FINDING · DETECTION

Because browser-based proxies can only initiate outbound connections, flash proxies connect to censored clients rather than the reverse, requiring the facilitator to maintain a registry of client IP addresses; a censor can impersonate a legitimate flash proxy to query the facilitator and enumerate the IP addresses of circumvention users.

From 2012-fifield-evadingEvading Censorship with Browser-Based Proxies · §5.1 · 2012 · Privacy Enhancing Technologies Symposium

Implications

Tags

censors
generic
techniques
active-probingip-blocking
defenses
bridgespluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.