Tor Anonymity Limitations

The cluster discusses Tor's privacy and anonymity features, including risks from traffic analysis, exit nodes, relays, and bridges, as well as limitations in hiding Tor usage and protecting against advanced attacks.

📉 Falling 0.3x Security
3,375
Comments
20
Years Active
5
Top Authors
#777
Topic ID

Activity Over Time

2007
2
2008
5
2009
23
2010
44
2011
63
2012
88
2013
401
2014
319
2015
194
2016
306
2017
221
2018
196
2019
221
2020
228
2021
267
2022
266
2023
203
2024
166
2025
156
2026
6

Keywords

US AttacksOnOnionRo MITM OPSEC DNS NAT faq.html TLS CanexitnodeseavesdroponcommunicationsIsntthatbad IP tor nodes traffic exit network anonymity node hidden onion packets

Sample Comments

jgalt212 Aug 4, 2015 View on HN

Any word on the implications for the anonymity of Tor clients?

fsflover Feb 14, 2025 View on HN

How does running a Tor relay compromise your privacy?

torium Aug 18, 2025 View on HN

Could you expand? How does using tor makes you stick out like a sore thumb?

cosgroveb Jan 10, 2011 View on HN

This uses Tor's hidden services. The project page says each client makes 3 "random hops" and meet in the middle to create a secure tunnel. The communications never leave the Tor network so, I could be wrong, but I don't think traffic analysis applies here.

aleph_minus_one Jul 27, 2025 View on HN

At least spiritually not if the traffic is routed over a Tor circuit. :-)

pabs3 Jul 31, 2021 View on HN

Tor has alternative transports (bridges) that are meant to disguise the use of Tor on the local network, they should help with the obviousness issue.

jacquesm Sep 24, 2017 View on HN

Tor is far from perfect and there are several ways in which one could connect traffic at some endpoint with a user at a specific IP. Do not rely on Tor if you really want anonymity.

aaron42net Jan 29, 2014 View on HN

Around 100% for anyone using the normal Tor browser bundle.Tor is designed to hide who you are talking to, not the fact that you are using Tor. IPs and other metadata about normal Tor relays are published publicly by the network and are used by the client to build circuits through the network.There is a special form of hidden entry node called a bridge that is designed for use in censorship-happy countries like China, but using them is a manual process that isn't the default. Traffic

goodpoint May 8, 2025 View on HN

Does it do onion routing like Tor? Does it protect from traffic correlation or timing attacks?

onecooldev24 Jul 19, 2016 View on HN

Data between you and tor nodes are encrypted, no way your idea will work.