Facade routes all encoded HTTP requests through a Selenium-controlled Chrome browser instance, so every message the censor observes is generated by a real browser implementation. This defeats 'parrot attack' fingerprinting, which exploits discrepancies between a protocol emulator's responses to error conditions and those of the genuine client or server.
From 2014-jones-facade — Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search
· §4, §5.1
· 2014
· Free and Open Communications on the Internet
Implications
Protocol-mimicry transports must tunnel traffic through actual reference implementations (real browsers, real TLS stacks) rather than custom reimplementations; hand-rolled emulations are detectable by active probing of error and edge-case behavior.
Evaluate circumvention tools against active fingerprinting test suites that send malformed or unexpected HTTP messages and compare responses to a genuine browser baseline before deployment.