The Lox check-blockage protocol response size and time grow linearly with the number of blocked bridges — 6 kB / 11 ms at 5% blocked, 63 kB / 64 ms at 50%, and 126 kB / 122.5 ms at 100% — creating a bandwidth bottleneck a strategic and patient censor can exploit by triggering mass bridge blockages during a critical event (election, coup) to deny successful blockage migrations at the moment users most need them.
From 2023-tulloch-lox — Lox: Protecting the Social Graph in Bridge Distribution
· Figure 1, §5.2
· 2023
· Privacy Enhancing Technologies
Implications
Replace linear-scale migration hashtables with constant-size cryptographic constructions (e.g., private set membership proofs or oblivious RAM) so that response size does not scale with the number of blocked bridges and cannot be weaponized as a denial-of-service amplifier.
Pre-distribute migration tokens out-of-band via a separate low-bandwidth channel so users can complete bucket migration without a live check-blockage round-trip during a mass blockage event.