FINDING · DETECTION

SkypeMorph and FreeWave both overlay a client-proxy communication model onto a peer-to-peer VoIP network; because Skype clients attempt direct peer contact before falling back to supernodes, initiating a call to a FreeWave proxy reveals its IP address directly to the caller, and proxy nodes accumulate user-to-bridge ratios that reached 8–12× in Syria/Iran and up to 120:1 in China (Figure 8), producing concentration signatures uncharacteristic of normal P2P call distributions. These architectural mismatches allow enumeration and fingerprinting attacks independent of traffic-content analysis.

From 2013-geddes-coverCover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention · §5, Figure 8 · 2013 · Computer and Communications Security

Implications

Tags

censors
cnirsy
techniques
active-probingtraffic-shape
defenses
mimicrybridges

Extracted by claude-sonnet-4-6 — review before relying.