Concepts
High-level strategies for surviving strict censorship environments.
Adaptive & Learning Transports
Protocols that mutate to survive.
Collateral Freedom (Economic Hostages)
Routing traffic through essential infrastructure that the government relies on.
Decoy Routing (Refraction Networking)
A theoretical/research approach where the network infrastructure itself helps the user.
The Hard Truth
High-level concept: The Hard Truth.
Indistinguishability Attacks
Making censorship traffic mathematically and behaviorally identical to allowed traffic.
Multimedia Covert Channels
Carry data inside media-like traffic such as video calls, streams, or games.
Probe-Resistance Through Deniability
Design systems that look innocent under active probing unless a shared secret or proof is presented.
Refraction & Decoy Routing Evolutions
Newer refraction and decoy-routing variants and the realities of deployment at ISP scale.