FINDING · DEFENSE
The paper formally defines circumvention as either preventing the trigger from being seen by the surveillance device, or countering the effects of the censoring action. This two-path decomposition — hide the trigger vs. nullify the enforcement — provides a clean design framework: a circumvention tool can succeed by making traffic unrecognizable (no trigger fires) or by routing around the blocking device (action nullified).
From 2015-aceto-internet — Internet Censorship detection: A survey · §2.1 · 2015 · Computer Networks
Implications
- Design protocols that attack the trigger layer first (traffic looks like legitimate content so no censoring action fires) rather than relying solely on resilience to post-detection blocking actions.
- Test circumvention tools against both surveillance-layer detection (does the trigger fire?) and enforcement-layer response (if blocked, can the route change?), since these require distinct mitigations.
Tags
Extracted by claude-sonnet-4-6 — review before relying.