FINDING · DEFENSE

MultiFlow's tunnel operates as a virtual message board: the client and decoy router never exchange covert data within the same TCP connection. The decoy router uploads responses to a URI or email address specified by the client; the client downloads independently on a separate connection. This design eliminates the forged-packet and rewritten-traffic vectors that make TapDance and Rebound vulnerable to traffic analysis and decoy-host probing.

From 2018-manfredi-multiflowMultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption · §3.2 · 2018 · Free and Open Communications on the Internet

Implications

Tags

techniques
traffic-shapeactive-probing
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.