FINDING · DETECTION

The original Slitheen appended covert upstream data directly to overt HTTP requests, significantly changing upstream traffic patterns and enabling censor identification even when traffic is encrypted. This upstream traffic analysis vulnerability—absent from Slitheen's original threat model—is the primary weakness Slitheen++ addresses.

From 2020-birtel-slitheenSlitheen++: Stealth TLS-based Decoy Routing · §1, §4 · 2020 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shapeflow-correlationdpi
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.