Limitations and remaining attacks against Tor's anonymity
While Tor significantly improves privacy and anonymity online, certain attacks - such as traffic correlation, timing analysis, and circuit reuse - can still pose risks under strong adversaries.
It is possible for an observer who can view both you and either the destination website or your Tor exit node to correlate timings of your traffic as it enters the Tor network and also as it exits. Tor 并不能防御这样的威胁模型。
极端情况下,如果审查者或执法机构能够获取部分网络的特定流量,通过观察两端的流量并进行计时关联,既有可能验证你与好友经常联系的猜想。 同样,仅对于怀疑目标正在互相通信的验证,这是有用的。 在大多数国家,这种怀疑比计时关联更容易获得搜查令。
此外,由于 Tor 重复使用多个 TCP 连接的线路,在特定出口节点非匿名和匿名流量有可能产生关联,所以应留意哪些应用程序在同时使用 Tor 网络。 也许最好是每个应用程序使用独立的 Tor 客户端。