Skip to main content
JS

Jackson Sippe

1episode
1podcast

We have 1 summarized appearance for Jackson Sippe so far. Browse all podcasts to discover more episodes.

Featured On 1 Podcast

All Appearances

1 episode

AI Summary

→ WHAT IT COVERS PhD researcher Jackson Sippe explains how China's Great Firewall deployed a passive, entropy-based detection algorithm from November 2021 to March 2023 to block fully encrypted proxy protocols used by millions of circumvention tool users, how his team reverse-engineered the pop count technique, and what countermeasures proxy developers implemented. → KEY INSIGHTS - **Pop Count Detection Threshold:** The GFW's blocking algorithm counts set bits per byte and flags traffic as encrypted when the ratio falls between 3.4 and 4.6 out of 8 bits — approximately 50% density. Understanding this exact threshold lets proxy developers craft payloads that deliberately fall outside this range, restoring connectivity without requiring protocol redesign. - **Bit-Stuffing Circumvention with 17% Overhead:** Proxy developers can defeat pop count detection by padding encrypted payloads with additional ones or zeros, keyed pseudorandomly to avoid pattern detection, then appending a few bytes encoding the removal count. This technique carries roughly 17.6% bandwidth overhead — tolerable given existing proxy layering costs — and is now implemented in ShadowSocks Rust and ShadowSocks Android. - **Emergency Header Prepending:** Before the full pop count solution was ready, researchers discovered that prepending the first four bytes of a standard TLS handshake to any fully encrypted payload bypassed GFW blocking immediately. Proxy developers received this finding in January 2022 as a rapid patch, restoring service while the more robust bit-stuffing approach was developed and validated. - **False Positive Rate Validation via University Traffic:** Researchers validated their reverse-engineered ruleset by running it against University of Colorado campus traffic — a population with no reason to use circumvention tools. The resulting 0.6% false positive rate was further reduced when most flagged packets proved to be torrent protocol traffic, which the GFW likely intended to block anyway. - **Protocol Fingerprint Exemptions Filter ~80% of Traffic First:** Before applying the computationally expensive entropy check, the GFW exempts traffic matching known protocol byte signatures — TLS alone accounts for roughly 80% of all traffic. Proxy developers can exploit this by prepending recognized protocol headers, and understanding this layered exemption architecture helps engineers predict which traffic patterns will trigger or bypass inspection. → NOTABLE MOMENT Researchers discovered that the GFW used its own HTTP traffic as a weapon against GitHub in 2015 — injecting JavaScript into every unencrypted request crossing the border to generate what became the largest denial-of-service attack ever recorded, simply because GitHub refused to block proxy-hosting pages. 💼 SPONSORS [{"name": "Recall.ai", "url": "https://recall.ai/software"}, {"name": "GuardSquare", "url": "https://www.guardsquare.com"}, {"name": "Retool", "url": "https://retool.com/se-daily"}] 🏷️ Great Firewall, Censorship Circumvention, Network Traffic Analysis, Proxy Protocols, Internet Censorship

Never miss Jackson Sippe's insights

Subscribe to get AI-powered summaries of Jackson Sippe's podcast appearances delivered to your inbox weekly.

Start Free Today

No credit card required • Free tier available