FINDING · DEFENSE

Known attacks on existing circumvention tools include steganographic detection, enumeration of decoy-router locations, and machine-learning traffic classifiers. The paper acknowledges these defeat current approaches (Infranet, Collage, Telex, SkypeMorph, Freewave) and argues that no iterative patch can neutralize the censor's long-term structural advantage.

From 2014-tan-censorshipCensorship Resistance as a Side-Effect · §1 · 2014 · Security Protocols

Implications

Tags

censors
generic
techniques
ml-classifiertraffic-shapedpi
defenses
steganographydecoy-routingmimicrymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.