pull down to refresh

Traditional VPN protocols (such as OpenVPN, IKEv2, and WireGuard) are relatively easy to recognize on a network. And as deep packet inspection (DPI) technology becomes more widespread, it will be easier and easier for authoritarian detect and block VPNs using these protocols.
How does Stealth solve that?
Is it like DoH and masks itself as HTTPS traffic? If so, is that really the definitive solution to all protocols that want to be censorship resistant? Seems lazy and shortsighted if that is the case.
And even the initial https connection leaks the IP address it is connecting to which in case of proton is easily identifiable by authorities as a VPN provider.
How do they get around that issue? Do they routes the last mile traffic using tor or i2p? If so, how reliable is that? Or do they use their own tor like anonymity routing? But doesnt that cause it's own problems since the smaller you are the more you stand out from the crowd.
Finally, is there any known case of wireguard being censored? Is there really a need for a another competing VPN protocol?