Skip to content

Latest commit

 

History

History
19 lines (12 loc) · 1.55 KB

README.md

File metadata and controls

19 lines (12 loc) · 1.55 KB

Network Protocol Obfuscation Research

This repository helps organize research about the current state of network protocol obfuscation, particularly with regard to usability against active censors utilizing deep packet inspection (DPI) techniques.

If you have more research to add or notice outdated or wrong information please open a PR. The network protocol obfuscation landscape is constantly changing as the latest DPI techniques and obfuscation research chase each other.

Unique applications of obfuscation techniques may be required for different use cases. Below are notes on obfuscating specific protocols.

Project Obfuscation Technique(s) Obfuscation Quality
Tor Obfs4, Meek, FTE (all optional) Medium
Bitcoin Tor (optional, proxy + bitcoin hidden servers) Medium/Low
Grin Tor (optional, transactions only) Low

Note: Tor's "Obfuscation Quality" score is not in reference to the ability of Tor to obfuscate the data it is transporting, it is referencing the ability to obfuscate the fact that a packet flow is using the Tor protocol while using one of the available "Obfuscation Techniques"