FINDING · DETECTION

Relying on third-party email providers to verify users was demonstrated by Ling et al. to leave Tor's BridgeDB vulnerable to censors capable of creating multiple accounts, enabling bridge enumeration via sock-puppet attacks at scale. Active and passive detection techniques — including traffic flow analysis, DPI, website fingerprinting, and active probing — have been demonstrated in prior work to reveal Tor bridges, making Tor inaccessible for the majority of users in some regions.

From 2023-tulloch-loxLox: Protecting the Social Graph in Bridge Distribution · §2.2.1 · 2023 · Privacy Enhancing Technologies

Implications

Tags

censors
generic
techniques
active-probingdpitraffic-shapewebsite-fingerprintip-blocking
defenses
bridgestor

Extracted by claude-sonnet-4-6 — review before relying.