FINDING · DEFENSE

Huma separates proxy duties between untrusted Decoy Websites (DWs), which relay encrypted messages and serve content, and trusted Shade Proxies (SPs) outside the censored region, which decrypt requests and contact covert destinations. Even if a DW is compromised, the censor learns only whether a specific UID can access the system — no destination, no content, and no client network-layer information. SP assignment is centrally managed by the Huma Authority, preventing DW-SP collusion.

From 2026-kamali-humaHuma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement · §III-A, §IV-C · 2026 · Network and Distributed System Security

Implications

Tags

censors
generic
defenses
tunnelingmeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.