FINDING · DETECTION

An infrastructure-level adversary must balance watermark detectability against connection stability: the paper's threat model requires a minimum shaping rate rmin to prevent Tor circuit stalls, timeouts, or circuit replacement, and notes that repeated poor-throughput events can cause the circuit to be abandoned before sufficient watermark evidence is accumulated. This detectability–stability trade-off constrains the practical attack to macroscopic (30-second) modulation periods rather than fine-grained packet-level timing manipulation.

From 2026-fan-activeflowmark-assessing-torActiveFlowMark: Assessing Tor Anonymity under Active Bandwidth Watermarking · §III.A, §VII.A · 2026 · arXiv preprint

Implications

Tags

censors
generic
techniques
flow-correlationtraffic-shapethrottling
defenses
tor

Extracted by claude-sonnet-4-6 — review before relying.