{"success":1,"onion":[{"id":"437773","titolo":"Attacks Against Tor - The Uncensored Hidden Wiki","ricetta":"[Online \/ 2019-09-27] Attacks Against Tor - The Uncensored Hidden Wiki\nAttacks Against Tor\nFrom The Uncensored Hidden Wiki\nJump to: navigation, search\nLike all current low-latency anonymity networks, Tor cannot and does not attempt to protect against monitoring of traffic at the boundaries of the Tor network (i.e., the traffic entering and exiting the network). While Tor does provide protection against traffic analysis, it cannot prevent traffic confirmation (also called end-to-end correlation). [1][2]\nAn adversary unable to defeat the strong anonymity that Tor provides may try to de-anonymize the communication by other means. One way this may be achieved is by exploiting vulnerable software on the user's computer.[3] The NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe,[4] and targets Tor users in general for close monitoring under its XKeyscore program.[5] Furthermore, attacks against Tor are an active area of academic research[6][7] which is welcomed by Tor itsel...","url":"http:\/\/mijpsrtgf54l7um6.onion\/index.php\/Attacks_Against_Tor"}]}