FINDING · DEFENSE
The paper presents 11 purely server-side censorship evasion strategies requiring zero client-side software, successfully bypassing censorship in China, India, Iran, and Kazakhstan across DNS-over-TCP, FTP, HTTP, HTTPS, and SMTP. All strategies manipulate only TCP handshake packets (primarily the SYN+ACK) and were verified against 17 versions of 6 client operating systems (Windows XP–Server 2018, MacOS, iOS, Android, Ubuntu, CentOS) with unmodified clients.
From 2020-bock-come — Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion · §1, §5, Table 2 · 2020 · SIGCOMM
Implications
- Deploy server-side packet manipulation (e.g., via a Geneva-derived daemon) so censored users need no special software—eliminating bootstrapping friction and reaching users unaware of censorship.
- Server-side evasion sidesteps the legal and operational risk of distributing client-side anti-censorship software inside censoring regimes.
Tags
Extracted by claude-sonnet-4-6 — review before relying.