FINDING · DETECTION

Tor bridges that always accept incoming connections enable a three-phase 'bridge aliveness attack': an adversary collects bridge descriptors at scale, correlates bridge uptime timestamps with pseudonymous post timestamps to narrow the candidate set (winnowing), then confirms identity via circuit-clogging and timing attacks. Because bridge descriptors remain valid indefinitely and the BridgeDB rate-limits only to one descriptor set per /24 prefix per week, an adversary with botnet or open-proxy access can hoard enough bridges for the winnowing phase to succeed.

From 2011-smits-bridgespaBridgeSPA: Improving Tor Bridges with Single Packet Authorization · §1, §1.1 · 2011 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
cn
techniques
active-probingip-blockingflow-correlation
defenses
bridgestor

Extracted by claude-sonnet-4-6 — review before relying.