FINDING · DETECTION

A censor can mount a zero-collateral-damage flooding attack by injecting fake CRS-protocol-conformant traffic into open channels, inflating the apparent CTP and evicting real circumvention traffic to throttled or sacrificial protocols. If injection is costless the censor can drive real circumvention throughput to zero while keeping all channels nominally open; the attack is equally effective against both throttling and dumping CTP control strategies.

From 2016-elahi-frameworkA Framework for the Game-theoretic Analysis of Censorship Resistance · §6.1 · 2016 · Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
dpipacket-injection
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.