Indistinguishability Attacks
Making censorship traffic mathematically and behaviorally identical to allowed traffic.
strategy
Concept: Making censorship traffic mathematically and behaviorally identical to allowed traffic.
Technique: Mimicking the exact packet cadence, size, and handshake of popular services (e.g., Zoom calls, Microsoft Teams, or standard HTTPS traffic).
Goal: The censor cannot block you without blocking the legitimate service (e.g., breaking all Zoom calls in the country).