Dagster achieves censorship resistance on a single server — without geographic replication — by cryptographically intertwining legitimate and illegitimate data into a directed acyclic graph. Each new block XORs the publisher's content with c pre-existing blocks before encrypting with a fresh key, so removing any one block destroys the decodability of every block that later links to it. This creates a legal constraint: a censor cannot excise a censorable block without simultaneously destroying an unknown number of legally protected blocks that depend on it.
From 2001-stubblefield-dagster — Dagster: Censorship-Resistant Publishing Without Replication
· §1, §3.1, §5.5
· 2001
· Rice University
Implications
Design censorship-resistant stores so that sensitive and benign content share cryptographic dependencies — a censor attacking one payload must provably destroy protected content, raising the legal cost of interference.
Single-server deployment can satisfy anti-censorship goals if the dependency graph is maintained; replicate for availability, not as the primary censorship defense.