FINDING · DETECTION

Even with end-to-end encrypted messages, a censor observing subscription queries can detect anomalous interest in a short tag (e.g., a sudden domestic surge in followers of a foreign pop star's hashtag) and use timing/size traffic analysis to distinguish #h00t subscriptions from ordinary hashtag follows. The paper flags this as an open threat and proposes two mitigations: (1) push cover traffic for randomly selected short tags to all clients regardless of their actual subscriptions, or (2) silently redirect normal clients' hashtag follows to the corresponding #h00t short tags.

From 2011-bachrach-h00t\#h00t: Censorship Resistant Microblogging · §6.1 · 2011 · Rice University and University of Texas at Arlington

Implications

Tags

censors
generic
techniques
traffic-shapedpi
defenses
randomizationsteganography

Extracted by claude-sonnet-4-6 — review before relying.