FINDING · DETECTION

Protocol imitation systems (SkypeMorph, CensorSpoofer, StegoTorus) fail to achieve unobservability because they implement the target protocol only partially, creating statistical discrepancies that censors can detect. Houmansadr et al. (2013) demonstrated this as a fundamental flaw: unobservability by imitation is categorically insufficient as a circumvention design principle.

From 2016-zarras-leveragingLeveraging Internet Services to Evade Censorship · §1, §6 · 2016 · Information Security Conference

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
mimicry

Extracted by claude-sonnet-4-6 — review before relying.