FINDING · DETECTION

Censors responding to encryption-based circumvention have two escalation options: block all encrypted connections outright, or identify the underlying protocol via traffic signatures that persist even inside encrypted tunnels. The paper frames these as the two dominant censor responses to DPI being defeated by encryption.

From 2011-wright-fine-grainedFine-Grained Censorship Mapping: Information Sources, Legality and Ethics · §3 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
dpirandom-payload-detecttraffic-shape
defenses
mimicryrandomization

Extracted by claude-sonnet-4-6 — review before relying.