FINDING · DEFENSE

CloudTransport achieves 'entanglement' by using the exact same cloud-client libraries, protocols, and network servers as legitimate cloud storage applications, making it immune to protocol-discrepancy detection that defeated imitation systems like SkypeMorph. Iranian censors blocked Tor by exploiting differences in Diffie-Hellman moduli between genuine SSL and Tor's SSL and the expiration dates of Tor's SSL certificates; CloudTransport has no such discrepancies because it is not an imitation. Simple line-speed tests based on tell-tale differences in protocol headers or public keys cannot be used to recognize CloudTransport.

From 2014-brubaker-cloudtransportCloudTransport: Using Cloud Storage for Censorship-Resistant Networking · §4.1 · 2014 · Privacy Enhancing Technologies Symposium

Implications

Tags

techniques
dpitls-fingerprint
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.