FINDING · DETECTION
Protocol mimicry approaches (SkypeMorph, StegoTorus, CensorSpoofer) do not execute the target protocol in full and leave detectable discrepancies: SkypeMorph fails to replicate Skype's TCP handshake, and CensorSpoofer's IP-spoofing downstream channel enables active traffic analysis by censors who can inject manipulated packets and observe whether the purported VoIP endpoint reacts. The authors state that morphing approaches provide no provable indistinguishability, and protocol evolution further invalidates mimicry over time.
From 2013-houmansadr-i — I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention · §IX / §X · 2013 · Network and Distributed System Security
Implications
- Run the full target cover protocol stack (complete TLS negotiation, real VoIP codec frames, authentic TCP handshake) rather than shaping or morphing; partial imitation leaves fingerprints that improve as censors invest in deeper classifiers.
- Avoid out-of-band upstream channels (IP spoofing, steganographic email) that create asymmetric traffic patterns exploitable via active probing — a censor can manipulate the supposed VoIP call and detect whether the server responds in a way inconsistent with a real call.
Tags
Extracted by claude-sonnet-4-6 — review before relying.