FINDING · DETECTION
Four OR ports (443, 8443, 444, 9001) account for 82% of all active public bridge fingerprints as of April 2016, down from 95% in March 2013 but still concentrated. Scanning just three of these ports (443, 8443, 9001) is sufficient to deanonymize 71% of all active public bridges. Additionally, CollecTor's published per-bridge usage statistics allow a censor to rank bridges by client count per country and identify the highest-impact OR ports to scan next.
From 2017-matic-dissecting — Dissecting Tor Bridges: a Security Evaluation of Their Private and Public Infrastructures · §V-D, Figure 6, Table IV · 2017 · Network and Distributed System Security
Implications
- Randomize OR port selection by default across a much wider range — the current de-facto concentration on 443/8443/9001 dramatically reduces the scan space a censor must cover to enumerate the majority of bridges.
- Audit and sanitize CollecTor's published per-bridge statistics (especially OR port and per-country client counts) to prevent adversaries from computing country-specific blocking priority rankings directly from public Tor data.
Tags
Extracted by claude-sonnet-4-6 — review before relying.