FINDING · DEFENSE
SWEET argues that mimicking complex protocols (SkypeMorph, CensorSpoofer, StegoTorus) is fundamentally breakable because comprehensive imitation of today's protocols is infeasible. The paper instead advocates tunneling inside genuine traffic from actual, widely-used protocol providers — in this case real email services — so the censor observes authentic protocol behavior rather than a simulation.
From 2013-zhou-sweet — SWEET: Serving the Web by Exploiting Email Tunnels · §1 · 2013 · Hot Topics in Privacy Enhancing Technologies
Implications
- Prefer transporting circumvention payload inside real protocol implementations (actual TLS stacks, real email protocols) over hand-crafted mimicry of those protocols, since behavioral divergence is detectable.
- Select cover channels that are run by large third-party providers (Gmail, Yahoo Mail) so the censor cannot distinguish circumvention traffic from millions of legitimate users of that service.
Tags
Extracted by claude-sonnet-4-6 — review before relying.