FINDING · DETECTION
Current randomized-payload circumvention tools (obfs4/ScrambleSuit, SkypeMorph, VoIP-tunneling) rely on censors 'defaulting open' — treating unidentified traffic as innocuous. If censors instead block all traffic not explicitly recognizable as meaningful plaintext, these tools fail entirely. The paper notes anecdotal evidence this is already occurring, including blocking of some TLS 1.3 connections.
From 2021-kaptchuk-meteor — Meteor: Cryptographically Secure Steganography for Realistic Distributions · §1 Introduction · 2021 · Computer and Communications Security
Implications
- Design transports that produce output statistically indistinguishable from a known-allowed plaintext distribution (e.g., natural language text), not merely from pseudorandom data
- Avoid any transport whose security model assumes the censor will allow traffic it cannot classify — this assumption may already be false in CN and IR
Tags
Extracted by claude-sonnet-4-6 — review before relying.