FINDING · DEFENSE
SpotProxy exploits cloud Spot VMs — instances backed by excess capacity that can be reclaimed at any moment and re-spawned at new IP addresses — to create a high-churn proxy fleet. The observation is that Spot VM preemption, which is an operational liability for normal workloads, is a circumvention asset: it continuously refreshes proxy IP addresses, making censor enumeration and blocklisting structurally ineffective.
From 2024-kon-spotproxy — SpotProxy: Rediscovering the Cloud for Censorship Circumvention · §1, §3 · 2024 · USENIX Security Symposium
Implications
- Use cloud spot/preemptible instances for proxy infrastructure: their involuntary IP rotation is a circumvention feature, not a bug, and the preemption rate provides a lower bound on enumeration difficulty for the censor.
- Design proxy clients for seamless migration across changing server IPs so that Spot VM preemption is invisible to the user.
Tags
Extracted by claude-sonnet-4-6 — review before relying.