FINDING · DETECTION

Collage's threat model identifies the censor's two most dangerous capabilities as: (1) aggregate traffic-flow analysis (e.g., NetFlow statistics) to detect anomalous access patterns to specific content hosts, and (2) joining the system as a sender or receiver to discover content locations and mount denial-of-service or deniability attacks. The censor is assumed to monitor all egress traffic but is modeled as computationally limited against joint statistical distributions across arbitrary user pairs.

From 2010-burnett-chippingChipping Away at Censorship Firewalls with User-Generated Content · §3.1 · 2010 · USENIX Security Symposium

Implications

Tags

censors
cngeneric
techniques
traffic-shapeml-classifierdpi
defenses
steganographymimicry

Extracted by claude-sonnet-4-6 — review before relying.