[tor-bugs] #20348 [Metrics/Censorship analysis]: kz no need tor, tor no need kz, if anybody want they can to use ultrasurf. cyberoam assists bloody dictatorships.
    Tor Bug Tracker & Wiki 
    blackhole at torproject.org
       
    Mon Dec  5 06:36:14 UTC 2016
    
    
  
#20348: kz no need tor, tor no need kz, if anybody want they can to use ultrasurf.
cyberoam assists bloody dictatorships.
-----------------------------------------+-------------------------
 Reporter:  dcf                          |          Owner:
     Type:  project                      |         Status:  closed
 Priority:  Medium                       |      Milestone:
Component:  Metrics/Censorship analysis  |        Version:
 Severity:  Normal                       |     Resolution:  invalid
 Keywords:  censorship block kz          |  Actual Points:
Parent ID:                               |         Points:
 Reviewer:                               |        Sponsor:
-----------------------------------------+-------------------------
Comment (by dcf):
 Replying to [comment:128 cypherpunks]:
 > How to reliably confirm/deny vendor of censorship box? It can be
 fortinet, cyberoam, bluecoat, something yet.
 Here is one paper on the subject:
   http://conferences.sigcomm.org/imc/2013/papers/imc112s-dalekA.pdf
 They do an Internet-wide search (using e.g. [https://www.shodan.io/
 Shodan], [https://censys.io/ Censys], or [https://scans.io/ scans.io]
 data) for known strings. Then they submit new URLs and see whether they
 get blocked.
 Here's an example of using the technique to identify Netsweeper in
 Pakistan:
   https://citizenlab.org/2013/06/o-pakistan/
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20348#comment:130>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
    
    
More information about the tor-bugs
mailing list