bbs
bbs copied to clipboard
Forum for discussing Internet censorship circumvention
On 2020-12-05, the government of Kazakhstan announced an "exercise" and told people they would have had to install a root TLS certificate in order to access certain foreign web sites....
# How China Detects and Blocks Shadowsocks **Authors**: Anonymous, Anonymous, Anonymous, David Fifield, Amir Houmansadr Date: Sunday, December 29, 2019 [中文版:Shadowsocks是如何被检测和封锁的](https://gfw.report/blog/gfw_shadowsocks/zh.html) This report first appeared on [GFW Report](https://gfw.report/blog/gfw_shadowsocks). We also...
The use of TLS in Censorship Circumvention Sergey Frolov and Eric Wustrow https://censorbib.nymity.ch/#Frolov2019a https://tlsfingerprint.io/static/frolov2019.pdf The paper analyzes real-world TLS traffic from over 11.8 billion TLS connections in order to identify...
If a site that is only HTTP and is new or has not been used by the user for a long time, it will encounter an error exactly as follows:...
Censored continent: Understanding the use of tools during Internet censorship in Africa: Cameroon, Nigeria, Uganda and Zimbabwe as case studies Babatunde Okunoye https://research.torproject.org/techreports/icfp-censored-continent-2020-07-31.pdf This report summarizes 33 interviews with people...
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Arian Akhavan Niaki, Shinyoung Cho, Zachary Weinberg, Nguyen Phong Hoang, Abbas Razaghpanah, Nicolas Christin, Phillipa Gill https://censorbib.nymity.ch/#Niaki2020a https://iclab.org/publication/publication_iclab_paper_oakland2020/ The paper is a...
HTTPT: A Probe-Resistant Proxy Sergey Frolov, Eric Wustrow https://censorbib.nymity.ch/#Frolov2020b https://www.usenix.org/conference/foci20/presentation/frolov (video and slides) https://github.com/sergeyfrolov/httpt The paper describes HTTPT, a probe-resistant proxy design built on HTTPS. Probe-resistant proxy servers defeat [active...
Slitheen++: Stealth TLS-based Decoy Routing Benedikt Birtel, Christian Rossow https://censorbib.nymity.ch/#Birtel2020a https://www.usenix.org/conference/foci20/presentation/birtel (video and slides) https://cispa.saarland/group/rossow/papers/tr-slitheen++.pdf (extended technical report) https://cispa.saarland/group/rossow/files/Slitheen++.tar.gz (source code) Slitheen++ is a collection of refinements to [Slitheen](https://censorbib.nymity.ch/#Bocovich2016a), a...
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior Anonymous, Arian Akhavan Niaki, Nguyen Phong Hoang, Phillipa Gill, Amir Houmansadr https://censorbib.nymity.ch/#Anonymous2020a https://www.usenix.org/conference/foci20/presentation/anonymous (video and slides) https://gfw.report/publications/foci20_dns/en/ (code and data) The paper...
Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter Kevin Bock, Yair Fax, Kyle Reese, Jasraj Singh, Dave Levin https://censorbib.nymity.ch/#Bock2020a https://www.usenix.org/conference/foci20/presentation/bock (video and slides) https://geneva.cs.umd.edu/posts/iran-whitelister/ (blog post) The...