Papers
Topics
Authors
Recent
Search
2000 character limit reached

Detecting Censor Detection

Published 25 Sep 2017 in cs.CR | (1709.08718v1)

Abstract: Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls. We examine a specific case, that of obfuscated Tor bridges, and conduct experiments designed to discover how long it takes censors to block them (if they do block at all). Through a year's worth of active measurements from China, Iran, Kazakhstan, and other countries, we learn when bridges become blocked. In China we found the most interesting behavior, including long and varying delays before blocking, frequent failures during which blocked bridges became reachable, and an advancement in blocking technique midway through the experiment. Throughout, we observed surprising behavior by censors, not in accordance with what we would have predicted, calling into question our assumptions and suggesting potential untapped avenues for circumvention.

Citations (1)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (3)

Collections

Sign up for free to add this paper to one or more collections.