The other strategy against DPI is the steganographic one: look like something the censor allows. fteproxy uses format-transforming encryption to encode data into strings that match a given regular expression, for example a regular-expression approximation of HTTP. StegoTorus transforms traffic to look like a cover protocol using a variety of special-purpose encoders. Code Talker Tunnel (formerly SkypeMorph) mimics a Skype video call. FreeWave encodes a stream as an acoustic signal and sends it over VoIP to a proxy. Dust uses encryption to hide static byte patterns and then shapes statistical features such as packet lengths and byte frequencies to match specified distributions.