FINDING · DETECTION
Centralized communication architectures have a single global point of failure: governments can leverage centralization to surveil with or without operator cooperation, as demonstrated by the Snowden revelations about Skype, Facebook, and Google. A compromised broker in a centralized design enables monitoring and censorship that spans all users of the service.
From 2014-tan-censorship — Censorship Resistance as a Side-Effect · §2.1 · 2014 · Security Protocols
Implications
- Avoid single-broker or single-CDN relay architectures for high-risk users; a compromised central relay deanonymizes all traffic routed through it.
- For centralized designs, implement end-to-end encryption so that broker compromise reveals only metadata (who communicates with whom) rather than content.
Tags
Extracted by claude-sonnet-4-6 — review before relying.