FINDING · DEFENSE

Collaborative spy detection aggregates VPN connection logs (complete, incomplete, and tiny calls) across all volunteer nodes to a central log analyzer, which identifies censor probe IPs by looking for clusters of incomplete or tiny calls from the same /24 block, then distributes a Spy List back to every server so probing packets are silently dropped before the handshake completes. A single server cannot distinguish a spy from a regular client in time; the cross-server aggregate makes pre-response spy identification feasible.

From 2014-nobori-vpnVPN Gate: A Volunteer-Organized Public VPN Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls · §4.3 · 2014 · Networked Systems Design and Implementation

Implications

Tags

censors
cn
techniques
active-probing
defenses
meta-resistancebridges

Extracted by claude-sonnet-4-6 — review before relying.