FINDING · EVALUATION

Circumvention tools circulate through word-of-mouth and underground distribution networks rather than official app stores, making the ecosystem opaque and creating a supply-chain attack surface: adversarially-operated tools (including, per prior work, apps linked to the People's Liberation Army) reach users through the same channels as legitimate tools. The survey documents that providers are aware of misbehaving players but lack coordinated mechanisms to flag or exclude them.

From 2024-xue-bridgingBridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape · §1, §4.3, §6 · 2024 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
measurement-platform
defenses
pluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.