FINDING · DETECTION
Tor-like anonymizing overlays are easily censored because they rely on centralized, publicly visible relay lists; governments can blacklist Tor nodes or monitor all Tor exit traffic so that traffic analysis can reveal the source. Traffic to or from Tor 'essentially advertises itself as probably worth tracking.'
From 2011-liu-tor — Tor Instead of IP · §1–§2 · 2011 · Hot Topics in Networks
Implications
- Avoid designs that require a published, enumerable relay list; any centralized directory becomes a blocklist target
- Ensure the circumvention transport itself does not produce a recognizable traffic signature that distinguishes it from ambient traffic
Tags
Extracted by claude-sonnet-4-6 — review before relying.