FINDING · DEFENSE
Decoy routing places the circumvention service at transit routers rather than fixed-IP edge proxies, so the client addresses packets to any reachable decoy destination and the router hijacks the flow on the client's behalf. A single well-placed router may lie on paths to millions of destinations, making circumvention proxies appear ubiquitously deployed from an adversary's perspective. Blocking such a router requires disrupting ordinary traffic for large fractions of the Internet, qualitatively raising the cost of IP-address-based censorship.
From 2011-karlin-decoy — Decoy Routing: Toward Unblockable Internet Communication · §1.2 · 2011 · Free and Open Communications on the Internet
Implications
- Deploy circumvention infrastructure at ISP or IXP transit points rather than endpoint servers so that no single blockable IP address maps to the proxy function.
- When evaluating placement, prioritize routers that cover the highest fraction of client-to-destination paths to maximize collateral disruption cost for a blocking adversary.
Tags
Extracted by claude-sonnet-4-6 — review before relying.