FINDING · DEFENSE

The proposed framework operates as a transparent shim between application and network layers, enforcing a configurable schedule over packet size, timing, and burst patterns. The shaping logic is transport-agnostic — applicable across TCP, UDP, QUIC, and TLS — and activates only after the underlying protocol handshake completes, making it reusable across heterogeneous circumvention stacks.

From 2025-pereira-extendedExtended Abstract: Traffic Shaping for Network Protocols: A Modular and Developer-Friendly Framework · §2.1 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shapedpi
defenses
randomizationmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.