FINDING · DETECTION
China's GFW was able to enumerate all Tor bridges distributed via IP address or Gmail account in under a month, demonstrating that standard small-subset distribution strategies are insufficient against a state-level adversary controlling large numbers of accounts and Sybils.
From 2013-wang-rbridge — rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation · §2.1 · 2013 · Network and Distributed System Security
Implications
- IP/email-based bridge distribution is broken against state-level adversaries; any replacement scheme must rate-limit enumeration through reputation costs or cryptographic constraints, not account quotas alone.
- Assume the censor can register as an arbitrary number of legitimate users; bridge distribution must remain robust even when a significant fraction (up to 30%) of registered users are adversary-controlled.
Tags
Extracted by claude-sonnet-4-6 — review before relying.