Under the TrafficSliver defense — which splits traffic across multiple Tor entry nodes so no single observer sees more than a partial fraction of packets — TMWF collapses to a P@2 of 0.399 and ARES'23 to 0.429, while DEMUX retains a P@2 of 0.940, exceeding the next-best competitor by 2.5 points. WTF-PAD and FRONT are substantially weaker defenses, with most methods maintaining near-baseline performance under WTF-PAD.
From 2026-yuan-demux-boundary-aware-multi-scale — DEMUX: Boundary-Aware Multi-Scale Traffic Demixing for Multi-Tab Website Fingerprinting
· §V-D, Table IV
· 2026
· arXiv preprint
Implications
Traffic splitting across multiple entry nodes (TrafficSliver-style multi-path) is by far the most effective WF defense evaluated — circumvention systems should explore multi-path architectures that fragment observations across independent vantage points.
Dummy-packet injection defenses (WTF-PAD, FRONT) provide negligible protection against modern multi-scale WF classifiers and should not be treated as a primary defense mechanism.