FINDING · DEFENSE

Snowflake's blocking resistance rests on a large, constantly changing pool of volunteer WebRTC proxies implemented as lightweight JavaScript browser extensions or web pages. Because the proxy population is in constant churn and new addresses appear faster than censors can enumerate and block them, IP-list blocking is structurally ineffective. The system is designed so that when an in-use proxy goes offline, the client seamlessly migrates to another with no disruption to upper network layers.

From 2024-bocovich-snowflakeSnowflake, a censorship circumvention system using temporary WebRTC proxies · §1, §2 · 2024 · USENIX Security Symposium

Implications

Tags

censors
genericcnirru
techniques
ip-blockingtraffic-shape
defenses
webrtc-pluggablebridges

Extracted by claude-sonnet-4-6 — review before relying.