FINDING · DETECTION

A sophisticated censor can infiltrate a proxy distribution system, accumulate large numbers of proxy addresses and channel identities, and delay mass-blocking for weeks or months to maximize information before acting. The paper argues this is self-limiting: delayed blocking extends proxy lifetimes (benefiting system yield), and the infiltrating account's subtree reputation score degrades sharply the moment it begins blocking proxies, triggering exclusion from future proxy assignments.

From 2011-mccoy-proximaxProximax: A Measurement Based System for Proxies Dissemination · §4 · 2011 · Financial Cryptography and Data Security

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.