Tobias Pulls

58 Followers
136 Following
19 Posts
Traffic analysis, anonymity, Rust, Tor, WireGuard, eBPF, DNS. Researcher at Karlstad University, Sweden. Core Member Tor Project. https://pulls.name

@trashpanda @ahf

Robust is a loaded word for WF defenses and attacks of any kind (heavily debated).

I like to think of it as Tor offering better protection than, say, plain WireGuard. It's easy for people to see attacks like website fingerprinting discussed on Tor and then be discouraged, when the alternatives are often much, much worse. If Tor/Nym/DAITA works for your circumstances, go for it!

As @ahf wrote in parallel, the Tor+VPN mixes are also controversial and complicated. It depends on so many factors, and you can come up with use cases for every combination that makes sense.

With Tor inside a VPN, say WireGuard, it's likely pretty well detected by anyone looking for it. First, you trivially detect WireGuard (packet headers), then you count the frequency of packets and observe that the distribution of packet sizes skews towards having a relationship to Tor's cell size (it'll be more choppy, over time, a pretty clear signal ... no AI needed).

If you want to hide your use of Tor (VPN or not), use anti-censorship tools (potentially within the VPN).

FWIW, I don't turn off my VPN when using Tor, but I'm also lucky enough not to have to worry about my ISP knowing when I use Tor or not as part of my threat model.

@trashpanda @ahf A quick comment here on attacks. Tik-Tok was a solid contribution at the time, but the space is moving very fast. Robust Fingerprinting is a generational leap forward in attack over Tik-Tok, and Laserbeak (Nate Mathews with friends), another generation beyond Robust Fingerprinting. Laserbeak uses Transformers, good times (for GPU-rich attackers). There are some minor/parallel advances beyond Laserbeak, but I'm yet to see a full "generation" beyond it so in my book it's current state-of-the-art. Attackers can ride the AI wave, though, so if there's one thing I'm sure of, it's that they'll get better!

@trashpanda @ahf Hi, thanks for the ping and interest!

It isn't very easy to answer since things are a bit mixed up here and on the TorPlusVPN page.

Maybenot is a *framework* for traffic analysis defenses, meaning that what Maybenot can and cannot help with depends on what kind of defenses are running in the framework. As @ahf mentioned, what Arti can offer here is tbd as Arti relay hacking progresses further.

There is one significant deployment of Maybenot now with DAITA and Mullvad VPN, https://mullvad.net/en/vpn/daita . In DAITA, we aim to make Website Fingerprinting attacks harder, create fake activity when the VPN is not used (fake background traffic), and do some more general tweaks to WireGuard (constant-sized packets and mess with NetFlow, based on Tor's connection-level padding). Please note that DAITA is for VPN traffic, so the connections are long-lived and typically carry all traffic from a system. DAITA is also very much a work in progress, but we're shipping and iterating. To get an idea of where we're heading, stay tuned for the PDF of "Ephemeral Network-Layer Fingerprinting Defenses" at https://petsymposium.org/2026/paperlist.php soonish and see fun machine generation tooling at https://github.com/maybenot-io/maybenot (use https://github.com/maybenot-io/maybenot/tree/main/crates/maybenot-cli).

If you compare Tor and WireGuard/OpenVPN/SSH, Tor already does connection-level padding (mess with NetFlow as mentioned), chops traffic into fixed-sized cells, and creates many isolated short-lived circuits through the large and distributed Tor network. This should not be underestimated in terms of how it messes with *reliable* traffic analysis for network adversaries who want to figure out what you're doing in Tor. It's a significant bar.

Now to get closer to answering the question: would/could Maybneot + VPN/SSH make VPN/SSH fingerprinting harder? Short answer is yes, if you create machines for this purpose. I don't think Website Fingerprinting, as in the TorPlusVPN wiki is the most relevant threat here. WF is messy and rich in false positives. If the goal of the adversary here is to detect that you're using Tor within a VPN/SSH tunnel, this is more in line with all the cool work on anti-censorship, where Tor traffic is tunneled to hide the fact that Tor is used. The relevant fingerprinting attacks become, e.g., https://www.ndss-symposium.org/wp-content/uploads/2025-966-paper.pdf .

