FINDING · DEFENSE

The design guarantees that as long as an end host can reach any non-censoring ISP, it can trampoline to any service; the anonymity properties make it difficult for ISPs to selectively block flows without cutting off the end host from the outside world entirely. Wikileaks-like services require only one willing authority for name resolution, not universal cooperation.

From 2011-liu-torTor Instead of IP · §7.1 · 2011 · Hot Topics in Networks

Implications

Tags

censors
cngeneric
defenses
meta-resistancetor

Extracted by claude-sonnet-4-6 — review before relying.