Below is a list of tools, articles, and research related to de-anonymization, as well as some anonymization specific tooling designed to counter de-anonymization methods. This list will grow as I come across more things.
Shout out to sizeof(cat) who posted an initial list that I am using as starting point as I explore this are of research more.
- Bluetooth detection and de-anonymization tool
- Data analysis and de-anonymization
- De-anonymize ISP trajectories using external information
- Cross-Layer de-anonymization methods in the Lightning protocol
- Password-conditioned Face Identity Transformer
- Traffic de-anonymization, including Tor
- Network traffic level sensitive information removal
- TCP ISN CPU leak protection tool
- De-anonymizing Crypto Addresses
- Implementing privacy protection engineering
- VPN detection projects across Github
- Novel Techniques for User De-anonymization Attacks
- Keystroke anonymization kernel
- De-anonymizing Tor or VPN users with website fingerprinting and machine learning
- Profiling and de-anonymizing Ethereum users
- VPN Detection in the browser using JavaScript
<3 m0x