Evasion
The countermeasure side. obfs lineage, domain fronting, Reality / Hysteria, decoy routing, traffic shaping for camouflage. Cat and mouse.
7 of 7 modules published
Pluggable transports: the obfs lineage
obfs4, meek, Snowflake, and the history of transport-layer evasive design as adversaries moved from passive filtering to active probing.
Domain fronting: the rise, fall, and remnant
How domain fronting exploited cross-layer naming, why it changed the economics of blocking, and why the classic form largely receded after 2018.
TLS-in-TLS and Reality
TLS camouflage, secret-gated fallback, and why looking like HTTPS is harder than just using HTTPS.
Hysteria and QUIC-based transports
Why QUIC became an evasive substrate, how Hysteria uses it, and what QUIC-based camouflage still leaks to modern detectors.
Decoy routing and refraction networking
Telex, TapDance, Slitheen, and Conjure: how cooperative infrastructure on ordinary network paths changes the evasion game.
Traffic shaping for camouflage
How burst scheduling, half-duplex shaping, and target-traffic mimicry try to make tunnels look like something else.
Operational anonymity for engineers
Compartmentation, browser discipline, transport choice, telemetry minimization, and how to turn anonymity theory into a survivable daily operating model.
Need this curriculum applied to your network?
Custom training, downloadable companion assets, network architecture review, and on-call deployment help land inside our consulting engagements.
See engagements