FINDING · DETECTION

A censor hosting Skype supernodes can perform passive traffic-flow analysis on relayed streams even without breaking encryption, since supernode-relayed conversations expose traffic metadata. However, with thousands of supernodes in the Skype network, the probability that any censor-controlled supernode relays a specific SkyF2F tunnel is low, making large-scale correlation high-cost.

From 2009-cao-skyf2fSkyF2F: Censorship Resistant via Skype Overlay Network · §V.A · 2009 · International Conference on Information Engineering

Implications

Tags

censors
generic
techniques
flow-correlationtraffic-shape
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.