CensorLess's threat model explicitly relies on a rational-censor assumption: the censor will not block entire cloud-provider IP ranges or domain namespaces because the collateral damage to legitimate business services would be politically and economically unacceptable. AWS Lambda's inherent IP-address ephemerality (new IPs on each invocation, function lifetime up to 15 minutes) means even censors willing to attempt enumeration face a continuously shifting target distributed across the cloud provider's global address space.
From 2026-kang-censorless-serverless — CensorLess: Cost-Efficient Censorship Circumvention Through Serverless Cloud Functions
· §4.2
· 2026
· PETS 2026
Implications
Anchor proxy infrastructure inside cloud-provider IP ranges that, if blocked, would cause mass collateral damage (e.g., Lambda/GCF egress) — this structurally raises the censor's blocking cost beyond what rational actors will pay.
Avoid dedicating static or predictable IP blocks to circumvention traffic; prefer infrastructure where IP churn is a built-in platform property rather than an operator-managed rotation.