FINDING · DEFENSE

Key distribution is the primary bootstrapping weakness of steganography-based censorship-resistance systems: a censor can simply block stego-key distribution. Identity-based steganographic tagging (IBST) eliminates this attack surface by requiring only a single master public key, which can be bundled with the client software — no key distribution inside the censored area is necessary.

From 2013-ruffing-identity-basedIdentity-Based Steganography and Its Applications to Censorship Resistance · §1 Introduction / §4 · 2013 · Hot Topics in Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
ip-blockingdpi
defenses
steganographymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.