FINDING · DETECTION

Under a threat model granting the censor universal inspection of server communications and processing logs — with only the server's signing key withheld — data-replication systems (Freenet, Gnutella, Eternity Service) and anonymous-communication systems (Free Haven, Serjantov's scheme) all achieve censorship susceptibility of 1. Because document names are publicly known, a censor with full server visibility can selectively drop any targeted query without disrupting access to other documents.

From 2005-perng-censorshipCensorship Resistance Revisited · §4 · 2005 · International Conference on Information Hiding

Implications

Tags

censors
generic
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.