Researchers show why Tor connections to hidden services are more vulnerable to traffic correlation attacks. Identifying users who access Tor hidden services is easier than de-anonymizing users who use Tor to access regular Internet websites. Hidden services use addresses that end in.onion, a pseudo top-level domain that doesn’t exist on the Internet and only resolves inside the Tor network. The biggest threat to Tor network is its vulnerability to traffic confirmation or correlation attacks, the researchers say. The researchers found that they could use brute force techniques to generate the keys needed for their own nodes.”]

