Commit 0483d1bd authored by Rajakavitha Kodhandapani's avatar Rajakavitha Kodhandapani
Browse files

Update warning.mdwn

parent f5bb8faf
......@@ -157,27 +157,16 @@ href="https://blog.torproject.org/blog/detecting-certificate-authority-compromis
Project: Detecting Certificate Authority compromises and web browser
collusion</a>.</p>
<h1 id="correlation">End to end time correlation attacks</h1>
A global passive adversary is an organisation or an entity that monitors
the traffic between all computers in a network. For example, National
Security Agency Central Security Service (NSA |CSS ), National Cyber
Coordination Centre (NCCC), and others.
<<h1 id="correlation">End to end time correlation attacks</h1>
Tor network is designed to prevent traffic analysis, where someone tries
to investigate a user in a network. However, It is not designed to
protect you against someone who can monitor or measure traffic that
enters and exits a Tor network. End to end time correlation attacks are
to investigate a user in a network by observing a single point in the circuit. However, Tor is not designed to monitor or measure traffic that enters and exits a Tor network because a network design that monitors both the ends of a communication network impacts the low-latency communication service used for web browsing, Internet chat or SSH connections. Hence, Tor does not protect you against someone who can monitor both the ends of a communication network. End to end time correlation attacks are
possible in the following scenarios:
* When a global passive adversary monitors the timings and volume
patterns of the different communications across the network, it would
be statistically possible to identify Tor circuits and match Tor users
and destination servers.
* When someone can monitor the timings and volume patterns of the different communications across the network, it would be statistically possible to identify Tor circuits and match Tor users and destination servers. For example, a <abbr title="A global passive adversary is an organization or an entity that can observe many points of the Internet and are more likely to be in the right place at the right time. However, it does not have an absolute control of the Internet such as National Security Agency Central (NSA)."> global passive adversary </abbr> can deanonymize you.
* When someone in the first relay and someone at the exit relay monitor the communication in the network to match the Tor users. For example, the ISP or local network administrator in the first relay and the ISP of the destination server or the destination server itself collaborate to monitor the traffic in the network; together they can deanonymize you.
* When the ISP or local network administrator and the ISP of the
destination server or the destination server itself collaborate to
monitor the traffic in the network and match the Tor users.
<h1 id="encryption">Tails doesn't encrypt your documents by default</h1>
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment