FINDING · DEFENSE

Because Rebound never terminates the client–decoy connection, connection-state probes (including 0trace-style TTL-expiry probes that bypass the decoy router via an alternate route) cannot reveal any discrepancy between the observed and actual state: the connection to the decoy host is always exactly in the state a censor would expect.

From 2015-ellard-reboundRebound: Decoy Routing on Asymmetric Routes Via Error Messages · §VIII-A2 · 2015 · Local Computer Networks

Implications

Tags

censors
generic
techniques
active-probing
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.