SSH transfers utilized only 15% of available bandwidth versus 85–89% for HTTP/HTTPS. When SSH was obfuscated by XORing payloads with a constant key (hiding the plaintext handshake), throughput dropped to near-zero during all trials. Applying the same obfuscation to HTTP transfers produced the same near-zero result, supporting the hypothesis that Iran whitelists known-approved protocols rather than blacklisting specific ones, which would preemptively block any unrecognized or randomized transport including Tor's obfsproxy.
From 2013-aryan-internet — Internet Censorship in Iran: A First Look
· §4.4
· 2013
· Free and Open Communications on the Internet
Implications
A protocol whitelist model means that entropy-based obfuscation alone is insufficient — transports must convincingly mimic an allowlisted protocol (HTTP, TLS, QUIC) rather than just randomizing traffic.
Designers should test candidate transports against the whitelist hypothesis by measuring whether fully opaque, non-mimicking byte streams are throttled independently of any specific protocol signature.