How Anonymous Is the Tor Network? A Long-Term Black-Box Investigation

A popular choice for anonymous Internet communication, the Tor network uses entry, relay, and exit nodes to hide the traffic's origin. However, an investigation that involved running real applications and website requests through Tor revealed numerous agglomerations of exiting traffic that an attacker could exploit.