|
About the Censorship research & publications category
|
|
3
|
523
|
September 13, 2021
|
|
Paper summary: Characterizing Transnational Internet Performance and the Great Bottleneck of China (MACS 2020)
|
|
0
|
35
|
December 2, 2021
|
|
Paper summary: Measuring QQMail's automated email censorship in China (FOCI 2021)
|
|
0
|
48
|
November 10, 2021
|
|
Paper summary: Exploring Simple Detection Techniques for DNS-over-HTTPS Tunnels (FOCI 2021)
|
|
0
|
72
|
October 27, 2021
|
|
Paper summary: A First Look at Private Communications in Video Games using Visual Features (PETS 2021)
|
|
0
|
62
|
October 25, 2021
|
|
Paper summary: Too Close for Comfort: Morasses of (Anti-) Censorship in the Era of CDNs (PETS 2021)
|
|
0
|
60
|
October 21, 2021
|
|
Evaluating the censorship resistance of Apple's iCloud Private Relay
|
|
0
|
187
|
September 25, 2021
|
|
Paper summary: BlindTLS: Circumventing TLS-based HTTPS censorship (FOCI 2021)
|
|
0
|
129
|
September 23, 2021
|
|
Сеть GlobalCheck для изучения блокировок
|
|
3
|
723
|
August 15, 2021
|
|
Paper summary: Running Refraction Networking for Real (PETS 2020)
|
|
0
|
161
|
June 7, 2021
|
|
Paper summary: MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies (PETS 2020)
|
|
0
|
167
|
April 25, 2021
|
|
Paper summary: Investigating Large Scale HTTPS Interception in Kazakhstan (IMC 2020)
|
|
0
|
181
|
March 29, 2021
|
|
VPNalyzer
|
|
0
|
400
|
March 2, 2021
|
|
Paper summary: SiegeBreaker: An SDN Based Practical Decoy Routing System (PETS 2020)
|
|
0
|
227
|
February 8, 2021
|
|
A practical guide to defend against the GFW's latest active probing
|
|
0
|
793
|
January 27, 2021
|
|
Paper summary: Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC (CCS 2020
|
|
0
|
243
|
December 4, 2020
|
|
GFW Archaeology: gfw-looking-glass.sh
|
|
4
|
771
|
October 25, 2020
|
|
Censored continent: Understanding the use of tools during Internet censorship in Africa: Cameroon, Nigeria, Uganda and Zimbabwe as case studies
|
|
2
|
232
|
October 23, 2020
|
|
Paper summary: MassBrowser: Unblocking the Censored Web for the Masses, by the Masses (NDSS 20)
|
|
2
|
367
|
October 23, 2020
|
|
Telegram Messenger Anti-Censorship
|
|
0
|
293
|
October 6, 2020
|
|
Paper summary: ICLab: A Global, Longitudinal Internet Censorship Measurement Platform (S&P 2020)
|
|
0
|
244
|
October 5, 2020
|
|
List of ways to bypass censorship
|
|
0
|
302
|
September 26, 2020
|
|
Paper summary: Slitheen++: Stealth TLS-based Decoy Routing (FOCI 2020)
|
|
0
|
262
|
September 2, 2020
|
|
Paper summary: HTTPT: A Probe-Resistant Proxy (FOCI 2020)
|
|
0
|
271
|
September 1, 2020
|
|
Paper summary: Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter (FOCI 2020)
|
|
0
|
243
|
August 26, 2020
|
|
Paper summary: Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia (FOCI 2020)
|
|
0
|
210
|
August 25, 2020
|
|
Paper summary: Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior (FOCI 2020)
|
|
0
|
265
|
August 24, 2020
|
|
Decryption vulnerability in Shadowsocks stream ciphers
|
|
0
|
474
|
February 25, 2020
|
|
Summary on Recently Discovered V2Ray Weaknesses
|
|
0
|
1090
|
June 16, 2020
|
|
Testing Shadowsocks UDP handling with obfuscation enabled
|
|
6
|
3470
|
June 8, 2020
|