FINDING · DETECTION
The GFW detects fully encrypted protocols using ad-hoc rules including the percentage of printable ASCII characters per packet (threshold: over 50%) and the observation that FEP entropy is considerably higher than normal encrypted TLS traffic. These rules are subject to frequent changes, making rigid FEP designs unable to adapt.
From 2025-wilson-extended — Extended Abstract: Shaperd: Easily Adoptable Real-Time Traffic Shaper for Fully Encrypted Protocols · §1 · 2025 · Free and Open Communications on the Internet
Implications
- Design FEPs or their wrappers to dynamically match printable-ASCII ratios and entropy profiles of legitimate TLS traffic, not just randomize payloads.
- Build rule-updating mechanisms into circumvention tools (analogous to how bridge distribution works) so detection-evading constraints can be pushed to clients without requiring software updates.
Tags
Extracted by claude-sonnet-4-6 — review before relying.