Peer-to-peer VoIP calls are becoming increasingly popular
due to their advantages in cost and convenience. When these
calls are encrypted from end to end and anonymized by low
latency anonymizing network, they are considered by many
people to be both secure and anonymous.
In this paper, we present a watermark technique that
could be used for eÆectively identifying and correlating en-
crypted, peer-to-peer VoIP calls even if they are anonymized
by low latency anonymizing networks. This result is in con-
trast to many people's perception. The key idea is to em-
bed a unique watermark into the encrypted VoIP ∞ow by
slightly adjusting the timing of selected packets. Our analy-
sis shows that it only takes several milliseconds time adjust-
ment to make normal VoIP ∞ows highly unique and the em-
bedded watermark could be preserved across the low latency
anonymizing network if appropriate redundancy is applied.
Our analytical results are backed up by the real-time exper-
iments performed on leading peer-to-peer VoIP client and
on a commercially deployed anonymizing network. Our re-
sults demonstrate that (1) tracking anonymous peer-to-peer
VoIP calls on the Internet is feasible and (2) low latency
anonymizing networks are susceptible to timing attacks