CloudTransport achieves 'entanglement' by using the exact same cloud-client libraries, protocols, and network servers as legitimate cloud storage applications, making it immune to protocol-discrepancy detection that defeated imitation systems like SkypeMorph. Iranian censors blocked Tor by exploiting differences in Diffie-Hellman moduli between genuine SSL and Tor's SSL and the expiration dates of Tor's SSL certificates; CloudTransport has no such discrepancies because it is not an imitation. Simple line-speed tests based on tell-tale differences in protocol headers or public keys cannot be used to recognize CloudTransport.
From 2014-brubaker-cloudtransport — CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
· §4.1
· 2014
· Privacy Enhancing Technologies Symposium
Implications
Use a real, unmodified cloud storage SDK rather than any reimplementation — any hand-rolled protocol clone introduces discrepancies that line-speed DPI can detect, as demonstrated against SkypeMorph and Tor.
Prefer 'hide-within' architectures over protocol mimicry: actually running the permitted protocol rather than imitating it eliminates an entire class of fingerprinting and active-probing attacks.