TSPU: Russia's decentralized censorship system
Russia's Sovereign RuNet was designed to build a Russian national firewall. Previous
anecdotes and isolated events in the past two years reflected centrally coordinated censorship …
anecdotes and isolated events in the past two years reflected centrally coordinated censorship …
Investigating the VPN Ecosystem through the Lens of Security, Privacy, and Usability
R Ramesh - 2023 - deepblue.lib.umich.edu
Global events affect the Internet in new ways every day, be it through increased blocking
during sensitive events or through user tracking, surveillance, and targeting. Governments, …
during sensitive events or through user tracking, surveillance, and targeting. Governments, …
[HTML][HTML] Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI
MB de Assumpção, MA dos Reis… - Forensic Science …, 2023 - Elsevier
Starting from Windows 11, the Trusted Platform Module (TPM) 2.0 has become a computer
requirement, providing hardware-based security capabilities. This poses a challenge to …
requirement, providing hardware-based security capabilities. This poses a challenge to …
TCP Segmentation to Evade NIDS
Y Lamansky - 2024 - search.proquest.com
The rapid expansion of the internet has not only revolutionized global access to information,
but has led to the widespread implementation of internet censorship by governments and …
but has led to the widespread implementation of internet censorship by governments and …
[PDF][PDF] Evaluating server-side internet proxy detection methods
H Hoogstraaten - 2018 - filelist.tudelft.nl
In today’s use of the internet it is popular to obfuscate the originating Internet Protocol (IP)
address to the receiving end of the internet connection. This can be achieved by using an …
address to the receiving end of the internet connection. This can be achieved by using an …
Poster: Circumventing the GFW with TLS Record Fragmentation
State actors around the world censor the HTTPS protocol to block access to certain websites.
While many circumvention strategies utilize the TCP layer only little emphasis has been …
While many circumvention strategies utilize the TCP layer only little emphasis has been …
[HTML][HTML] Unmixing the mix: Patterns and challenges in Bitcoin mixer investigations
P Tippe, C Deckers - Forensic Science International: Digital Investigation, 2025 - Elsevier
This paper investigates the operational patterns and forensic traceability of Bitcoin mixing
services, which pose significant challenges to anti-money laundering efforts. We analyze …
services, which pose significant challenges to anti-money laundering efforts. We analyze …
Throttling Twitter: an emerging censorship technique in Russia
… On the same day, internet user ValdikSS disclosed that the relaxed regular expression
matching rule *t.co* was being used, which caused considerable collateral damage [34] to non-…
matching rule *t.co* was being used, which caused considerable collateral damage [34] to non-…
Reducing distinguishability of DTLS for usage in Snowflake
TS Midtlien - 2024 - ntnuopen.ntnu.no
… The fingerprint was found in Snowflake captures from ValdikSS in 20216, and was not found
in the non-snowflake capture7 from the same time. The fingerprint was also found by joining …
in the non-snowflake capture7 from the same time. The fingerprint was also found by joining …
Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer
HTTPS composes large parts of today’s Internet traffic and has long been subject to censorship
efforts in different countries. While censors analyze the Transport Layer Security (TLS) …
efforts in different countries. While censors analyze the Transport Layer Security (TLS) …