FINDING · EVALUATION
Six widely deployed VPN and circumvention tools—OpenVPN, WireGuard/NordLynx, NordWhisper, Orbot (Tor on Android), Lantern, and Psiphon—all failed to block internal IP inference, connection-state detection, and TCP reset injection under identical adversarial conditions on fully patched Android 16. Application-layer obfuscation in Lantern and Psiphon did not prevent TCP-layer disruption; Orbot's VPN-style encapsulation of Tor traffic was bypassed via the same tunnel-level side channels.
From 2026-tolley-architectural — Architectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures · §5.2, §5.4–5.5 · 2026 · Free and Open Communications on the Internet
Implications
- Application-layer obfuscation (payload encryption, traffic shaping) is insufficient if the underlying tunnel architecture exposes response differentials to spoofed packets; circumvention tools must address OS-level tunnel semantics.
- Tools like Orbot that wrap Tor in a VPN interface inherit VPN-level metadata exposure; consider kernel-bypass or userspace network stacks to decouple from the vulnerable OS tunnel behavior.
Tags
Extracted by claude-sonnet-4-6 — review before relying.