FINDING · DEFENSE
Key distribution is the primary bootstrapping weakness of steganography-based censorship-resistance systems: a censor can simply block stego-key distribution. Identity-based steganographic tagging (IBST) eliminates this attack surface by requiring only a single master public key, which can be bundled with the client software — no key distribution inside the censored area is necessary.
From 2013-ruffing-identity-based — Identity-Based Steganography and Its Applications to Censorship Resistance · §1 Introduction / §4 · 2013 · Hot Topics in Privacy Enhancing Technologies
Implications
- Bundle a single IBST master public key with the client binary rather than distributing per-proxy or per-session keys; this removes the censor's ability to attack the key-distribution channel.
- Design covert rendezvous schemes so that no cryptographic material needs to flow from outside the censored zone to the censored client after initial software installation.
Tags
Extracted by claude-sonnet-4-6 — review before relying.