FINDING · DEFENSE

Facade routes all encoded HTTP requests through a Selenium-controlled Chrome browser instance, so every message the censor observes is generated by a real browser implementation. This defeats 'parrot attack' fingerprinting, which exploits discrepancies between a protocol emulator's responses to error conditions and those of the genuine client or server.

From 2014-jones-facadeFacade: High-Throughput, Deniable Censorship Circumvention Using Web Search · §4, §5.1 · 2014 · Free and Open Communications on the Internet

Implications

Tags

censors
cngeneric
techniques
active-probingtls-fingerprint
defenses
mimicrypluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.