With 2.5 million daily users, the Tor network is the world’s most popular system for protecting Internet users’ anonymity. Researchers have now demonstrated a vulnerability in Tor’s design. They show that an adversary could infer a hidden server’s location, or the source of the information reaching a given Tor user, by analyzing the traffic patterns of encrypted data passing through a single computer in the all-volunteer Tor network.