
I think you are overestimating the threat model. Nothing is ever fool proof but Tor does make it extremely difficult to actually identify someone. You are talking about a hypothetical attack vs something that is actually feasible to pull off. Tor is design so that there can be many compromised nodes without to much danger. Tor’s popularity as makes it hard to track individuals since there is a lot of traffic.
The source is “this is a known weakness of tor and always has been”, there have been a number of white papers and conference talks on this over the years.
When tor was developed it was known what the weakness was. Mitigation is possible, but you can not certainly say 100% that tor will anonymize you, unfortunately.
The exit nodes being the weakness in tor has always been known, any actor capable of monitoring and capturing enough traffic on exit nodes can correlate it, at that point you have to track it.
Tor alone can not protect you, but it is a pretty significant tool. You need defense in depth if you intend to protect your identity.
I think you are overestimating the threat model. Nothing is ever fool proof but Tor does make it extremely difficult to actually identify someone. You are talking about a hypothetical attack vs something that is actually feasible to pull off. Tor is design so that there can be many compromised nodes without to much danger. Tor’s popularity as makes it hard to track individuals since there is a lot of traffic.
In the context of bypassing a vpn restriction to watch porn or what have you … yes. You’re absolutely right. They aren’t looking for you.