Geneva's Segmentation species — fragmenting HTTP requests at the TCP layer without IP fragmentation, segment overlapping, or insertion packets — achieved 94–98% success against the GFW, 100% against India's Airtel ISP, and 100% against Kazakhstan's HTTPS MITM, making it the only strategy class effective across all three tested censors. These strategies require neither raw sockets nor root privilege.
From 2019-bock-geneva — Geneva: Evolving Censorship Evasion Strategies
· §5.2 Species 3: Segmentation
· 2019
· Computer and Communications Security
Implications
Implement TCP segmentation of HTTP/HTTPS payloads as a universal baseline evasion layer — it works across geographically and architecturally distinct censors and can be deployed from unprivileged application code.
Prefer evasion strategies that avoid insertion packets (which middleboxes may drop) and raw sockets (which require root) to minimize deployment friction and maximize reliability.