Even when individual WebRTC flows pass traffic analysis, a censor can identify CRON users via three long-term statistical attack types: S1 (simultaneous video calls, atypical for normal users), S2 (sudden connections to previously unknown parties), and S3 (calls at anomalous times, frequencies, or durations). Relay nodes in multi-hop circuits are particularly exposed via S1 because conducting multiple simultaneous video calls is highly atypical in normal user profiles.
From 2020-barradas-towards — Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels
· §4.1
· 2020
· Distributed Infrastructure for Common Good
Implications
Flow-level traffic analysis resistance is necessary but not sufficient: circumvention systems that create new connection patterns (simultaneous calls, novel peer pairings) must account for long-term behavioral profiling across the user's full connection history.
Multi-hop relay roles are the highest-risk configuration under S1 profiling; protocol designers should consider restricting relay participation to delay-tolerant operation or camouflaging it within group-call scenarios that legitimately involve multiple simultaneous streams.