Are there any #Tor or #BrowserFingerprinting or traffic fingerprinting people in my wider network that have read the #MaybeNot paper?
How do these defenses relate to the work that Tor itself does to protect from traffic analysis? Would they be enough to prevent the sort of timing attacks that the wiki describes on the TorPlusVPN page?
Does anyone have more information on the research that that wiki page is referencing?
I am just diving into this topic, so be gentle please.


