FINDING · DEFENSE

CovertCast uses the identical video codecs, streaming protocols (RTMP/HTTPS), and server endpoints as any other YouTube live stream, making it indistinguishable from regular streaming traffic to both passive protocol-analysis and active traffic-manipulation attacks. Any active attack that disrupts CovertCast connections — such as selective packet dropping — would equally disrupt all non-circumvention viewers of the same streaming service, imposing prohibitive collateral damage.

From 2016-mcpherson-covertcastCovertCast: Using Live Streaming to Evade Internet Censorship · §7.4, §7.5, §7.6 · 2016 · Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
dpiactive-probingtraffic-shape
defenses
tunnelingmimicry

Extracted by claude-sonnet-4-6 — review before relying.