FINDING · DEFENSE

Rook constructs per-field symbol tables by observing 600 packets (~60 seconds) of real gameplay at session start, then restricts substituted values to only those previously observed with frequency within two orders of magnitude of the median. This ensures altered packets never contain field values that are absent or anomalously rare in legitimate traffic, defeating value-anomaly and out-of-range DPI filters.

From 2015-vines-rookRook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform · §2.6 · 2015 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
generic
techniques
dpirandom-payload-detect
defenses
steganography

Extracted by claude-sonnet-4-6 — review before relying.