RouteHardenHire us
← All tracks

// track 04

Anonymity Engineering

Threat models, traffic analysis, padding, mix networks, browser fingerprinting, OS / TCP fingerprints, steganographic channels.

7 of 7 modules published

  1. 4.1

    Threat models for network anonymity

    Passive observers, active adversaries, global traffic correlation, and the vocabulary needed to reason about anonymity without hand-waving.

    29 min read·intermediate
  2. 4.2

    Traffic analysis fundamentals

    How timing, size, and burst structure leak information from encrypted traffic, from end-to-end correlation to website fingerprinting.

    27 min read·advanced
  3. 4.3

    Padding strategies and cover traffic

    Constant-rate padding, adaptive padding, dummy traffic, and why hiding packet shape is harder than appending zeros.

    22 min read·advanced
  4. 4.4

    Mix networks: Loopix and Nym

    From Chaumian mixes to Loopix and Nym: delay, cover traffic, Sphinx packets, and the anonymity-latency-bandwidth tradeoff.

    23 min read·advanced
  5. 4.5

    Browser fingerprinting in depth

    Canvas, WebGL, fonts, audio, viewport geometry, and why hiding your IP does not standardize your browser.

    26 min read·advanced
  6. 4.6

    OS and TCP/IP stack fingerprinting

    How TCP SYN fields, TLS ClientHello structure, and HTTP/2 settings betray client identity even when the payload is encrypted.

    23 min read·advanced
  7. 4.7

    Steganographic channels

    DNS, ICMP, HTTP, and media-based covert channels; storage versus timing channels; and why protocol normalization breaks many hiding schemes.

    23 min read·advanced

// for teams and consultants

Need this curriculum for your team?

Custom training, downloadable companion assets, network-architecture review, and on-call deployment help land inside our consulting engagements →