FINDING · DEPLOYMENT
The October 2022 blocking wave is the confirmed operational deployment of the fully-encrypted-traffic detector later formalized in Wu et al. (USENIX Security 2023). The detector was therefore in live production from at least late 2022, more than a year before the academic paper describing it was published. This event establishes that the GFW's passive fully-encrypted classifier operates at scale in adversarial real-world conditions, not just in controlled experiments.
From 2022-blocking-tls-circumvention — Large scale blocking of TLS-based censorship circumvention tools in China · full post · 2022 · gfw.report
Implications
- The 2023 USENIX detector model should be treated as production reality, not a research artifact — any protocol whose first-packet popcount falls in [3.4, 4.6] bits/byte risks live blocking in CN without active probing.
- Assume no grace period between researcher disclosure and GFW deployment; design circumvention protocols to be detector-resistant from launch.
Tags
Extracted by claude-sonnet-4-6 — review before relying.