Benmeziane, SouadBadache, Nadjib2013-11-242013-11-242010-12http://dl.cerist.dz/handle/CERIST/317Tor is a volunteer run relay network designed for privacy, anonymity, and censorship resistance. Tor has become the most successful public anonymity communication service in the Internet because of its low latency. In this paper, we present a method to exploit the Tor limits in conjunction with the public profile of a user to reduce the degree of anonymity.AnonymityTor networkPassive adversaryPrivate profileTor Network LimitsTechnical ReportCERIST-DTISI/RS--10-000000021--dz