The system uses a shared Pub/Sub topic for all users, where session IDs (SIDs) are visible to all subscribers on the broker topic. The paper argues this does not compromise user anonymity because SIDs are randomly generated per-session by client-side software with no link to user identity, and all subsequent bridge-info payloads are encrypted under a session-specific symmetric key exchanged via asymmetric encryption.
From 2024-vilalonga-looking — Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
· §3.2
· 2024
· Free and Open Communications on the Internet
Implications
Rendezvous protocols can safely use shared broadcast channels if ephemeral random session identifiers are used and all sensitive payloads are encrypted before publication; secrecy of the channel itself is not required for operational security.
Encrypting broker acknowledgment messages (e.g., HAS_BRIDGE) would eliminate the remaining metadata leakage about when a bridge assignment occurs, which the paper flags as a known gap.