Are Tor hidden services subject to correlation of availability status to unmask the actual host serving them? If so are such attacks active-only (e.g. attempting to connect) or passive?
-
-
You still have to have fairly frequent periodic inbound communication attempts to which a response would be generated if the device and software were online to begin building correlation to a given party, and so while active interruption may not be required, active testing is.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.