FINDING · DEFENSE

The paper proposes using CAPTCHAs (hard AI problems) to gate forwarder-list access, forcing the blocker to expend human resources solving every puzzle while each blockee solves only one. However, a 'stealing cycles from humans' attack allows a censor to relay CAPTCHAs to unwitting third parties (e.g., visitors to an attacker-operated website) who solve them on the censor's behalf.

From 2004-k-psell-achieveHow to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing · §5.3 · 2004 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
genericcn
techniques
ip-blocking
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.