FINDING · DEFENSE

Dust defeats DPI fingerprinting by constructing all packets from entirely encrypted or single-use random bytes (defeating static string matching), appending a random number of random padding bytes to every packet (defeating length matching), and permitting a complete client–server conversation to be encoded in a single UDP or TCP packet (defeating timing analysis for sufficiently small payloads).

From 2011-wiley-dustDust: A Blocking-Resistant Internet Transport Protocol · §3, §3 Discussion · 2011 · University of Texas at Austin

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
dustrandomization

Extracted by claude-sonnet-4-6 — review before relying.