Huma separates proxy duties between untrusted Decoy Websites (DWs), which relay encrypted messages and serve content, and trusted Shade Proxies (SPs) outside the censored region, which decrypt requests and contact covert destinations. Even if a DW is compromised, the censor learns only whether a specific UID can access the system — no destination, no content, and no client network-layer information. SP assignment is centrally managed by the Huma Authority, preventing DW-SP collusion.
From 2026-kamali-huma — Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement
· §III-A, §IV-C
· 2026
· Network and Distributed System Security
Implications
Decouple the entry point (which must be volunteer-operated and potentially untrusted) from the proxy that accesses blocked content — encrypt user requests with a key known only to the trusted backend before they traverse the volunteer node.
Centralize proxy-to-entry-point assignment in a trusted authority rather than letting operators self-select pairings; operator-chosen pairings enable collusion attacks that expose user destinations.