FINDING · DEFENSE

A naive active-probing resistance scheme that embeds a fixed-length token in the initial request is vulnerable to flow fingerprinting because the censor can detect connections that always begin with a fixed byte count; pseudo-random padding removes this length-based signature. Separately, obfuscating-service schemes that reveal server aliveness by completing TCP expose the server IP to enumeration even before the application-layer challenge fires.

From 2016-khattak-sokSoK: Making Sense of Censorship Resistance Systems · §5.5 · 2016 · Privacy Enhancing Technologies

Implications

Tags

techniques
active-probingtraffic-shape
defenses
randomizationscramblesuit

Extracted by claude-sonnet-4-6 — review before relying.