Researchers have developed a new technique that could allow attackers to determine with a high degree of accuracy which Tor websites users are accessing and where those websites are hosted. The new attack, which improves upon previous traffic fingerprinting techniques, was devised by researchers from the Massachusetts Institute of Technology (MIT) and the Qatar Computing Research Institute (QCRI) Researchers found ways to differentiate between different types of connections in a user’s encrypted Tor traffic. The researchers gathered fingerprints for 50 hidden services and found that they could determine 88 percent accuracy when a Tor client using their entry guard was visiting one of them.”]