FINDING · DETECTION
The original Slitheen appended covert upstream data directly to overt HTTP requests, significantly changing upstream traffic patterns and enabling censor identification even when traffic is encrypted. This upstream traffic analysis vulnerability—absent from Slitheen's original threat model—is the primary weakness Slitheen++ addresses.
From 2020-birtel-slitheen — Slitheen++: Stealth TLS-based Decoy Routing · §1, §4 · 2020 · Free and Open Communications on the Internet
Implications
- Decoy routing systems must achieve stealth in both upstream and downstream channels simultaneously; patching only one direction leaves an obvious fingerprint.
- Any covert data embedding that changes observable request sizes or timing distributions will be detectable by traffic-analysis-capable censors regardless of encryption.
Tags
Extracted by claude-sonnet-4-6 — review before relying.