FINDING · DEFENSE

The system uses a shared Pub/Sub topic for all users, where session IDs (SIDs) are visible to all subscribers on the broker topic. The paper argues this does not compromise user anonymity because SIDs are randomly generated per-session by client-side software with no link to user identity, and all subsequent bridge-info payloads are encrypted under a session-specific symmetric key exchanged via asymmetric encryption.

From 2024-vilalonga-lookingLooking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels · §3.2 · 2024 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shapedpi
defenses
bridgestunneling

Extracted by claude-sonnet-4-6 — review before relying.