FINDING · DEFENSE

SWEET argues that mimicking complex protocols (SkypeMorph, CensorSpoofer, StegoTorus) is fundamentally breakable because comprehensive imitation of today's protocols is infeasible. The paper instead advocates tunneling inside genuine traffic from actual, widely-used protocol providers — in this case real email services — so the censor observes authentic protocol behavior rather than a simulation.

From 2013-zhou-sweetSWEET: Serving the Web by Exploiting Email Tunnels · §1 · 2013 · Hot Topics in Privacy Enhancing Technologies

Implications

Tags

techniques
dpitraffic-shapeml-classifier
defenses
tunnelingmimicry

Extracted by claude-sonnet-4-6 — review before relying.