FINDING · DEFENSE

In invitation-based proxy networks (modeled on Psiphon's trust-tree), a single adversary can invite fake accounts as children in the trust tree, multiplying the effective adversary count k and invalidating sublogarithmic key budgets. For k=1 adversary on a trust tree of depth O(log n), an O(log n)-key algorithm exists by keeping the 'suspicious group' always rooted at a subtree boundary; for k>1 this remains an open problem.

From 2010-mahdian-fightingFighting Censorship with Algorithms · §5 Theorem 7 · 2010 · International Conference on Fun with Algorithms

Implications

Tags

censors
cnir
techniques
ip-blocking
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.