FINDING · DETECTION
The Chinese GFW enumerated all Tor bridges within approximately one month by deploying censoring agents that impersonated regular users, demonstrating that CAPTCHA- and email-based proxy distribution mechanisms are ineffective against resourceful state-level censors who can create large numbers of accounts and use human-based CAPTCHA-solving platforms.
From 2019-nasr-enemy — Enemy At the Gateways: Censorship-Resilient Proxy Distribution Using Game Theory · §I, §II-B · 2019 · Network and Distributed System Security
Implications
- Do not rely solely on CAPTCHA or email-based bridge distribution; a resourceful censor can automate both at scale and systematically exhaust the bridge pool.
- Multi-feature behavioral scoring (proxy utilization, request frequency, blocked-proxy ratio, client location) raises enumeration cost far more than identity-check-only approaches.
Tags
Extracted by claude-sonnet-4-6 — review before relying.