Oddbean new post about | logout
 I’d have to read the source code but my guess is since it’s a protocol relying on specific ports and traffic patterns (like BitTorrent) it can be tracked with types of intelligent firewalls and dynamically blocked. 
 Interesting. 
 Makes sense. That would mean it's not a general tradeoff, but they made problematic design choices. 
 Likely if SimpleX sends the traffic over Tor or people in Russia used VPNs they might get around the blocks. But the latter would be a temp solution. 
 In the case of using Tor, their original statement would still be true, wouldn't it? By using Tor, you gain censorship resistance, but you lose privacy by exposing yourself as someone who uses Tor. 
 Fair point but given that the traffic is completely encrypted at least no one can read what you’re sending.  I’m sure there is a technical way to manage the traffic in a block-resistant fashion and maintain privacy at some level but as the SimpleX authors inferred that’s going to be an interesting challenge. 
 I suppose they're right to some extent, but I think it's possible. Interesting to watch anyway 
 UNLESS you're using an effective steganography system, such as OBFSProxy, which disguises your Tor traffic as something innocuous, such as the original option, plaintext XMPP packets. 

I'm not sure the state of this sort of technology as it's been over a decade since I've really looked at it, nor the state of DPI, as I suspect it's ultimately a cat and mouse game that you can never truly achieve perfection on, so there is always the looming risk that the security state is more potent than you realize until the jaws are closing around you.