Answer the question
In order to leave comments, you need to log in
If I use tor can I be detected?
I'm wondering if I'm using tor but my adversary controls my ISP provider's hardware (or the first relay in the chain) as well as the destination server can he match the size and time of sending and receiving packets passed through the ISP (or the first relay in the chain) with the size and time sending and receiving packets by the destination server with a high degree of probability to calculate me?
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question