FINDING · DEFENSE

The optimal multi-protocol CRS traffic allocation distributes circumvention traffic across n cover protocols proportionally to each protocol's non-circumvention traffic volume (CTPi = Li · CTP/(1−CTP)), keeping every individual protocol below the blocking threshold. This makes individual protocol channels independently optimizable, with the sole selection criterion being maximizing cover traffic volume L rather than any other protocol property.

From 2016-elahi-frameworkA Framework for the Game-theoretic Analysis of Censorship Resistance · §5.1 · 2016 · Privacy Enhancing Technologies

Implications

Tags

censors
generic
defenses
meta-resistancemimicry

Extracted by claude-sonnet-4-6 — review before relying.