The paper presents 11 purely server-side censorship evasion strategies requiring zero client-side software, successfully bypassing censorship in China, India, Iran, and Kazakhstan across DNS-over-TCP, FTP, HTTP, HTTPS, and SMTP. All strategies manipulate only TCP handshake packets (primarily the SYN+ACK) and were verified against 17 versions of 6 client operating systems (Windows XP–Server 2018, MacOS, iOS, Android, Ubuntu, CentOS) with unmodified clients.
From 2020-bock-come — Come as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion
· §1, §5, Table 2
· 2020
· SIGCOMM
Implications
Deploy server-side packet manipulation (e.g., via a Geneva-derived daemon) so censored users need no special software—eliminating bootstrapping friction and reaching users unaware of censorship.
Server-side evasion sidesteps the legal and operational risk of distributing client-side anti-censorship software inside censoring regimes.