Seems like Geedge's TSG ("Great Firewall of China") relies on IP 5-tuples to identify traffic flows at its core? I'm wondering if an hypothtical "obfuscation" protocol could help blur the lines. For instance, something that disassambles/reassembles packets across multiple source and dest ports, and maybe even network interfaces/IPs(?) - that would make it trickier to monitor, though not impossible, but with the goal of decreasing the efficiency / relevance of TSG

#geedgenetworks