FINDING · DEFENSE

Camoufler defeats active probing of its server endpoints by keeping server IM IDs private (shared only out-of-band with trusted clients) and configuring the server to respond only to those trusted IDs. An adversary systematically probing IM IDs to find Camoufler servers would receive no response from the server, making enumeration futile. When E2M-encrypted IM providers could collude with a censor, an additional application-layer key exchange (DH with RSA-wrapped ephemeral key, AES-256, PFS via key deletion) prevents the provider from revealing plaintext even under coercion.

From 2021-sharma-camouflerCamoufler: Accessing The Censored Web By Utilizing Instant Messaging Channels · §5.2 · 2021 · Asia CCS

Implications

Tags

censors
generic
techniques
active-probingdpi
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.