FINDING · DETECTION
With 512 PlanetLab nodes each advertising 50 KB/s as malicious Tor middle routers, the theoretical catch probability that at least one bridge circuit traverses a controlled node reaches P(512, 50, 30) ≈ 99% after only 30 circuits. In real-world validation, the 21st circuit created by a bridge client traversed one of the 512 controlled PlanetLab nodes, matching theory. The result generalizes: the 30-circuit exposure threshold applies to any adversary whose nodes' aggregated bandwidth reaches the equivalent of 512 × 50 KB/s = ~25.6 MB/s.
From 2012-ling-extensive — Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery · §IV-B, §V-B, Fig. 7, Theorem 4 · 2012 · INFOCOM
Implications
- A bridge that accumulates even 21–30 client circuits is highly likely to be identified by a modestly resourced adversary; bridge lifetimes and circuit counts should be strictly bounded, and fresh bridge credentials issued to users on short rotation cycles.
- Per-circuit credential or address diversity (e.g., each client receives a distinct bridge IP mapped to a shared backend) prevents circuit count accumulation against any single enumerable IP.
Tags
Extracted by claude-sonnet-4-6 — review before relying.