FINDING · DEFENSE

The paper sketches a decentralized DHT-based communication protocol where all payloads are encrypted in TLS and explicit redirection enables a form of onion routing. Because the censor cannot distinguish censored from non-censored streams, it is forced into a binary choice: block all protocol traffic (overblocking) or allow all of it.

From 2014-tan-censorshipCensorship Resistance as a Side-Effect · §2.2 · 2014 · Security Protocols

Implications

Tags

censors
generic
techniques
dpitraffic-shape
defenses
tortunnelingmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.