FINDING · DETECTION

The Chinese GFW enumerated all Tor bridges within approximately one month by deploying censoring agents that impersonated regular users, demonstrating that CAPTCHA- and email-based proxy distribution mechanisms are ineffective against resourceful state-level censors who can create large numbers of accounts and use human-based CAPTCHA-solving platforms.

From 2019-nasr-enemyEnemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory · §I, §II-B · 2019 · Network and Distributed System Security

Implications

Tags

censors
cn
techniques
active-probingip-blocking

Extracted by claude-sonnet-4-6 — review before relying.