FINDING · EVALUATION

The dead-drop bootstrapping protocol is vulnerable to censor stuffing: because bridge dead drops are publicly advertised and world-writable, censors can flood them with fake tickets containing credentials for non-existing rendezvous accounts, potentially exhausting bridge polling resources. The paper mitigates this only partially via exponential backoff on inactive accounts, and acknowledges that if the censor's stuffing rate significantly exceeds the bridge's check-and-discard rate the attack may hinder bootstrapping. Censors may also delete genuine tickets, though cloud providers such as Dropbox preserve all file versions for 30 days, allowing bridges to collect the first version of every file.

From 2014-brubaker-cloudtransportCloudTransport: Using Cloud Storage for Censorship-Resistant Networking · §4.2 · 2014 · Privacy Enhancing Technologies Symposium

Implications

Tags

defenses
tunnelingbridges

Extracted by claude-sonnet-4-6 — review before relying.