Prior circumvention transports that tunneled over VoIP or voice-conferencing software were identifiable to censors by their TCP retransmission fingerprint: real VoIP applications do not retransmit dropped packets in the same way, making the covert channel's reliability mechanisms a distinguishing artifact. DTLS and QUIC avoid this because they natively support both fault-tolerant and sequential delivery modes without external indicators of which mode is active.
From 2024-chen-extended — Extended Abstract: Oscur0: One-shot Circumvention without Registration
· §2 The Case for UDP
· 2024
· Free and Open Communications on the Internet
Implications
When mimicking VoIP or real-time media protocols, suppress or mask reliability-layer retransmission behavior — any retransmit pattern inconsistent with the cover protocol is a detectable fingerprint.
Prefer native UDP transports (DTLS, QUIC) over TCP tunnels wrapped in VoIP framing, as they can match the fault-tolerance profile of the cover protocol without leaking retransmission artifacts.