FINDING · DEFENSE
NET payloads are wrapped in three nested layers — (1) steganographic encoding plus transport encryption with a factory digital signature, (2) proof-of-life (CAPTCHA), and (3) proof-of-work (computational puzzle) — so that even an adversary who harvests many payloads cannot decode them faster than gateway addresses can be rotated. The payload format is explicitly extensible to add harder challenges as adversaries improve.
From 2012-lincoln-bootstrapping — Bootstrapping Communications into an Anti-Censorship System · §3.3 · 2012 · Free and Open Communications on the Internet
Implications
- Layer human-interactive and computational rate-limiting around bridge address distribution so bulk automated decoding is computationally infeasible, not just difficult.
- Embed digital signatures from a trusted factory in every payload so adversarial rendezvous servers cannot forge or replay bridge addresses.
Tags
Extracted by claude-sonnet-4-6 — review before relying.