FINDING · DETECTION
Protocol imitation systems (SkypeMorph, CensorSpoofer, StegoTorus) fail to achieve unobservability because they implement the target protocol only partially, creating statistical discrepancies that censors can detect. Houmansadr et al. (2013) demonstrated this as a fundamental flaw: unobservability by imitation is categorically insufficient as a circumvention design principle.
From 2016-zarras-leveraging — Leveraging Internet Services to Evade Censorship · §1, §6 · 2016 · Information Security Conference
Implications
- Avoid partial protocol reimplementation; if mimicking a protocol, execute the real, full protocol stack rather than a reimplemented approximation
- Prefer tunneling inside unmodified real applications over custom protocol imitation layers — discrepancies in partial implementations are the primary detection surface
Tags
Extracted by claude-sonnet-4-6 — review before relying.