[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #20348 [Metrics/Censorship analysis]: kz no need tor, tor no need kz, if anybody want they can to use ultrasurf. cyberoam assists bloody dictatorships.



#20348: kz no need tor, tor no need kz, if anybody want they can to use ultrasurf.
cyberoam assists bloody dictatorships.
-----------------------------------------+-------------------------
 Reporter:  dcf                          |          Owner:
     Type:  project                      |         Status:  closed
 Priority:  Medium                       |      Milestone:
Component:  Metrics/Censorship analysis  |        Version:
 Severity:  Normal                       |     Resolution:  invalid
 Keywords:  censorship block kz          |  Actual Points:
Parent ID:                               |         Points:
 Reviewer:                               |        Sponsor:
-----------------------------------------+-------------------------

Comment (by dcf):

 Replying to [comment:128 cypherpunks]:
 > How to reliably confirm/deny vendor of censorship box? It can be
 fortinet, cyberoam, bluecoat, something yet.

 Here is one paper on the subject:
   http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf
 They do an Internet-wide search (using e.g. [https://www.shodan.io/
 Shodan], [https://censys.io/ Censys], or [https://scans.io/ scans.io]
 data) for known strings. Then they submit new URLs and see whether they
 get blocked.

 Here's an example of using the technique to identify Netsweeper in
 Pakistan:
   https://citizenlab.org/2013/06/o-pakistan/

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20348#comment:130>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs