FINDING · DETECTION

OONI's threat model assumes an adversary capable of country-wide traffic manipulation who may actively fingerprint and identify measurement probes. Prior measurement tools (e.g., ONI's rTurtle) used easily fingerprinted centralized DNS and HTTPS traffic, which the authors flag as a pattern to avoid. The authors acknowledge that anti-fingerprinting measures will likely reduce measurement accuracy — a trade-off unresolved at publication.

From 2012-filast-ooniOONI: Open Observatory of Network Interference · §3 Threat Model; §10 Limits and future work · 2012 · Free and Open Communications on the Internet

Implications

Tags

techniques
active-probingdpitls-fingerprintdns-poisoning
defenses
tor

Extracted by claude-sonnet-4-6 — review before relying.