FINDING · DEFENSE

Slitheen replaces only 'leaf' HTTP resources (images, video) in overt-site responses with covert content, reusing all TCP/IP headers verbatim and forwarding packets immediately on arrival. This forces every observable feature—packet size, direction, inter-arrival timing—to be identical to a genuine access of the overt page, eliminating the censor's ability to apply latency analysis, website fingerprinting, or protocol fingerprinting to distinguish decoy sessions from normal traffic.

From 2016-bocovich-slitheenSlitheen: Perfectly Imitated Decoy Routing through Traffic Replacement · §3.1, §4.1 · 2016 · Computer and Communications Security

Implications

Tags

techniques
traffic-shapewebsite-fingerprintdpi
defenses
decoy-routingmimicry

Extracted by claude-sonnet-4-6 — review before relying.