FINDING · DEFENSE

Open proxy distribution registrations are vulnerable to adversary flooding with fictitious accounts that inflate yield scores via dummy connections. Proximax uses invitation-only registration with RICO-style subtree reputation scoring — a compromised sub-node taints the entire inviting user's subtree — and sub-linearly credits usage from closely clustered source IP prefixes to limit bot-driven inflation.

From 2011-mccoy-proximaxProximax: A Measurement Based System for Proxies Dissemination · §2.2, §4 · 2011 · Financial Cryptography and Data Security

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
bridgesmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.