FINDING · DEFENSE
Encrypted channels expose only two statistical features to an external observer: packet sizes and inter-packet arrival times. Original Traffic Morphing (Wright et al. 2009) shaped only packet-size distributions, leaving inter-packet timing as an unobfuscated fingerprint identical to the source (Tor) distribution. SkypeMorph extends Traffic Morphing to jointly sample from nth-order conditional distributions of both packet sizes and inter-packet delays (tested up to n = 3), closing the timing gap.
From 2012-moghaddam-skypemorph — SkypeMorph: Protocol Obfuscation for Tor Bridges · §4.3, §4.4 · 2012 · Computer and Communications Security
Implications
- Any traffic-shaping layer must independently shape both packet sizes and inter-arrival times; omitting timing from the morphing matrix leaves a trivially detectable fingerprint even when sizes are correctly distributed.
- Maintain empirical nth-order joint distributions (n ≥ 2) of the cover protocol so the oracle can condition each packet's timing and size on recent history, reproducing higher-order statistical patterns the censor may exploit.
Tags
Extracted by claude-sonnet-4-6 — review before relying.