FINDING · DEFENSE
When a user splits traffic across N paths, a censor observing a single path sees only a partial trace, substantially reducing the accuracy of classifiers trained on complete network traces. Prior Tor traffic-splitting work (TrafficSliver, CoMPS, multipath Tor studies) has validated this defense against website fingerprinting outside the PT context.
From 2024-lorimer-extended — Extended Abstract: Traffic Splitting for Pluggable Transports · §1, §4.2 · 2024 · Free and Open Communications on the Internet
Implications
- Design PT deployments so that each observable path carries an incomplete fingerprint: even if each path's PT is individually identifiable, the split makes destination-level WF classification unreliable.
- Prefer splitting algorithms (weighted random, consistent splitting) over naive round-robin when proxy bandwidth is heterogeneous, as trace balance affects how degraded each partial view is.
Tags
Extracted by claude-sonnet-4-6 — review before relying.