FINDING · DETECTION

The paper enumerates five adversarial attack surfaces against a video-steganography UP channel: (1) wholesale blocking of the hosting platform, (2) mass-scanning and blocking encoded videos (noted as generally cost-prohibitive per the steganography literature), (3) enumerating videos via pseudorandom tags (feasible but hampered by tag-list overlap with unrelated content and time-window dynamics), (4) banning accounts posting encoded videos, and (5) tracking anticensorship users viewing encoded content. The pseudorandom tag window design specifically prevents preemptive enumeration because the top-n results for a tag at epoch t differ from those at t±1.

From 2025-vines-extendedExtended Abstract: Nobody’s Fault but Mine: Using Unauthenticated Unidirectional Pushes for Client Update · §2.1 · 2025 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
ip-blockingml-classifier
defenses
steganography

Extracted by claude-sonnet-4-6 — review before relying.