FINDING · DETECTION

A warden can fingerprint the specific covert destination a Telex user is visiting by comparing observed latency distributions against a pre-built database of covert-destination latencies. With an intelligently filtered database of only 10 distributions (K-S inter-entry threshold 0.8), the AUC is 0.868, and with approximately 12 collected samples the false positive rate drops below 10%. Larger databases (size 50) degrade to AUC 0.537 due to distribution similarity, but threshold-based filtering restores substantial discriminative power.

From 2012-schuchard-routingRouting Around Decoys · §5.3, Figures 7, 9 · 2012 · Computer and Communications Security

Implications

Tags

censors
cnirsy
techniques
traffic-shapeflow-correlationwebsite-fingerprint
defenses
decoy-routingtelex

Extracted by claude-sonnet-4-6 — review before relying.