FINDING · DETECTION
Replacement-based covert channels that substitute genuine media streams with ciphertext (Protozoa replacing WebRTC video, Balboa replacing audio) are immediately detectable when the censor controls or has plaintext access to the protocol gateway — for example, a WebRTC relay that decrypts and validates incoming media. Censors can also systematically suppress these channels by selectively degrading or blocking encrypted traffic for which they have no decryption trapdoor.
From 2023-ding-discop — Discop: Provably secure steganography in practice based on ``distribution copies'' · §I · 2023 · Symposium on Security \& Privacy
Implications
- Do not rely on ciphertext-substitution into real-time media streams if the censor controls or co-opts relay infrastructure (TURN servers, CDN nodes) capable of inspecting plaintext — use generative steganography whose cover object is statistically indistinguishable even in cleartext.
- Design covert channels to degrade gracefully when the censor selectively throttles or blocks encrypted media; generative steganography embedded in ordinary plaintext traffic (blog posts, forum replies) has stronger availability guarantees than encrypted-stream hijacking.
Tags
Extracted by claude-sonnet-4-6 — review before relying.