So the TL;DR: Hide using Tor? Use the cool anti-censorship tools! They are designed to make detecting Tor use difficult. Protect against someone fingerprinting what is done over Tor? Maybenot can help here in Arti in the future (DAITA helps today), but remember that Tor helps today as-is compared to regular VPN/SSH tunnels.

DAITA: Defense Against AI-guided Traffic Analysis

Even if you have encrypted your traffic with a VPN, advanced traffic analysis is a growing threat against your privacy. Therefore, we have developed DAITA – a feature available in our VPN app. Through constant packet sizes, random background traffic and data pattern distortion, we are taking the battle against AI-guided traffic analysis.

Mullvad VPN

I've been working (together with Javier Gomez-Serrano) with a group at Google Deepmind to explore potential mathematical applications of their tool "AlphaEvolve", a successor of their earlier tool "Funsearch" that was publicly announced today: https://deepmind.google/discover/blog/alphaevolve-a-gemini-powered-coding-agent-for-designing-advanced-algorithms/ . Very roughly speaking, this is a tool that can attempt to extremize functions F(x) with x ranging over a high dimensional parameter space Omega, that can outperform more traditional optimization algorithms when the parameter space is very high dimensional and the function F (and its extremizers) have non-obvious structural features.

Some of the preliminary problems we have tried this on, including problems involving harmonic analysis inequalities, additive combinatorics, and packing, were already mentioned in the announcement; we are now gradually moving on to more challenging problems where the parameter space has a sparser set of good solutions. The work is still ongoing, but I hope to be able to report more upon it when we are closer to completion (probably a few months from now).

AlphaEvolve: A Gemini-powered coding agent for designing advanced algorithms

New AI agent evolves algorithms for math and practical applications in computing by combining the creativity of large language models with automated evaluators

Google DeepMind
DAITA version 2 now available on all platforms: https://mullvad.net/blog/daita-version-2-now-available-on-all-platforms
DAITA version 2 now available on all platforms | Mullvad VPN

We are now releasing version 2 of our Defense Against AI-guided Traffic Analysis (DAITA).

Mullvad VPN

Posted some technical details on DAITA v1 and v2 defenses together with @mullvadnet to celebrate the deployment of v2 🚀

https://pulls.name/blog/2025-03-27-daita-v1-and-v2-defenses/

DAITA v1 and v2 defenses

A short whoami of Tobias Pulls

I really like the message here and I wanted to share:
https://theoatmeal.com/comics/believe_clean
You're not going to believe what I'm about to tell you (classroom-friendly version) - The Oatmeal

This is a classroom-friendly (no cuss words) comic about the backfire effect.

The Oatmeal

PETS/PoPETs is run by volunteers and we're looking for more people to participate. Please fill out this form if you'd like to help out!

https://forms.gle/wAadQRZWXLyDAQJA8

Be a Part of PETS!

PETS is looking for volunteers who are interested in contributing to the organization and running of the PETS 2025 conference! If you think you might be interested in getting involved, please fill out the form below to share with us a little bit about yourself, your interests, and how you might like to contribute. Note that you do not need to be a published author at PETS or previous attendee, but sharing some information about your PETS participation/attendance can help us think about how to (possibly) pair you with others if a position is available. Note: If you are interested in nominating yourself or someone else for the PETS editorial board, PC, or artifact review process, please use the form located here: https://forms.gle/wtD3jR5YR71eWPd28. Please complete the form below even if you have served in one of the roles before (including at PETS 2024); this lets us know if you are interested in continuing. Submitting is neither a commitment to nor a guarantee of serving in a particular role. We hope to begin reaching out to folks by the end of September 2024, when we will give you an idea of what's involved in a particular role and the opportunity to discuss/accept/decline and/or remain on the list for other openings. We strongly encourage members of the PETS community at all levels to consider raising their hands for these roles, which provide a valuable opportunity to contribute to and help shape PETS for the future.

Google Docs

In an unexpected turn of events, a sensible take on #Crowdstrike from the Orange Site.

Source: https://news.ycombinator.com/item?id=41004184

So CrowdStrike is deployed as third party software into the critical path of mis... | Hacker News