stealth

Network Security Guide

(This Document is Work in Progress)

The Stealth Service allows to relay traffic with multiple mechanisms, and allows to share network connections with its Peers in a local manner and/or global manner, so it’s hard to get a hold of it in terms of networked state complexity or whether or not it can be abused to identify an end-user uniquely.

Every Stealth Service also contains:

Attack Vector: TCP/UDP Manipulation

Attack Vector: TCP/UDP Fingerprinting

Attack Vector: NAT Blocking

Attack Vector: DHT / Radar Access Blocking

Attack Vector: DNS Manipulation

Attack Vector: DNS Tracking

Attack Vector: HTTP Downgrade Attack

Attack Vector: TLS Downgrade Attack(s)

Attack Vector: TLS Timing/Side-Channel Attack(s)

Attack Vector: HTTP/S Traffic Correlation Tracking

Attack Vector: Multicast DNS-SD Manipulation

Attack Vector: Multicast DNS-SD Tracking