Skip to main content

All Questions

Tagged with
4 votes
2 answers
3k views

Analyzing Tor traffic through Deep Packet Inspection?

I've just read about the detecting and blocking of Tor traffic by DPI but now I'm curious about analyzing the data you send over Tor and matching it with your true identity by deep-inspecting the data ...
h088bmIuXaskpzJEe3ld's user avatar