FINDING · DEFENSE

The paper formally defines circumvention as either preventing the trigger from being seen by the surveillance device, or countering the effects of the censoring action. This two-path decomposition — hide the trigger vs. nullify the enforcement — provides a clean design framework: a circumvention tool can succeed by making traffic unrecognizable (no trigger fires) or by routing around the blocking device (action nullified).

From 2015-aceto-internetInternet Censorship detection: A survey · §2.1 · 2015 · Computer Networks

Implications

Tags

techniques
dpikeyword-filtering
defenses
mimicrytunnelingrandomization

Extracted by claude-sonnet-4-6 — review before relying.