Well, you get the "flaming douchenozzle of the day" award.
Funny I also got the "knows about security" prize, and the "provides links to academia for citations" award, you got the talk out of your asshole award for flapping your lips about shit you know absolutely nothing about
I'm not convinced of the viability of any of those approaches, and yes I've read them, and many others. Shout when you find a paper published sometime recently with something new in it.
Well who gives a fuck what you think you are not a SIGINT specialist you are not a MASINT specialist you are not a hacker, the people who wrote those papers have PH.ds in many cases you have your opinion which doesn't mean shit write a paper and get it peer reviewed if you think Tor can resist the theoretical attacks against it and we already know it is weak to many of the documented attacks against it because they have been run on network simulators or in some cases even live on the network.
I'm not going to try to convince you, because clearly you're one of those people who makes large unsupported assumptions to puff up your own ego.
You aren't going to try to convince me because you have absolutely no facts to back up your complete and utter bullshit claim, I gave cites to academic papers on traffic analysis in my post, you gave a pile of shit that you barfed up out of your mouth, if you don't know what you are talking about instead of trying to say something to seem like you are educated on the matter or helpful, shut the fuck up instead lest we turn this forum into a pile of stinking shit instead of a high quality resource with factual information available and easy to filter out of the shit
Rather than try to convince you that something is secure, because clearly that is a futile point to be made (nothing is "secure"...which is why I used the phrase "no KNOWN technical solution"), I'll instead appeal to a more common sense argument, one that can be followed by people who aren't sure what to make of your blustery hand waving and quick use of google to find research papers from half a decade ago that detail theoretical approaches which can be mitigated and are of questionable use in the first place.
Tor does have KNOWN technical solutions for tracing it, just because you don't know them doesn't mean they don't exist you know, I know of several, I gave you links to several I gave you a link to a website with over a dozen, you don't know a fucking thing about what you are talking about and you ignore the evidence I linked to you so go fuck yourself and stop wasting my time please. Quick use of google no I actually have been reading papers from freehaven for the past six years over which time I tought myself computer security and traffic analysis to a professional level, but no I am not as good as the people in the papers I linked to although I certainly put you to shame.
None of the things I linked to have been mitigated, the most serious traffic analysis attack against hidden services was partially mitigated but it only changed tor hidden services on the live network from being traceable in 24 hours by researchers to three nodes each one hop away from the hidden service being traceable theoretically (not live afaik, it hasnt happened yet) in the same time frame. Show a paper showing how tor mitigated these issues or the age of these articles makes no sense. The earth being round was discovered a long time ago do you think it went flat because you haven't seen any breaking academic research regarding it?
Put simply: If they could crack Tor, who would they go after? The terrorists, the child pornographers, or the drug traffickers?
How is this what you said put simply? this is completely unrelated to what you said. If "they" could trace tor they would go after the drug traffickers the child pornographers and the terrorists simultaneously dumbfuck. Guess what, child porn people say the same shit about drug traffickers carders say the same shit about drug traffickers drug traffickers say about carders and child porn people fuck osama bin laden probably thought the nsa was to busy with SR to go after him judging by my experiences with every single other type of criminal, don't fall into this PSYOP cognitive trap...btw your cognitive trap has been identified and labeled in the field of intelligence analysis its called mirror imaging and it means the person who interprets intelligence thinks that his adversary thinks as he does and interprets the intelligence through his eyes instead of his adversaries...you think you are not a target but you are THE target of the DEA not a pedophile
That, of course, proves nothing. But linking to a bunch of PDFs you found with google doesn't do much more.
No I quickly found those pdfs without google because I am extremely well versed in security and particularly traffic analysis and I actually know more about the Tor network than almost anyone else in the world who knows anything about Tor and doesn't work for a signals intelligence agency or do post-grad work in a traffic analysis research group. If PH.d research papers don't prove much about the topics they are written on then obviously you are a fucking retard.
Put simply:
If hidden sites were traceable, there are several dozen that would have been shut down years ago.
That doesn't mean TOR is secure. It does, however, support my original statement that there are "no known technical solutions for tracing TOR hosted sites".
I never said law enforcement can trace tor hidden services right now, just that some people can with varying degrees of ease. Law enforcement are way behind the bell curve when it comes to security and intelligence but guess what they are catching up fast and you shouldnt count on a network with known anonymity vulnerabilities against its hidden services to keep a hidden server anonymous plain and simple. Even Roger dingledine said Tor hidden services are fucked in the #tor IRC room, did you even know #tor had an IRC room? His name is Arma there and he is the lead Tor dev, I suggest you ask him if he thinks there are no known traceability attacks against hidden services but you probably already know better than he does