FINDING · DEFENSE
Known attacks on existing circumvention tools include steganographic detection, enumeration of decoy-router locations, and machine-learning traffic classifiers. The paper acknowledges these defeat current approaches (Infranet, Collage, Telex, SkypeMorph, Freewave) and argues that no iterative patch can neutralize the censor's long-term structural advantage.
From 2014-tan-censorship — Censorship Resistance as a Side-Effect · §1 · 2014 · Security Protocols
Implications
- Protocol mimicry and steganography alone are not sufficient long-term defenses; the censor can apply ML classifiers and steganographic detectors that evolve faster than individual transports.
- Pair traffic-shaping or mimicry with a deployment strategy that maximizes political blocking cost, since technical obfuscation without adoption leverage is a losing arms-race position.
Tags
Extracted by claude-sonnet-4-6 — review before relying.