{SpotProxy}: Rediscovering the Cloud for Censorship Circumvention
Censorship circumvention is often fueled by supporters out of goodwill. However, hosting
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …
circumvention proxies can be costly, especially when they are placed in the cloud. We argue …
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape
The ecosystem of censorship circumvention tools (CTs) remains one of the most opaque
and least understood, overshadowed by the precarious legal status around their usage and …
and least understood, overshadowed by the precarious legal status around their usage and …
Global, passive detection of connection tampering
In-network devices around the world monitor and tamper with connections for many reasons,
including intrusion prevention, combating spam or phishing, and country-level censorship …
including intrusion prevention, combating spam or phishing, and country-level censorship …
Digital discrimination of users in sanctioned states: the case of the cuba embargo
A Ablove, S Chandrashekaran, H Le… - 33rd USENIX Security …, 2024 - usenix.org
We present one of the first in-depth and systematic end-user centered investigations into the
effects of sanctions on geoblocking, specifically in the case of Cuba. We conduct network …
effects of sanctions on geoblocking, specifically in the case of Cuba. We conduct network …
Learning from Censored Experiences: Social Media Discussions around Censorship Circumvention Technologies
During periods of strict internet censorship, maintaining access to online information and
communication becomes paramount. However, users often have to navigate complicated …
communication becomes paramount. However, users often have to navigate complicated …
Understanding Routing-Induced Censorship Changes Globally
Internet censorship is pervasive, with significant effort dedicated to understanding what is
censored, and where. Prior censorship measurements however have identified significant …
censored, and where. Prior censorship measurements however have identified significant …
Getting bored of cyberwar: Exploring the role of civilian hacktivists in the Russia-Ukraine conflict
There has been substantial commentary on the role of cyberattacks and civilian hacktivists in
the Russia-Ukraine conflict. Drawing on a range of data sources, we argue that the widely …
the Russia-Ukraine conflict. Drawing on a range of data sources, we argue that the widely …
Getting bored of cyberwar: exploring the role of low-level cybercrime actors in the Russia-Ukraine conflict
There has been substantial commentary on the role of cyberattacks carried out by low-level
cybercrime actors in the Russia-Ukraine conflict. We analyse 358k website defacement …
cybercrime actors in the Russia-Ukraine conflict. We analyse 358k website defacement …
Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
Many censorship evasion systems rely on establishing a connection between the user and a
proxy that acts as the gateway to censored content. However, informing the user about proxy …
proxy that acts as the gateway to censored content. However, informing the user about proxy …
Why ET Can't Phone Home: A Global View on IP-based Geoblocking at VoWiFi
In current cellular network generations (4G, 5G) the IMS (IP Multimedia Subsystem) plays an
integral role in terminating voice calls and short messages. Many operators use VoWiFi …
integral role in terminating voice calls and short messages. Many operators use VoWiFi …