FINDING · DEFENSE

A censoring server cannot selectively withhold PIR responses for a targeted file while honestly answering others: if a PPT algorithm A could distinguish targeted-file queries from all other queries, it would directly violate the query privacy of the underlying PIR scheme. The server's only compliant evasion strategy is an indiscriminate shutdown — refusing all queries or all signatures — which is behaviorally distinguishable and does not produce a plausible-deniability defense.

From 2018-martiny-proof-of-censorshipProof-of-Censorship: Enabling centralized censorship-resistant content providers · §4.3 · 2018 · Financial Cryptography and Data Security

Implications

Tags

censors
generic
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.