Paper summary: MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies (PETS 2020)
|
|
0
|
508
|
April 25, 2021
|
Paper summary: Investigating Large Scale HTTPS Interception in Kazakhstan (IMC 2020)
|
|
0
|
810
|
March 29, 2021
|
VPNalyzer
|
|
0
|
852
|
March 2, 2021
|
Paper summary: SiegeBreaker: An SDN Based Practical Decoy Routing System (PETS 2020)
|
|
0
|
689
|
February 8, 2021
|
A practical guide to defend against the GFW's latest active probing
|
|
0
|
2660
|
January 27, 2021
|
Paper summary: Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC (CCS 2020
|
|
0
|
586
|
December 4, 2020
|
GFW Archaeology: gfw-looking-glass.sh
|
|
4
|
1644
|
October 25, 2020
|
Censored continent: Understanding the use of tools during Internet censorship in Africa: Cameroon, Nigeria, Uganda and Zimbabwe as case studies
|
|
2
|
573
|
October 23, 2020
|
Paper summary: MassBrowser: Unblocking the Censored Web for the Masses, by the Masses (NDSS 20)
|
|
2
|
784
|
October 23, 2020
|
Telegram Messenger Anti-Censorship
|
|
0
|
668
|
October 6, 2020
|
Paper summary: ICLab: A Global, Longitudinal Internet Censorship Measurement Platform (S&P 2020)
|
|
0
|
629
|
October 5, 2020
|
List of ways to bypass censorship
|
|
0
|
684
|
September 26, 2020
|
Paper summary: Slitheen++: Stealth TLS-based Decoy Routing (FOCI 2020)
|
|
0
|
599
|
September 2, 2020
|
Paper summary: HTTPT: A Probe-Resistant Proxy (FOCI 2020)
|
|
0
|
653
|
September 1, 2020
|
Paper summary: Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter (FOCI 2020)
|
|
0
|
606
|
August 26, 2020
|
Paper summary: Opening Digital Borders Cautiously yet Decisively: Digital Filtering in Saudi Arabia (FOCI 2020)
|
|
0
|
551
|
August 25, 2020
|
Paper summary: Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior (FOCI 2020)
|
|
0
|
608
|
August 24, 2020
|
Decryption vulnerability in Shadowsocks stream ciphers
|
|
0
|
946
|
February 25, 2020
|
Summary on Recently Discovered V2Ray Weaknesses
|
|
0
|
2786
|
June 16, 2020
|
Testing Shadowsocks UDP handling with obfuscation enabled
|
|
6
|
10199
|
June 8, 2020
|
Paper summary: Measuring the Deployment of Network Censorship Filters at Global Scale (NDSS 20)
|
|
0
|
831
|
May 18, 2020
|
Paper summary: SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery (NDSS 20)
|
|
0
|
594
|
April 27, 2020
|
Paper summary: An Empirical Study of the Cost of DNS-over-HTTPS (IMC 19)
|
|
0
|
891
|
March 30, 2020
|
Paper summary: An End-to-End, Large-Scale Measurement of DNS-over-Encryption: How Far Have We Come? (IMC 19)
|
|
0
|
601
|
March 31, 2020
|
Paper summary: Detecting Probe-resistant Proxies (NDSS 20)
|
|
0
|
825
|
March 16, 2020
|
Paper summary: Geneva: Evolving Censorship Evasion Strategies (CCS 19)
|
|
1
|
1163
|
January 6, 2020
|
Paper summary: Decentralized Control: A Case Study of Russia (NDSS 20)
|
|
2
|
990
|
December 19, 2019
|
Paper summary: Conjure: Summoning Proxies from Unused Address Space (CCS 19)
|
|
0
|
691
|
December 1, 2019
|
Cloudflare blocked IP circumvention
|
|
6
|
2501
|
November 6, 2019
|
HTTP headers/TLS padding as a censorship circumvention method
|
|
3
|
4635
|
October 28, 2019
|