FINDING · DEFENSE

Pseudonymity is insufficient for dissent networks: social-network profile information can be correlated with external data to deanonymize users, and fixed-infrastructure networks enable localization attacks even without explicit identity. The authors argue that true anonymity—or at minimum strong deniability where usage is non-incriminating and activity is difficult to trace—is required to protect participants.

From 2013-hasan-buildingBuilding Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts · §5.2 · 2013 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
flow-correlation
defenses
tormeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.