Obfuscation: how easy is it to bypass it and discover you're using NordVPN?

Everything is in the title.

It seems to be a 50/50 chance that whatever obfuscated server I’m using gets caught out.

Works more often than their competitors, but I’ve drastically reduced my overall use of the program (except on linux, cause the dev team for linux is on point)

It doesn’t hide the ip you are connected to, which can be looked up. You have to connect to an server to use a vpn over the internet which will have an ip, or you couldn’t connect to it.

And as for the traffic if someone is watching the packet flow for your device’s LAN ip they would see a noticeable difference in the pattern compared to traffic without the tunnel. They wouldn’t even necessarily have to know why, they would notice something is significantly different and might look into it.

Obfuscation is more for punching through basic firewall rules. Perhaps only default web traffic ports are allowed out of your network by the firewall, such as port 443 and port 53. Obfuscation would likely used those ports and wrap the tunnel packets with https +tls to make it appear like web traffic to the firewall.

Test it for yourself if you want. Wireshark is a common packet capture program. Just start a capture before using the vpn, go to any https website, then turn on the vpn and you’ll see the difference for yourself while the packets flow. One thing that often jumps out right away is it all starts going to and from 1 ip (which might not be the case anymore, it’s been a while since I looked into it, which is why it’s better to test yourself on your own device too if you can).

Recently it has been working fine. But sometimes it stops working on many streaming services for days or weeks I have no idea how or why

All I want is to watch The Office from American soil…smh