When using a domestic email provider that collaborates with the censor (DomesticMail), SWEET clients must embed tunneled data via steganography (image or text) and coordinate a secondary secret email account with the SWEET server out-of-band. This prevents the censor from discovering the SWEET server association via recipient-field inspection, but adds operational complexity and requires an out-of-band bootstrapping channel.
From 2013-zhou-sweet — SWEET: Serving the Web by Exploiting Email Tunnels
· §3
· 2013
· Hot Topics in Privacy Enhancing Technologies
Implications
Any circumvention design that must operate through a censor-colluding domestic provider needs both payload steganography and an out-of-band credential-sharing mechanism — two independent security requirements that must both hold.
Favor non-domestic cover providers where possible; reserve steganographic approaches for adversarial environments where all providers are compromised, and document the added complexity cost.