FINDING · DEFENSE

Decoy routing places the circumvention service at transit routers rather than fixed-IP edge proxies, so the client addresses packets to any reachable decoy destination and the router hijacks the flow on the client's behalf. A single well-placed router may lie on paths to millions of destinations, making circumvention proxies appear ubiquitously deployed from an adversary's perspective. Blocking such a router requires disrupting ordinary traffic for large fractions of the Internet, qualitatively raising the cost of IP-address-based censorship.

From 2011-karlin-decoyDecoy Routing: Toward Unblockable Internet Communication · §1.2 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
decoy-routingtunneling

Extracted by claude-sonnet-4-6 — review before relying.