Exploring foci of:
arXiv (Cornell University)
Detecting Censor Detection
September 2017 • David A. Fifield, Lynn Tsai, Qi Zhong
Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls. We examine a specific case, that of obfuscated Tor bridges, and conduct experiments designed to discover how long it takes censors to block them (if they do block at all). Through a year's worth of active measurements from China, Iran, Kazakhstan, and other countries, we learn when bridges become blocked. In China we found the most interesting behavior, including…
China
Computer Science
Machine Learning
Computer Security
Mathematics
Law
Geometry
The Dancers At The End Of Time
Hope Ii
The Ninth Wave
The Bureaucrats (1936 Film)
Main Page
The False Mirror
The Massacre At Chios
Weapons (2025 Film)
Zohran Mamdani
Squid Game Season 3
Technological Fix
Harvester Vase
Electronic Colonialism
Victoria Mboko
Lauren Sánchez
Jeff Bezos
Collective Action Problem
Shefali Jariwala
Hackers: Heroes Of The Computer Revolution
Community Fridge