FINDING · DEFENSE
Cloud-based onion routing confronts censors with a collateral-damage dilemma: blocking a cloud provider's IP prefixes requires blocking all co-hosted services (Amazon EC2 hosted over 1 million instances sharing common IP prefixes in 2010), while allowing the traffic means circumvention succeeds. Rotating IP addresses—by retiring and spinning up new VM instances or via DHCP/gratuitous ARPs—reduces the window a blocked address remains in service, forcing censors into a perpetual cat-and-mouse game across all major cloud providers simultaneously.
From 2011-jones-hiding — Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing · §2.3 · 2011 · Free and Open Communications on the Internet
Implications
- Deploy relay infrastructure on multiple major cloud providers (AWS, GCP, Azure, Rackspace) so no single prefix block removes all relays; rotate VM IPs on a schedule shorter than typical censor blocklist update cycles.
- Prefer cloud providers with large, multi-homed datacenter footprints over dedicated hosting precisely because the collateral damage of blocking them is prohibitive for most national censors.
Tags
Extracted by claude-sonnet-4-6 — review before relying.