FINDING · DEFENSE

DPI boxes used for censorship do not rely solely on simple regular expressions but also employ context-sensitive languages for protocol identification. The paper notes that precise knowledge of these DPI patterns could be fed directly into format-transforming encryption to enable targeted protocol misidentification.

From 2013-winter-towardsTowards a Censorship Analyser for Tor · §5 · 2013 · Free and Open Communications on the Internet

Implications

Tags

techniques
dpi
defenses
format-transformpluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.