FINDING · DEFENSE

Salmon's defense against the active zig-zag attack — where a censor blocks a known server to force users onto new ones and watches for correlated reassignments — requires both per-user authentication (unique login credentials per server so unauthorized probes receive a plausible HTTPS page) and traffic camouflage. Without authentication, the server must respond as a functioning proxy to any connection, fully exposing itself to the censor; without camouflage, even a rejected connection may reveal the server's nature.

From 2016-douglas-salmonSalmon: Robust Proxy Distribution for Censorship Circumvention · §3.10 · 2016 · Privacy Enhancing Technologies

Implications

Tags

censors
cnir
techniques
active-probingdpi
defenses
bridgesmimicry

Extracted by claude-sonnet-4-6 — review before relying.