FINDING · DETECTION

The host-profiling censor (passive traffic analysis: count connections per server, block those exceeding a threshold τ within a window w) blocks essentially all circumvention user traffic within 30 time steps for all classifier qualities tested (ρ_TP ∈ {0.9, 0.95, 0.99}), while causing far less collateral damage than zig-zag (never exceeding ~30% innocent server blocking). Snowflake resists this attack well: with w=3, τ=3, over 94.48% of users receive a proxy within 2 steps even with worst-classifier rules, and final unblocked server rates are 91.24–99.04%. The host profiling approach is feasible for passive censors who cannot enumerate the distribution channel.

From 2026-fares-gameThe Game Has Changed: Revisiting proxy distribution and game theory · §5.2, Table 2, Table 3 · 2026 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shapeml-classifier
defenses
webrtc-pluggablebridges

Extracted by claude-sonnet-4-6 — review before relying.