FINDING · DEFENSE

CensorSpoofer decouples the upstream channel (URLs hidden via steganography in IM/Email) from the downstream channel (web content injected into spoofed UDP/VoIP flows), so the proxy's real IP is never revealed to any user. This asymmetric architecture provides perfect insider-attack resistance: even if all users are compromised, they can only learn cover dummy-host IPs, not the spoofer's address.

From 2012-wang-censorspooferCensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing · §4 · 2012 · Computer and Communications Security

Implications

Tags

censors
cn
techniques
ip-blockingactive-probing
defenses
steganographymimicry

Extracted by claude-sonnet-4-6 — review before relying.