FINDING · DETECTION

The paper's threat model explicitly assumes censors can enforce client-side VoIP software (e.g., TOM-Skype in China) giving the adversary access to the pre-encoding audio signal at both endpoints. Despite this, SkypeLine forces the censor into an all-or-nothing position: intercepting hidden data requires blocking the entire VoIP service, since no network-layer observable (packet headers, timing, encrypted payload) distinguishes steganographic from legitimate calls.

From 2016-kohls-skypelineSkypeLine: Robust Hidden Data Transmission for VoIP · §3.1, §6.1 · 2016 · ASIA Computer and Communications Security

Implications

Tags

censors
cn
techniques
dpitraffic-shape
defenses
steganography

Extracted by claude-sonnet-4-6 — review before relying.