FINDING · POLICY

The paper proposes an Internet Freedom vulnerability registry with five design principles: persistent cross-vendor tracking under shared identifiers (e.g., IF-ARCH-2025-001) as long as a risk remains reproducible; human-centered impact ratings anchored to harm potential for journalists and dissidents rather than CVSS-style exploitability scores; timestamped re-verification hooks with linked PCAPs and minimal reproduction scripts; a structured media interface to counter vendor narrative capture; and open public APIs for integration into risk dashboards so that users of tools like Orbot or Lantern can directly query their configuration's exposure to known metadata-based attacks.

From 2026-tolley-architecturalArchitectural VPN Vulnerabilities, Disclosure Fatigue, and Structural Failures · §6.1–6.5 · 2026 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
traffic-shaperst-injectionactive-probing

Extracted by claude-sonnet-4-6 — review before relying.