FINDING · DETECTION

China's GFW was able to enumerate all Tor bridges distributed via IP address or Gmail account in under a month, demonstrating that standard small-subset distribution strategies are insufficient against a state-level adversary controlling large numbers of accounts and Sybils.

From 2013-wang-rbridgerBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation · §2.1 · 2013 · Network and Distributed System Security

Implications

Tags

censors
cn
techniques
ip-blocking
defenses
bridges

Extracted by claude-sonnet-4-6 — review before relying.