FINDING · EVALUATION

In 24-hour live proxy deployments, covertDTLS mimicry had a 18.2% DTLS handshake failure rate (vs 12.5% baseline, 27.0% randomization, 25.8% Chrome webextension). Randomization generates ≈994 billion unique fingerprint permutations (cipher shuffling: 109,600; extension shuffling: 994,218,624,000), making blocklist-based fingerprinting infeasible, but at the cost of higher connection failures due to cipher mismatches. Mimicry of DTLS 1.2 was stable and effective; DTLS 1.3 mimicry is not yet achievable with the current Pion library.

From 2025-midtlien-fingerprint-resistantFingerprint-resistant DTLS for usage in Snowflake · §4.2, Table 1, §5 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
tls-fingerprint
defenses
webrtc-pluggablerandomizationmimicry

Extracted by claude-sonnet-4-6 — review before relying.