drebs
Translation approved |
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Suggestion accepted |
|
drebs
Translation approved |
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Suggestion accepted |
|
drebs
Translation approved |
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Suggestion accepted |
|
drebs
Translation approved |
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Suggestion accepted |
|
drebs
Translation approved |
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Changes committed |
Changes committed
3 years ago
|
drebs
Suggestion accepted |
|
forte, que pode analisar o tempo e formapoderoso, que possa cronometrar e analisar o perfil do traáfego que entra e sai da rede Tor, pode conseguirtirar o anonimato dedesanonimizar usuários da rede Tor. Esses ataques são chamados ataques de <i>correlação de pontaa-a-ponta</i>, pois o atacantedeveprecisa observar ambas assaídpontas do circuito Tor ao mesmo tempo.