Censorship Resistance

Bypass Internet Censorship with 6 Steganographic Covert Channels

Invisible to DPI. Invisible to censors.

In dozens of countries around the world, governments actively monitor, filter, and block internet communications. OSHI takes a fundamentally different approach. Instead of just encrypting your messages, OSHI hides the fact that you are communicating at all, using six independent steganographic covert channels that disguise your messages as ordinary internet traffic.

Channels
6 independent
Max Stealth
9 / 10
DPI Bypass
Yes
Multi-Channel Spread
Yes
Censorship Resistance

Hide messages in normal web traffic.

6 independent channels. Statistically indistinguishable. Your messenger traffic simply doesn't exist.

What is Steganography?

Steganography is the ancient art of hiding messages in plain sight. The word comes from the Greek words "steganos" (covered) and "graphein" (to write). Unlike encryption, which makes a message unreadable but visibly present, steganography conceals the very existence of the message. A censor looking at steganographic communication sees only normal, innocuous data: a regular web page load, a DNS query, a JPEG image, or an audio file. The hidden message is embedded within this carrier data in a way that is statistically indistinguishable from legitimate content.

The distinction between encryption and steganography is critical in censorship contexts. Encryption protects the content of your communication, but it cannot hide the fact that encrypted communication is taking place. Deep Packet Inspection (DPI) systems deployed by governments in China, Russia, Iran, Egypt, and many other countries can identify encrypted messaging traffic by its protocol signatures, packet sizes, and timing patterns, even without reading the actual content. Once identified, the traffic is simply blocked. Steganography defeats this approach entirely.

Why Encryption Alone Is Not Enough

Consider the threat model faced by a journalist in a country with aggressive internet censorship. They install Signal or WhatsApp and enable end-to-end encryption. Their messages are unreadable to the government. Problem solved? Not even close.

The government DPI system detects Signal protocol traffic leaving their device. Even though it cannot read the messages, it logs the fact that this person is using an encrypted messenger, when they use it, how much data they send, and the IP addresses they connect to. This metadata alone is enough to identify dissidents, map their social networks, and target them for arrest. In the worst case, the government simply blocks all Signal traffic at the network level, making the app useless.

OSHI covert channels solve this problem at its root. Instead of sending recognizable encrypted traffic, OSHI disguises your communication as normal web browsing, DNS queries, or other mundane internet activity. The DPI system sees nothing unusual. There is no encrypted messenger traffic to block because there is no encrypted messenger traffic, only what appears to be regular internet usage.

OSHI 6 Covert Channels

HTTP Header Steganography

This channel hides encrypted message data inside standard HTTP headers that accompany every web request. OSHI encodes your message fragments as Google Analytics cookies, ETags, tracking parameters, and other headers that are present in billions of legitimate web requests every day. To any network observer or DPI system, the traffic looks identical to a normal visit to a website with analytics tracking.

Stealth 8/10

DNS Tunneling

DNS is one of the most fundamental internet protocols, and it is almost never blocked. OSHI exploits this by encoding encrypted message data into DNS subdomain queries. Your message is split into fragments and sent as a series of DNS lookups for seemingly random subdomains. Network monitors see only routine DNS traffic.

Stealth 6/10

Domain Fronting

Domain fronting exploits the way TLS encryption works with CDNs. When OSHI sends a message using domain fronting, the TLS handshake shows a connection to an allowed CDN domain (such as cloudfront.net), but the actual HTTP request inside the encrypted tunnel is routed to the OSHI relay server. The censor sees only a connection to a legitimate, high-traffic CDN.

Stealth 9/10

Web Mimicry

Web mimicry makes OSHI traffic look identical to common web browsing patterns. OSHI implements five distinct mimicry strategies: Google search result page loads, analytics beacon transmissions, HTML form submissions, REST API calls, and image request sequences. Each strategy replicates the exact traffic pattern, header structure, timing, and payload size of its legitimate counterpart.

Stealth 9/10

Image Steganography

Image steganography hides encrypted data within the pixel data of ordinary photographs. OSHI uses advanced embedding algorithms that modify the least significant bits of image pixel values to encode message data. The modifications are so subtle that they are invisible to the human eye and statistically undetectable by analysis tools.

Stealth 7/10

Text Steganography

Text steganography hides messages within seemingly normal text using three complementary techniques: zero-width Unicode characters inserted between visible letters, homoglyph substitution (replacing regular characters with visually identical Unicode alternatives), and whitespace encoding. A message hidden with text steganography looks like an ordinary text message, email, or social media post.

Stealth 8/10

Who Needs Covert Channels

OSHI covert channels are designed for people whose safety depends on the ability to communicate privately and undetectably.

Journalists and Media Workers

Journalists operating in countries with press restrictions need to communicate with sources, editors, and colleagues without revealing that they are using encrypted communication. OSHI covert channels ensure that even if the device network traffic is monitored, there is no evidence of secure messaging activity.

Human Rights Activists

Activists working to document human rights abuses often operate under direct surveillance by state security services. The act of using an encrypted messenger can itself be grounds for detention in many countries. OSHI covert channels allow activists to coordinate, share evidence, and communicate with international organizations while their internet traffic appears to consist entirely of normal web browsing.

Citizens Under Surveillance

In countries with mass surveillance programs, ordinary citizens may need covert communication for legitimate purposes that the government considers suspicious. OSHI gives these individuals the ability to communicate without creating any observable evidence of private communication.

Travelers in Restrictive Countries

Business travelers and tourists visiting countries with internet censorship often find their usual communication tools blocked or monitored. OSHI covert channels ensure travelers can maintain secure communication with family, colleagues, and emergency contacts regardless of local network restrictions.

No Other Messenger Has This

OSHI is unique in the messaging landscape in offering steganographic covert channels. Here is how it compares to other privacy-focused messengers:

FeatureOSHISignalBriarSession
End-to-End EncryptionYesYesYesYes
Steganographic Channels6 channelsNoneNoneNone
Censorship Bypass6 methodsDomain fronting onlyTor bridgesOnion routing
Mesh NetworkingYesNoYes (Android)No
Traffic IndistinguishableYesNoNoNo
Works Under DPIYesPartiallyPartiallyPartially
iOS NativeYesYesNoYes

No other messenger provides the combination of multiple independent steganographic channels, mesh networking for offline communication, and IPFS/Tor delivery for online communication. OSHI does not just encrypt your messages; it makes your entire communication activity invisible to anyone monitoring the network.

Important Legal Disclaimer

OSHI covert communication features are designed to protect freedom of expression and personal safety in regions where basic human rights are at risk. These tools are intended for journalists, human rights activists, political dissidents, and civilians in conflict zones. The use of covert channels is subject to the laws of your jurisdiction. Users are solely responsible for ensuring compliance with local regulations. This technology is not intended for illegal activities.

Communicate Without Being Detected

Download OSHI and access 6 steganographic covert channels. Free, open source, and built for privacy.

Download OSHI Free