FINDING · DEFENSE

The protocol between blockee and volunteer forwarder is designed to be transport-layer independent from the outset, allowing substitution of plain TCP with SSL tunnels, SMTP, or steganographic channels as the censor escalates detection. The system is intentionally deployed in a weak initial form to observe how quickly and in what manner the censor adapts, then hardened iteratively based on measured censor behavior.

From 2004-k-psell-achieveHow to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing · §6.2 · 2004 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
meta-resistancetunnelingsteganography

Extracted by claude-sonnet-4-6 — review before relying.