FINDING · DETECTION

NATA (Non-invasive Active Traffic-correlation Analysis) requires no endpoint compromise, no Tor-browser modification, and no payload decryption. The adversary controls only an upstream network gateway (ISP/AS level) to impose bandwidth modulation on Tor TCP connections, and observes traffic at adversary-controlled exit relays — a Shaper–Sniffer architecture that operates purely at the network-infrastructure layer.

From 2026-fan-activeflowmark-assessing-torActiveFlowMark: Assessing Tor Anonymity under Active Bandwidth Watermarking · §III-A · 2026 · arXiv preprint

Implications

Tags

censors
generic
techniques
flow-correlationtraffic-shape
defenses
tor

Extracted by claude-sonnet-4-6 — review before relying.