access adversarial around assumptions attack availability balancing based boxes buggy cached cause censorship centric challenges channel christopher circumvention contents control cover covert dangerous decoys degradation deployment designs discouraging distance distributed economic embargoes encounter exerting hopper implementations incentives influence information infrastructures internet losing malicious manipulating networks nicholas other pitfalls plane pressure privacy protecting requirements router routers routing scale schuchard secure shadows social stability systems taken taking their thompson traffic unstable using