FINDING · DETECTION
Existing censorship-resistant systems share a fundamental vulnerability: they require the user to know a finite set of entry points (bridge addresses, rendezvous points, or ISP-level collaborators) that a censor can enumerate by impersonating a legitimate user. China has blocked the majority of Tor bridges since 2010 and Iran blocked all encrypted traffic in 2012, demonstrating this attack is operationally deployed at scale.
From 2013-invernizzi-message — Message In A Bottle: Sailing Past Censorship · §1 · 2013 · Annual Computer Security Applications Conference
Implications
- Any system with a bounded, discoverable set of entry points can be systematically enumerated and blocked; circumvention systems must design for effectively infinite or user-chosen rendezvous points.
- Distributing bridge addresses without exposing them to the censor is theoretically impossible if the censor can impersonate a legitimate user — per-user revelation or rate-limiting does not solve the root problem.
Tags
Extracted by claude-sonnet-4-6 — review before relying.