FINDING · DETECTION

The threat model requires no DPI and was fully implemented as a Linux kernel module on a NETGEAR R6120 with only a 580 MHz processor, 16 MB ROM, and 64 MB RAM, adding negligible overhead. Unlike ML-based or DPI-based VPN classifiers, the statistical model operates pre-NAT on per-device private IP flows, making it immune to obfuscation techniques that alter packet payloads or disguise protocol handshakes.

From 2024-almutairi-fingerprintingFingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model · §I, §IV · 2024 · Consumer Communications \& Networking Conference

Implications

Tags

censors
generic
techniques
traffic-shape
defenses
mimicryrandomizationpluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.