How governments have tried to block Tor [28C3]

From: youtube.com

torproject.org

Iran blocked Tor handshakes using Deep Packet Inspection (DPI) in January 2011 and September 2011. Bluecoat tested out a Tor handshake filter in Syria in June 2011. China has been harvesting and blocking IP addresses for both public Tor relays and private Tor bridges for years.

Roger Dingledine and Jacob Appelbaum will talk about how exactly these governments are doing the blocking, both in terms of what signatures they filter in Tor (and how weve gotten around the blocking in each case), and what technologies they use to deploy the filters — including the use of Western technology to operate the surveillance and censorship infrastructure in Tunisia (Smartfilter), Syria (Bluecoat), and other countries. Well cover what weve learned about the mindset of the censor operators (who in many cases dont want to block Tor because they use it!), and how we can measure and track the wide-scale censorship in these countries. Last, well explain Tors development plans to get ahead of the address harvesting and handshake DPI arms races.

From the 28th Chaos Communication Congress (28C3) by the Chaos Computer Club [CCC]

More: torproject.org

Source: youtube.com

Views: 0

You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Powered by WordPress | Designed by: Premium WordPress Themes | Thanks to Themes Gallery, Bromoney and Wordpress Themes