FINDING · DEFENSE
Scrambling without secret key management can frustrate DPI-based censors if the de-scrambling function satisfies 'high-inertia' — meaning an adversary computing S⁻¹ on n inputs cannot use less than Θ(n) times the resources of a single commodity-PC user, including electricity, memory, and computation time. This forces bulk censorship to become computationally infeasible without over-censoring all scrambled content.
From 2011-bonneau-scrambling — Scrambling for lightweight censorship resistance · §1–2 · 2011 · Security Protocols
Implications
- Design proxy transports where de-obfuscation cost scales linearly with traffic volume (no O(1) pattern match); avoid symmetric-key constructions where a censor can pre-compute once and apply cheaply.
- Prefer memory-latency-bound de-obfuscation primitives over pure compute-bound ones, since hardware acceleration of memory latency (cache misses, DRAM bandwidth) is substantially harder than GPU/ASIC acceleration of arithmetic.
Tags
Extracted by claude-sonnet-4-6 — review before relying.