Hello everyone,
I am currently developing a new Pluggable Transport called mimicry-pt.
Motivation and Background:
Modern censorship systems like the Great Firewall (GFW) identify and block such “randomized” traffic in real time. Simply “making nothing visible” is not an effective strategy for circumventing sophisticated and persistent censorship.
(Reference: How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic )
I believe the next evolution will be “mimicry”—that is, making Tor traffic appear as legitimate and essential services like YouTube, Zoom, and WeChat. In some censored areas, access to these services is maintained because completely blocking them would result in serious socioeconomic damage.
My project, “mimicry-pt,” uses an LSTM model to replicate the statistical distribution of packet size and timing to counter modern DPIs. While the current prototype focuses on YouTube, the model can be trained to mimic any high-traffic protocol.
Overview:
The goal of this project is to counter advanced traffic classification by using LSTM (Long Short-Term Memory) models to shape Tor traffic. Unlike existing transports that focus on obfuscation, mimicry-pt shapes the packet timing and size distributions to statistically match a “cover” identity, such as YouTube video streaming or browser games.
Key Technical Details:
Traffic Shaping: It generates a (delay, size) scenario based on an LSTM model trained on real-world traffic.
Statistical Similarity: Achieves a Wasserstein divergence of <25% for YouTube covers.
Active-Probing Defense: The bridge serves a decoy HTML page to unauthorized requests.
Implementation: The client is written in pure Python (stdlib only) for maximum portability while the bridge uses PyTorch for inference.
Current Status:
This is currently a research prototype. It has been tested and verified within a local Chutney network, but it has not been deployed or tested on the live Tor network yet.
Next Steps:
I am planning to:
Integrate uTLS for realistic TLS fingerprinting.
Optimize upload throughput (currently limited by the YouTube cover’s natural POST frequency).
Formalize the PT API for easier integration with Tor.
I’ve made the repository public today and would love to get feedback, critiques, or suggestions from the anti-censorship team and the wider community.
**Future Potential:**Even in a future where quantum computers can decrypt TLS traffic, the sheer volume of legitimate “cover” traffic makes analyzing every connection computationally and economically impossible. Removing “suspicious” markers from Tor traffic would present censors with a “find the needle in a haystack” difficulty, and the cost of targeted analysis would be prohibitively high.
GitHub Repository: https://github.com/SilentWavesCore/mimicry-pt
Best regards,
SilentWaves



