Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
نویسندگان
چکیده
We present an empirical analysis of TOM-Skype censorship and surveillance. TOM-Skype is an Internet telephony and chat program that is a joint venture between TOM Online (a mobile Internet company in China) and Skype Limited. TOM-Skype contains both voice-overIP functionality and a chat client. The censorship and surveillance that we studied for this paper is specific to the chat client and is based on keywords that a user might type into a chat session. We were able to decrypt keyword lists used for censorship and surveillance. We also tracked the lists for a period of time and witnessed changes. Censored keywords range from obscene references, such as 二女一杯 (two girls one cup, the motivation for our title), to specific passages from 2011 China Jasmine Revolution protest instructions, such as 成都 春熙路麦当劳门前 (McDonald’s in front of Chunxi Road in Chengdu). Surveillance keywords are mostly related to demolitions in Beijing, such as灵境胡同拆迁 (Ling Jing Alley demolition). Based on this data, we present five conjectures that we believe to be formal enough to be hypotheses that the Internet censorship research community could potentially answer with more data and appropriate computational and analytic techniques.
منابع مشابه
Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel
Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...
متن کاملAcinetobacter baumannii: Researchers\' Scientific Cooperation Network in Three Decades
Background and Objective: Acinetobacter baumannii is one of the most common challenging pathogens in causing serious infections in intensive care units of modern hospital systems around the world and poses a serious threat to public and patient health. This study aims to analyze the network of scientific and empirical collaborations of A. baumanniii researchers in the last three decades. Metho...
متن کاملSkypeMorph: Protocol Obfuscation for Censorship Resistance
The Tor network is designed to provide users with low-latency anonymous communication. Tor clients build circuits with publicly listed relays to anonymously reach their destinations. Low-latency anonymous communication is also an essential property required by censorship circumvention tools and thus Tor has been widely used as a censorship resistance tool. However, since the Tor relays are publ...
متن کاملDeltaShaper: Enabling Unobservable Censorship-resistant TCP Tunneling over Videoconferencing Streams
This paper studies the possibility of using the encrypted video channel of widely used videoconferencing applications, such as Skype, as a carrier for unobservable covert TCP/IP communications. We propose and evaluate different alternatives to encode information in the video stream in order to increase available throughput while preserving the packetlevel characteristics of the video stream. We...
متن کاملPackets Lost in the Wild: An Analysis of Empirical Approaches to Measure Internet Censorship
Over the past 20 years, the Internet has transformed into a global medium of communication via the publishing and access of content. Even though it is built on the very axioms of global connectivity, free speech, and net neutrality, there have been multiple instances of blocking by censoring regimes to restrict Internet traffic across their borders. On average, 25.3% of Internet users experienc...
متن کامل