Decoy routing places the circumvention service at transit routers rather than fixed-IP edge proxies, so the client addresses packets to any reachable decoy destination and the router hijacks the flow on the client's behalf. A single well-placed router may lie on paths to millions of destinations, making circumvention proxies appear ubiquitously deployed from an adversary's perspective. Blocking such a router requires disrupting ordinary traffic for large fractions of the Internet, qualitatively raising the cost of IP-address-based censorship.
From 2011-karlin-decoy — Decoy Routing: Toward Unblockable Internet Communication
· §1.2
· 2011
· Free and Open Communications on the Internet
Implications
Deploy circumvention infrastructure at ISP or IXP transit points rather than endpoint servers so that no single blockable IP address maps to the proxy function.
When evaluating placement, prioritize routers that cover the highest fraction of client-to-destination paths to maximize collateral disruption cost for a blocking adversary.