>>4884
CONT:
Once again, I am proven correct. You retards do not understand tor at all and the very attack vectors that are being targeted revolve around exit nodes which no one is doing anything of note over anyways.
Not Hidden services themselves:
"A. Threat Model
In this work, we mainly focus on the problem of evaluating
the effectiveness of using NetFlow data to perform practical
traffic analysis attacks for identifying the source of anonymous
communication. In our attack model, we assume that the victim
is lured to access a particular server through Tor, while the
adversary collects NetFlow data corresponding to the traffic
between the exit node and the server, as well as between Tor
clients and the victim’s entry node. The adversary has control
of the particular server (and potentially many others, which
victims may visit), and thus knows which exit node the victim
traffic originates from"
That is directly from the paper linked in the article. Everyone knows exit nodes are insecure you fucking babbling retards. Learn what you are talking about before you spread your unintelligible, uninformed fud.