FINDING · DEFENSE

MIAB reduces the bootstrap requirement to only the operator's public key — no pre-shared rendezvous point is needed — by using blog pings as a real-time broadcast discovery channel. Since every blog post on the Internet is a potential drop point, the censor cannot enumerate entry points by posing as a legitimate user, unlike Collage (requires an up-to-date task database) or Telex (requires ISP collaboration).

From 2013-invernizzi-messageMessage In A Bottle: Sailing Past Censorship · §3 · 2013 · Annual Computer Security Applications Conference

Implications

Tags

techniques
ip-blockingactive-probing
defenses
steganographymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.