FINDING · DEFENSE
Because Skype relies on a central login server, it is technically possible for a censor to block Skype, but the paper observes that blocking widely-deployed services like Skype or Google inflicts real economic harm, making it a credible deterrent. Additionally, Skype's proprietary, closed-source protocol and P2P architecture make it harder to characterize and selectively filter than open protocols.
From 2009-cao-skyf2f — SkyF2F: Censorship Resistant via Skype Overlay Network · §V.C · 2009 · International Conference on Information Engineering
Implications
- Choosing high-economic-value commercial traffic as a cover channel (VoIP, CDN, cloud storage) creates political friction against blocking; this 'collateral damage' property is a real and usable defense property when designing circumvention infrastructure.
- Closed/proprietary or frequently-changing protocols raise the cost of DPI-based fingerprinting; circumvention transports should treat protocol obscurity as a secondary (not primary) defense layer.
Tags
Extracted by claude-sonnet-4-6 — review before relying.