FINDING · DEFENSE

The paper identifies three countermeasure classes against bridge discovery: (i) CAPTCHA on email/HTTPS distribution (limited by automated solving services); (ii) uniform random middle-node selection, which defeats bandwidth-Sybil attacks but degrades Tor throughput by routing through low-bandwidth nodes; (iii) DHT-based P2P architecture where no central server holds all bridge IPs, making systematic enumeration infeasible—though DHT systems introduce Sybil and eclipse-attack vulnerabilities of their own.

From 2012-ling-extensiveExtensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery · §VI · 2012 · INFOCOM

Implications

Tags

censors
generic
defenses
bridgestor

Extracted by claude-sonnet-4-6 — review before relying.