FINDING · DETECTION
A single malicious Tor middle router advertising 10 MB/s bandwidth discovered 2,369 distinct bridges in 14 days. The catch probability is determined solely by the aggregated bandwidth M = k·b of malicious middle routers regardless of how that bandwidth is distributed across nodes: three routers at 10 MB/s each achieve strictly greater catch probability than 512 nodes at 50 KB/s each. This means a well-resourced single node is equivalent to or surpasses hundreds of low-bandwidth Sybil nodes.
From 2012-ling-extensive — Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery · §IV-B, §V-B, Theorem 3 · 2012 · INFOCOM
Implications
- Treat any high-bandwidth relay that appears near a bridge circuit as a discovery risk; bridge assignment logic should deprioritize circuits that route through newly joined or anomalously high-bandwidth middle nodes.
- Bridges should rotate IP addresses or cease accepting new circuits after a small threshold (well under 30 cumulative client circuits) to bound catch probability before a high-bandwidth malicious middle can identify them.
Tags
Extracted by claude-sonnet-4-6 — review before relying.