FINDING · DETECTION
Censors responding to encryption-based circumvention have two escalation options: block all encrypted connections outright, or identify the underlying protocol via traffic signatures that persist even inside encrypted tunnels. The paper frames these as the two dominant censor responses to DPI being defeated by encryption.
From 2011-wright-fine-grained — Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics · §3 · 2011 · Free and Open Communications on the Internet
Implications
- Encrypting payload alone is insufficient — transports must also eliminate detectable traffic signatures (packet sizes, timing, handshake patterns) to survive DPI escalation.
- Design for the 'block all encrypted' fallback: transports should mimic a specific allowed protocol rather than relying on opacity alone.
Tags
Extracted by claude-sonnet-4-6 — review before relying.