FINDING · DEFENSE

The paper evaluates two short-term mitigations—TCP delayed ACK on the proxy server and connection multiplexing—but finds both are limited: delayed ACK produces atypical ACK timing that may itself be fingerprintable, and multiplexing only adds entropy without eliminating the RTTdiff signal. Critically, obfs4 and ScrambleSuit's delay-based timing obfuscation are described as 'fundamentally limited' because they manipulate inter-arrival times without eliminating the underlying transport/application-layer session misalignment. The paper concludes no existing obfuscation scheme provides a principled defense against timing-based proxy fingerprinting.

From 2025-xue-discriminativeThe Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic · §VII, §I · 2025 · Network and Distributed System Security

Implications

Tags

censors
generic
techniques
traffic-shape
defenses
obfs4scramblesuitshadowsocksmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.