Open Observatory of Network Interference (OONI) probe: agent that runs on volunteers’ personal computers
Client will send a request to server of interest through censor, but also through control relay
Limitations:
Scale
Coverage
Continuity
Cost
Ethics
When is it safe to use volunteers’ devices?
What population of users are affected?
What risks do volunteers occur, and do benefits balance these risks?
Spooky scans (Ensafi et al. PAM 2014): using TCP/IP side channels to detect if clients and servers can communicate
Can detect “no blocking”; “server-to-client blocking”, “client-to-server blocking” by using IP spoofing from a measurement to measure behavior of client/server communication through censor
This can uncover IP blocking
Censored Planet Obeservatory
Many different techniques
Detect blocking on TCP/IP, HTTP, HTTPS, Echo, Discard
Impact: study of 2019 Kazakhstan national TLS interception that led to Firefox and Chrome pushing updates to block usage of Kazakh root CA certificate
Censor only sees that user is trying to reach benign proxy server, not a blocked service
Very easy to detect; becomes a cat-and-mouse game for censors
Imitate non-censored protocols
Skypemorph (2012): disguise Tor traffic as skype video traffic using fake skype servers and clients
But: also easy for censors to detect using network features (e.g. anomalous-looking UDP packets as a key) - Houmansadr et al. 2013
Refraction networking
Bring proxy behavior into the core of the network via cooperation with friendly ISPs
When user requests a blocked site, client software requests a reachable site hosted by ISP partner network; censor allows request to pass through; ISP partner refracts request to the blocked site