Comment by soldthat

Comment by soldthat 2 days ago

1 reply

Neat demo. The unsettling part is how little signal you actually need: big CDNs and fraud teams already run much richer timing models than a simple min_rtt / rtt ratio. You can’t spoof away the speed of light, only add latency or jitter, and that itself becomes a fingerprint once you have enough traffic and a few global PoPs to compare from. So this doesn’t magically break L3 VPNs, but anyone relying on “just stick a TCP proxy in front and I’m anonymous/in-region” has been living with a pretty outdated threat model.

Sakura-sx 2 days ago

Thank you! There are other ways of detecting L3 VPNs, but I wanted to start with proxies since they do most of the damage.