FINDING · DEFENSE
Telex embeds steganographic tags in TLS ClientHello nonces using elliptic-curve Diffie-Hellman, placing proxy stations at ISP level on paths between the censor's network and popular uncensored destinations. Because the cover destinations are ordinary popular HTTPS websites, the censor cannot block Telex without simultaneously blocking a large class of legitimate TLS traffic — converting the censor's own reluctance to over-block into an unblockability guarantee.
From 2011-wustrow-telex — Telex: Anticensorship in the Network Infrastructure · §2, §4 · 2011 · USENIX Security Symposium
Implications
- Design circumvention systems around cover destinations whose blocking would impose unacceptable collateral damage on the censor, rather than dedicated proxy IPs that can be enumerated and blacklisted.
- Place proxy infrastructure in-path at ISP transit points rather than at edge servers; this eliminates the IP-based discovery and blocking that defeats Tor bridges and conventional VPNs.
Tags
Extracted by claude-sonnet-4-6 — review before relying.