Alice is an employee of Chris, and Chris does heavy traffic monitoring via its company proxy.
Alice wishes to use a Bob's web service while preserving privacy and confidentiality. She has full control over a miner
machine which is reachable from the Chris' company network.
Will Chris be able to distinguish SSH SOCKS proxy traffic on port 443 from a "usual" (unremarkable and mostly ignored by Chris' monitoring systems) HTTPS over the same port and IP pair? If so, how drastic are the detectable differences? Assume arbitrary power of the monitoring systems.