FINDING · DETECTION

Existing censorship-resistant systems share a fundamental vulnerability: they require the user to know a finite set of entry points (bridge addresses, rendezvous points, or ISP-level collaborators) that a censor can enumerate by impersonating a legitimate user. China has blocked the majority of Tor bridges since 2010 and Iran blocked all encrypted traffic in 2012, demonstrating this attack is operationally deployed at scale.

From 2013-invernizzi-messageMessage In A Bottle: Sailing Past Censorship · §1 · 2013 · Annual Computer Security Applications Conference

Implications

Tags

censors
cnir
techniques
active-probingip-blocking
defenses
bridgestor

Extracted by claude-sonnet-4-6 — review before relying.