FINDING · DEFENSE

The authors propose two countermeasures: (1) widespread adoption of traffic splitting so not all user traffic is routed through a single VPN tunnel, neutralizing the single-destination session signature; and (2) VPN servers should rotate at random intervals so that no prolonged session to one IP accumulates enough packets to trigger the threshold T.

From 2024-almutairi-fingerprintingFingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model · §VI · 2024 · Consumer Communications \& Networking Conference

Implications

Tags

censors
generic
techniques
traffic-shapeip-blocking
defenses
tunnelingrandomization

Extracted by claude-sonnet-4-6 — review before relying.