Indistinguishability Attacks

Making censorship traffic mathematically and behaviorally identical to allowed traffic.

strategy

Concept: Making censorship traffic mathematically and behaviorally identical to allowed traffic.

Technique: Mimicking the exact packet cadence, size, and handshake of popular services (e.g., Zoom calls, Microsoft Teams, or standard HTTPS traffic).

Goal: The censor cannot block you without blocking the legitimate service (e.g., breaking all Zoom calls in the country).

AstralSync Research