Towards a Censorship Analyser for Tor
نویسنده
چکیده
Analysing censorship incidents targeting popular circumvention tools such as Tor can be a tedious task. Access to censoring networks is typically difficult to obtain and remote analysis is not always possible. Analysis is however feasible if users behind the censoring networks are given the opportunity to help. In this paper, we propose a lightweight censorship analyser for Tor which is meant to be run by volunteering users. The analyser automatically gathers relevant data and the final report is sent back to the Tor developers. Our design builds on existing software and should be easy to bundle and deploy.
منابع مشابه
How China Is Blocking Tor
Abstract. Not only the free web is victim to China’s excessive censorship, but also the Tor anonymity network: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose countermeasures. Our work bolsters...
متن کاملHow the Great Firewall of China is Blocking Tor
Internet censorship in China is not just limited to the web: the Great Firewall of China prevents thousands of potential Tor users from accessing the network. In this paper, we investigate how the blocking mechanism is implemented, we conjecture how China’s Tor blocking infrastructure is designed and we propose circumvention techniques. Our work bolsters the understanding of China’s censorship ...
متن کاملTor’s Usability for Censorship Circumvention
Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...
متن کاملEnhancing Censorship Resistance in the Tor Anonymity Network
The Tor network was originally designed as low-latency anonymity network. However, over time Tor earned a reputation as also being a useful tool to circumvent Internet censorship—at times, the network counted 30,000 users only from China. Censors reacted by tightening their grip on the national communication infrastructure. In particular, they developed different techniques to prevent people fr...
متن کاملPoster: Games Without Frontiers: Investigating Video Games as a Covert Channel
Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...
متن کامل