FINDING · DEFENSE
Transmitting the de-scrambling algorithm S⁻¹ as in-page JavaScript alongside AJAX-fetched scrambled content eliminates the need for special client software installation or trusted public-key distribution, removing the primary bootstrapping vulnerability that cryptographic censorship-resistance schemes (including Tor) share — a vulnerability exploited when Iran blocked Tor by filtering its Diffie-Hellman parameter bit sequence.
From 2011-bonneau-scrambling — Scrambling for lightweight censorship resistance · §1, §3 · 2011 · Security Protocols
Implications
- Consider delivering transport obfuscation logic as runtime-downloadable code (e.g., WASM modules fetched over HTTPS from a CDN) rather than compiled binaries; this removes the client bootstrap problem at the cost of trusting the initial delivery channel.
- Avoid hardcoding recognizable protocol constants (DH parameters, magic bytes) in the compiled client binary; these become trivial DPI signatures.
Tags
Extracted by claude-sonnet-4-6 — review before relying.