FINDING · DETECTION

Schuchard et al. demonstrated that latency differences caused by a decoy routing proxy communicating with a distant covert destination are sufficient not only to detect the use of decoy routing but also to fingerprint which specific censored webpage the client accessed. All prior decoy routing systems (Telex, Cirripede, Curveball, TapDance, Rebound) remained vulnerable to this attack at time of publication.

From 2016-bocovich-slitheenSlitheen: Perfectly Imitated Decoy Routing through Traffic Replacement · §4.1 · 2016 · Computer and Communications Security

Implications

Tags

censors
generic
techniques
traffic-shapewebsite-fingerprint

Extracted by claude-sonnet-4-6 — review before relying.