77% of public bridges offer only vanilla Tor, which is trivially detectable via TLS certificate pattern matching. An additional 15% offer Pluggable Transports with conflicting security properties (e.g., obfs4 + obfs3 + obfs2 co-deployed on the same bridge), allowing a censor to confirm and block the bridge via the weakest PT and thereby disable all stronger PTs on the same IP — including active-probing-resistant transports like obfs4 and ScrambleSuit.
From 2017-matic-dissecting — Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures
· §V-C, Table I
· 2017
· Network and Distributed System Security
Implications
Never co-deploy PTs with differing security levels (e.g., active-probing-resistant obfs4 alongside probe-vulnerable obfs3) on the same bridge IP — the weakest PT becomes an attack vector that eliminates all stronger PTs.
Enforce a PT security tier policy in bridge deployment tooling: a bridge should only offer transports within the same security class, and deprecated transports (obfs2, vanilla Tor) should be disabled by default.