FINDING · DEFENSE
Snowflake's blocking resistance rests on a large, constantly changing pool of volunteer WebRTC proxies implemented as lightweight JavaScript browser extensions or web pages. Because the proxy population is in constant churn and new addresses appear faster than censors can enumerate and block them, IP-list blocking is structurally ineffective. The system is designed so that when an in-use proxy goes offline, the client seamlessly migrates to another with no disruption to upper network layers.
From 2024-bocovich-snowflake — Snowflake, a censorship circumvention system using temporary WebRTC proxies · §1, §2 · 2024 · USENIX Security Symposium
Implications
- Build proxy pools around high-churn, volunteer-supplied addresses rather than stable server IPs; the enumeration cost for the censor must exceed the replenishment rate to make IP-list blocking effective.
- Implement seamless client-side proxy migration (without session teardown) so that proxy churn does not degrade user experience.
Tags
Extracted by claude-sonnet-4-6 — review before relying.