FINDING · DETECTION

Even when individual WebRTC flows pass traffic analysis, a censor can identify CRON users via three long-term statistical attack types: S1 (simultaneous video calls, atypical for normal users), S2 (sudden connections to previously unknown parties), and S3 (calls at anomalous times, frequencies, or durations). Relay nodes in multi-hop circuits are particularly exposed via S1 because conducting multiple simultaneous video calls is highly atypical in normal user profiles.

From 2020-barradas-towardsTowards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels · §4.1 · 2020 · Distributed Infrastructure for Common Good

Implications

Tags

censors
genericcnir
techniques
traffic-shapeflow-correlationml-classifier
defenses
webrtc-pluggable

Extracted by claude-sonnet-4-6 — review before relying.