FINDING · DETECTION

Protocol mimicry that replicates only statistical or syntactic traffic properties is insufficient for unobservability: Houmansadr et al. (2013) showed SkypeMorph was trivially detectable by the absence of Skype control channels, missing login-server communication, and failure to replicate implementation-specific bugs present in real Skype—demonstrating that full behavioral replication, not just traffic shaping, is required to withstand scrutiny.

From 2023-jia-voiceoverVoiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling · §2 · 2023 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
mimicry

Extracted by claude-sonnet-4-6 — review before relying.