BM-Net achieves a 99.65% binary detection F1 score for distinguishing bandwidth-watermarked Tor flows from natural traffic, outperforming all evaluated baselines (next best: TikTok at 75.96% F1). The accuracy gap stems from active perturbation imposing a deterministic low-frequency throughput constraint rather than relying on subtle natural metadata, making the detection task fundamentally easier than passive website fingerprinting.
From 2026-fan-activeflowmark-assessing-tor — ActiveFlowMark: Assessing Tor Anonymity under Active Bandwidth Watermarking
· §VI-D, Table III–IV
· 2026
· arXiv preprint
Implications
Passive timing and burst-reshaping defenses (WTF-PAD, Walkie-Talkie) do not protect against active bandwidth watermarking; circumvention tools should include client-side rate-smoothing that counteracts upstream shaper-induced throughput envelopes.
A detector achieving 99.65% F1 on a small labeled dataset confirms active watermarking is a realistic threat; bridge and pluggable-transport designs need explicit countermeasures for infrastructure-level bandwidth control, not just application-layer obfuscation.