FINDING · DETECTION

Flash proxy tunnels carry inherent network-level fingerprints that survive application-layer obfuscation: WebSocket connections begin with a plaintext HTTP upgrade handshake followed by structured binary framing, and Flash socket connections open with a crossdomain XML policy request — both are distinguishable from ordinary TCP by a DPI middlebox.

From 2012-fifield-evadingEvading Censorship with Browser-Based Proxies · §5.1 · 2012 · Privacy Enhancing Technologies Symposium

Implications

Tags

techniques
tls-fingerprintdpi
defenses
pluggable-transportmimicry

Extracted by claude-sonnet-4-6 — review before relying.