FINDING · DEFENSE
Protocol Proxy uses 'protected static protocols' — UDP-based protocols whose blocking causes severe collateral damage (e.g., Synchrophasor power-grid traffic, NTP) — as cover channels. Because any detection rule that fires on Protocol Proxy traffic also fires on legitimate PMU traffic, censors face a forced trade-off between blocking circumvention and disrupting critical infrastructure.
From 2020-oakley-protocol — Protocol Proxy: An FTE-based covert channel · §3, §5 · 2020 · Computers \& Security
Implications
- Select cover protocols from a class where false-positive blocking causes documented real-world harm (critical infrastructure, financial settlement, healthcare telemetry); this raises the political cost of blocking above what most censors will accept.
- Pair cover-protocol selection with syntactic equivalence (observation-based FTE) so that the collateral-damage argument is not undermined by detectable malformations.
Tags
Extracted by claude-sonnet-4-6 — review before relying.