FINDING · DEFENSE
Traffic replacement systems that only shape individual HTTPS flows remain vulnerable to censors monitoring inter-connection patterns over time. Waterfall's OUS (reloading the same page every second), Slitheen's OUS (naïve PhantomJS with no crawling), and Slitheen++'s OUS all produced non-human connection patterns detectable at the session level even when per-flow content is well-concealed. OUStral addresses this by shaping the distribution and sequencing of connections across an entire browsing session.
From 2021-lorimer-oustralopithecus — OUStralopithecus: Overt User Simulation for Censorship Circumvention · §1, §2.2, §3, §6 · 2021 · Workshop on Privacy in the Electronic Society
Implications
- Evaluate circumvention systems for session-level inter-connection statistics — site diversity, connection frequency, number of concurrent flows, time-between-requests distribution — not only per-flow payload features.
- Use a full browser (not a custom HTTP client) to drive overt traffic so that HTTP resource dependency graphs, conditional-GET cache validation, and parallel connection counts naturally replicate real browsing sessions without additional engineering.
Tags
Extracted by claude-sonnet-4-6 — review before relying.