FINDING · DEFENSE

SpotProxy exploits cloud Spot VMs — instances backed by excess capacity that can be reclaimed at any moment and re-spawned at new IP addresses — to create a high-churn proxy fleet. The observation is that Spot VM preemption, which is an operational liability for normal workloads, is a circumvention asset: it continuously refreshes proxy IP addresses, making censor enumeration and blocklisting structurally ineffective.

From 2024-kon-spotproxySpotProxy: Rediscovering the Cloud for Censorship Circumvention · §1, §3 · 2024 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
ip-blocking
defenses
bridges

Extracted by claude-sonnet-4-6 — review before relying.