FINDING · DETECTION

A censor can defeat the anomaly detector without triggering an alert by replacing blocked user traffic with synthetic requests from adversary-controlled machines, keeping per-jurisdiction connection counts within the typical range. The paper explicitly identifies this as an unaddressed active-attack vector.

From 2011-danezis-anomaly-basedAn anomaly-based censorship-detection system for Tor · §6 · 2011 · The Tor Project

Implications

Tags

censors
generic
techniques
measurement-platform
defenses
tor

Extracted by claude-sonnet-4-6 — review before relying.