The method relies on a flaw known as scheme flooding, which allows an attacker to discover which programmes users have enabled. Someone might connect a user’s browsing history through all sessions with an identifier, potentially de-anonymizing or monitoring them on the internet.
Attackers are constantly attempting to target the Tor network, as shown by recent fingerprinting techniques and ongoing SSL-stripping attempts.