FINDING · DEFENSE

The system targets a threat model where the censor performs passive DPI to fingerprint and block the client-to-TURN-proxy channel, and also conducts active enumeration attacks to discover and block proxy endpoints. The paper explicitly notes that traffic splitting may introduce distinct fingerprints of its own that require empirical evaluation — acknowledging that multi-path approaches are not fingerprint-free.

From 2025-vilalonga-extendedExtended Abstract: Using TURN Servers for Censorship Evasion · §3.1 Threat Model · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
cnir
techniques
dpiactive-probingtraffic-shape
defenses
webrtc-pluggablemimicry

Extracted by claude-sonnet-4-6 — review before relying.