FINDING · EVALUATION
Testing 9 popular VPN providers (ProtonVPN, Hide.me, Turbo VPN, Kaspersky VPN, Hotspot Shield, Secure VPN, Fast VPN Pro, VPN Super, VPN Gate), 7 were successfully detected. KasperskyVPN evaded detection because it exchanged keepalive packets with a secondary server exactly every 300 seconds, matching the chosen WINDOW, causing the session counter to reset. Hotspot Shield evaded because of previously documented traffic leakage where not all traffic is tunneled.
From 2024-almutairi-fingerprinting — Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model · §IV-D, Table II · 2024 · Consumer Communications \& Networking Conference
Implications
- Periodic keepalive probes to a secondary server (or deliberate session-breaking traffic to a benign IP) at intervals shorter than the censor's detection window can systematically defeat session-accumulation detectors.
- Traffic leakage — where some flows bypass the VPN tunnel — is typically considered a privacy bug but incidentally defeats this detector; intentional split-tunnel design achieves the same effect without the security downside.
Tags
Extracted by claude-sonnet-4-6 — review before relying.