Examining How the Great Firewall Discovers Hidden Circumvention Servers

Internet Measurement Conference, 2015.

Cited by: 67|Bibtex|Views45|DOI:https://doi.org/10.1145/2815675.2815690
EI
Other Links: academic.microsoft.com|dblp.uni-trier.de|dl.acm.org

Abstract:

Recently, the operators of the national censorship infrastructure of China began to employ \"active probing\" to detect and block the use of privacy tools. This probing works by passively monitoring the network for suspicious traffic, then actively probing the corresponding servers, and blocking any that are determined to run circumventio...More

Code:

Data:

Your rating :
0

 

Tags
Comments