FINDING · DETECTION

Prior circumvention transports that tunneled over VoIP or voice-conferencing software were identifiable to censors by their TCP retransmission fingerprint: real VoIP applications do not retransmit dropped packets in the same way, making the covert channel's reliability mechanisms a distinguishing artifact. DTLS and QUIC avoid this because they natively support both fault-tolerant and sequential delivery modes without external indicators of which mode is active.

From 2024-chen-extendedExtended Abstract: Oscur0: One-shot Circumvention without Registration · §2 The Case for UDP · 2024 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shapedpi
defenses
decoy-routingmimicry

Extracted by claude-sonnet-4-6 — review before relying.