FINDING · DEFENSE
The protocol between blockee and volunteer forwarder is designed to be transport-layer independent from the outset, allowing substitution of plain TCP with SSL tunnels, SMTP, or steganographic channels as the censor escalates detection. The system is intentionally deployed in a weak initial form to observe how quickly and in what manner the censor adapts, then hardened iteratively based on measured censor behavior.
From 2004-k-psell-achieve — How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing · §6.2 · 2004 · Workshop on Privacy in the Electronic Society
Implications
- Decouple application-layer circumvention logic from the transport layer at design time so the obfuscation layer can be swapped (TCP → TLS → SMTP → steganography) without re-architecting the proxy protocol when the censor upgrades detection.
- Treat initial deployment as a measurement experiment: instrument which blocking techniques the censor deploys in response to each protocol feature, and use that signal to prioritize hardening efforts.
Tags
Extracted by claude-sonnet-4-6 — review before relying.