FINDING · DETECTION

Decoy routing systems that re-encrypt TLS application data across the relay station (Slitheen, Rebound, Waterfall) are vulnerable to nonce-reuse attacks: an adversary capable of observing traffic on both sides of the relay can exploit reused GCM nonces to decrypt or modify covert traffic. Although this falls outside the standard decoy routing threat model, it poses a concrete risk to users already under heightened surveillance who face adversaries with broad network visibility.

From 2018-bocovich-secureSecure asymmetry and deployability for decoy routing systems · §5.2 · 2018 · Privacy Enhancing Technologies

Implications

Tags

techniques
flow-correlation
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.