A reaction to this claim has been printed on the formal Tor Blog stating these rumors of Tor's compromise are greatly exaggerated. It is shown that, while timing noise is included to the packets, there are energetic targeted visitors investigation methods that are robust towards such a sound. There are two approaches of traffic-assessment assault, passive and lively.