"Observing long-term usage trends, as suggested by the 'timing analysis' methodology, could perhaps erode Tor's potency by giving observers clues about users who send traffic into the network."
"Timing individual data packets, anonymised connections can be traced back to the Tor user, even though data connections in the Tor network are encrypted multiple times."
Collection
[
|
...
]