FINDING · DEFENSE

Cloud-based onion routing confronts censors with a collateral-damage dilemma: blocking a cloud provider's IP prefixes requires blocking all co-hosted services (Amazon EC2 hosted over 1 million instances sharing common IP prefixes in 2010), while allowing the traffic means circumvention succeeds. Rotating IP addresses—by retiring and spinning up new VM instances or via DHCP/gratuitous ARPs—reduces the window a blocked address remains in service, forcing censors into a perpetual cat-and-mouse game across all major cloud providers simultaneously.

From 2011-jones-hidingHiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing · §2.3 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
ip-blockingasn-blackholing
defenses
tortunneling

Extracted by claude-sonnet-4-6 — review before relying.