FINDING · DEFENSE

Transmitting the de-scrambling algorithm S⁻¹ as in-page JavaScript alongside AJAX-fetched scrambled content eliminates the need for special client software installation or trusted public-key distribution, removing the primary bootstrapping vulnerability that cryptographic censorship-resistance schemes (including Tor) share — a vulnerability exploited when Iran blocked Tor by filtering its Diffie-Hellman parameter bit sequence.

From 2011-bonneau-scramblingScrambling for lightweight censorship resistance · §1, §3 · 2011 · Security Protocols

Implications

Tags

techniques
dpiip-blocking
defenses
meta-resistancerandomization

Extracted by claude-sonnet-4-6 — review before relying.