FINDING · DETECTION
Relying on third-party email providers to verify users was demonstrated by Ling et al. to leave Tor's BridgeDB vulnerable to censors capable of creating multiple accounts, enabling bridge enumeration via sock-puppet attacks at scale. Active and passive detection techniques — including traffic flow analysis, DPI, website fingerprinting, and active probing — have been demonstrated in prior work to reveal Tor bridges, making Tor inaccessible for the majority of users in some regions.
From 2023-tulloch-lox — Lox: Protecting the Social Graph in Bridge Distribution · §2.2.1 · 2023 · Privacy Enhancing Technologies
Implications
- Do not rely solely on email verification for bridge distribution access control — a state-level censor can trivially create thousands of valid email accounts to enumerate the entire bridge pool.
- Adopt anonymous credential schemes with reputation and trust levels to limit per-account damage without requiring linkable identity verification at enrollment.
Tags
Extracted by claude-sonnet-4-6 — review before relying.