FINDING · DETECTION

NATA requires no endpoint compromise, no Tor-browser modification, and no payload decryption; it operates solely from (1) an upstream gateway controlling Tor TCP connections via standard Linux tc/wondershaper rate-limiting and (2) one or more adversary-controlled exit relays passively recording packet traces. The shaper identifies Tor connections using flow-level metadata (client IP, relay IP, port, transport protocol), meaning the adversary needs only ISP or AS-level vantage, not host-level access.

From 2026-fan-activeflowmark-assessing-torActiveFlowMark: Assessing Tor Anonymity under Active Bandwidth Watermarking · §III-A, §IV-A · 2026 · arXiv preprint

Implications

Tags

censors
cnirru
techniques
traffic-shapeflow-correlation
defenses
torbridges

Extracted by claude-sonnet-4-6 — review before relying.