FINDING · DEFENSE

Rebound eliminates the stack-fingerprinting vulnerability present in Telex, Curveball, Cirripede, and TapDance by never forging packets addressed to the client; all data from the decoy router to the client travels through the real decoy host, so the TCP/IP stack fingerprint observed by a censor is always that of the genuine decoy.

From 2015-ellard-reboundRebound: Decoy Routing on Asymmetric Routes Via Error Messages · §VIII-A1 · 2015 · Local Computer Networks

Implications

Tags

censors
generic
techniques
dpiactive-probing
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.