DEFENSES
bridges Bridges / private relays
Unlisted relays a censored client connects to first; Tor bridges, Snowflake bridges, etc.
15 PAPERS ON FILE
- 2025-rodriguez-revisiting Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks
- 2025-sharma-cenpush CenPush: Blocking-Resistant Control Channel Using Push Notifications
- 2023-fifield-running Running a high-performance pluggable transports Tor bridge
- 2023-tulloch-lox Lox: Protecting the Social Graph in Bridge Distribution
- 2019-nasr-enemy Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory
- 2018-dunna-analyzing Analyzing China's Blocking of Unpublished Tor Bridges
- 2017-matic-dissecting Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
- 2016-fifield-censors Censors' Delay in Blocking Circumvention Proxies
- 2013-wang-rbridge rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation
- 2013-winter-towards Towards a Censorship Analyser for Tor
- 2012-ling-extensive Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
- 2012-moghaddam-skypemorph SkypeMorph: Protocol Obfuscation for Tor Bridges
- 2012-winter-great How the Great Firewall of China is Blocking Tor
- 2011-smits-bridgespa BridgeSPA: Improving Tor Bridges with Single Packet Authorization
- 2006-dingledine-design Design of a blocking-resistant anonymity system