http://dark.z5lcip4dafatwwa6hvyibizpzwycvwp67cjga3hzjhxhwvuyaqavxnid.onion/tech/462
This attack can be implemented against virtually any encrypted or unencrypted connection, both in the server-client and client-server direction, that is, it can be used to detect hidden onion services. What restrictions exist? Due to the use of the Nagle algorithm and network fluctuations, non-linear traffic behavior can result in a partial timing information loss.