[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #20348 [Metrics/Censorship analysis]: kz no need tor, tor no need kz, if anybody want they can to use ultrasurf. cyberoam assists bloody dictatorships.
#20348: kz no need tor, tor no need kz, if anybody want they can to use ultrasurf.
cyberoam assists bloody dictatorships.
-----------------------------------------+-------------------------
Reporter: dcf | Owner:
Type: project | Status: closed
Priority: Medium | Milestone:
Component: Metrics/Censorship analysis | Version:
Severity: Normal | Resolution: invalid
Keywords: censorship block kz | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor:
-----------------------------------------+-------------------------
Comment (by dcf):
Replying to [comment:128 cypherpunks]:
> How to reliably confirm/deny vendor of censorship box? It can be
fortinet, cyberoam, bluecoat, something yet.
Here is one paper on the subject:
http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf
They do an Internet-wide search (using e.g. [https://www.shodan.io/
Shodan], [https://censys.io/ Censys], or [https://scans.io/ scans.io]
data) for known strings. Then they submit new URLs and see whether they
get blocked.
Here's an example of using the technique to identify Netsweeper in
Pakistan:
https://citizenlab.org/2013/06/o-pakistan/
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20348#comment:130>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs