FINDING · EVALUATION
Evasion strategies are strongly censor-specific: TCB Teardown strategies that achieve 80–96% against the GFW fail completely (0%) against Kazakhstan's HTTPS MITM; India's Airtel is defeated uniquely by a 'Stutter Request' (duplicating the PSH/ACK and replacing IP length to 64) at 100% success, which scores only 3% against the GFW. Geneva converged on distinct species for each censor within 4–8 hours of live training.
From 2019-bock-geneva — Geneva: Evolving Censorship Evasion Strategies · Table 1, §5.1–5.4 · 2019 · Computer and Communications Security
Implications
- Do not assume a strategy effective in one country will transfer — deploy per-region strategy profiles and run automated retraining when blocking events are detected.
- Maintain a live genetic training pipeline so circumvention tools can evolve new strategies within hours of a censor updating its DPI implementation.
Tags
Extracted by claude-sonnet-4-6 — review before relying.