←back to thread

62 points ArinaS | 2 comments | | HN request time: 0.464s | source
1. userbinator ◴[] No.43686472[source]
The obvious follow-up is to then put a (possibly obfuscated) TLS connection in the request and response bodies, creating another tunneling method.
replies(1): >>43700103 #
2. majorchord ◴[] No.43700103[source]
This is already being done, but the GFW can detect even some pretty clever obfuscation attempts, they even look at TCP timings and all kinds of things you might not think about. Even if the inner traffic is completely encrypted, there are other ways to tell with a degree of probability that the connection is likely a tunnel, and they'll block it.