FINDING · DETECTION

Rebound's mole protocol generates a characteristic traffic pattern — a steady stream of long HTTP GET requests followed by 404-style error responses — that may be identifiable via traffic analysis even though the channel is TLS-encrypted; the paper acknowledges this as an unmitigated vulnerability and notes that intermingling with ordinary requests reduces observability but further lowers effective throughput.

From 2015-ellard-reboundRebound: Decoy Routing on Asymmetric Routes Via Error Messages · §VIII-B · 2015 · Local Computer Networks

Implications

Tags

censors
generic
techniques
traffic-shapedpi
defenses
decoy-routingtunneling

Extracted by claude-sonnet-4-6 — review before relying.