FINDING · DEFENSE

The paper proves that immediate forward security is impossible for Telex-like decoy-routing systems. The Telex station must decide whether to treat a connection as a Telex request after the first client message, using only received messages and its long-term key — an eavesdropper who stores all network traffic can replay the station's entire view once it compromises the station's long-term key, retroactively decrypting all sessions.

From 2013-ruffing-identity-basedIdentity-Based Steganography and Its Applications to Censorship Resistance · Appendix B · 2013 · Hot Topics in Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
flow-correlation
defenses
decoy-routingtelex

Extracted by claude-sonnet-4-6 — review before relying.