Network measurement methods for locating and examining censorship devices
Advances in networking and firewall technology have led to the emergence of network
censorship devices that can perform large-scale, highly-performant content blocking. While …
censorship devices that can perform large-scale, highly-performant content blocking. While …
{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …
Retina: analyzing 100GbE traffic on commodity hardware
As network speeds have increased to over 100 Gbps, operators and researchers have lost
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …
the ability to easily ask complex questions of reassembled and parsed network traffic. In this …
PTPerf: On the performance evaluation of Tor pluggable transports
Tor, one of the most popular censorship circumvention systems, faces regular blocking
attempts by censors. Thus, to facilitate access, it relies on" pluggable transports"(PTs) that …
attempts by censors. Thus, to facilitate access, it relies on" pluggable transports"(PTs) that …
The spectre of surveillance and censorship in future internet architectures
M Wrana, D Barradas, N Asokan - arXiv preprint arXiv:2401.15828, 2024 - arxiv.org
Recent initiatives known as Future Internet Architectures (FIAs) seek to redesign the Internet
to improve performance, scalability, and security. However, some governments perceive …
to improve performance, scalability, and security. However, some governments perceive …
Netshuffle: Circumventing censorship with shuffle proxies at the edge
NetShuffle is a censorship resistance system that offers" shuffle proxies," where regular
proxy services (eg, HTTPS proxies, Tor bridges) are decoupled from their addresses via …
proxy services (eg, HTTPS proxies, Tor bridges) are decoupled from their addresses via …
Turbo Tunnel, a good way to design censorship circumvention protocols
D Fifield - 10th USENIX Workshop on Free and Open …, 2020 - usenix.org
This paper advocates for the use of an interior session and reliability layer in censorship
circumvention systems—some protocol that provides a reliable stream interface over a …
circumvention systems—some protocol that provides a reliable stream interface over a …
OUStralopithecus: Overt user simulation for censorship circumvention
AH Lorimer, L Tulloch, C Bocovich… - Proceedings of the 20th …, 2021 - dl.acm.org
In many parts of the world, censors are continuously increasing their capacity to fingerprint,
identify, and block censorship resistance tools to maintain control over what can and can not …
identify, and block censorship resistance tools to maintain control over what can and can not …
Towards a scalable censorship-resistant overlay network based on webrtc covert channels
D Barradas, N Santos - Proceedings of the 1st International Workshop …, 2020 - dl.acm.org
In many regions of the world, nation-states enforce Internet censorship policies that prevent
unrestricted access to information and services by their citizens. Over the years, many …
unrestricted access to information and services by their citizens. Over the years, many …
Lox: Protecting the social graph in bridge distribution
L Tulloch - 2022 - uwspace.uwaterloo.ca
Access to the open Internet, free from surveillance and censorship, is an important part of
fulfilling the right to privacy. Despite this, in many regions of the world, censorship of the …
fulfilling the right to privacy. Despite this, in many regions of the world, censorship of the …