FINDING · EVALUATION

Asymmetric IP routing is a fundamental constraint on prior E2M designs: tier-2 ISPs typically see around 25% of packets on asymmetric paths, while tier-1 ISPs can have up to 90% of packets on asymmetric flows. Because Telex requires observing both directions of a connection to derive the client-server TLS master secret, this asymmetry severely constrains where it can be deployed. TapDance resolves this by using chosen-ciphertext steganography to leak the master secret from client to station in a single upstream packet, making it functional under fully asymmetric routing.

From 2014-wustrow-tapdanceTapDance: End-to-Middle Anticensorship without Flow Blocking · §1, §6 · 2014 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
tapdancetelexsteganography

Extracted by claude-sonnet-4-6 — review before relying.