Cisco routers contain traffic-flow software which can help an attacker deduce the identity of a Tor client.
Sign in to post comments.
Comments (0)
Sign in to post comments.