FINDING · DEFENSE

The paper proposes dividing public bridge addresses into 8 pools (n=3 bits from HMAC(identity-key, authority-secret)) each assigned a distinct distribution strategy: time-windowed release, IP-subnet-partitioned assignment, time+location combined, mailing-list rotation, email/CAPTCHA delivery, and social-trust delegation. Deploying all strategies concurrently forces the attacker to allocate resources across every channel simultaneously, making all strategies more robust than any single strategy deployed alone.

From 2006-dingledine-designDesign of a blocking-resistant anonymity system · §7.4, §7.8 · 2006 · The Tor Project

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
bridges

Extracted by claude-sonnet-4-6 — review before relying.