TSPU: Russia's decentralized censorship system

D Xue, B Mixon-Baca, ValdikSS, A Ablove… - Proceedings of the …, 2022 - dl.acm.org
Russia's Sovereign RuNet was designed to build a Russian national firewall. Previous
anecdotes and isolated events in the past two years reflected centrally coordinated censorship …

Investigating the VPN Ecosystem through the Lens of Security, Privacy, and Usability

R Ramesh - 2023 - deepblue.lib.umich.edu
Global events affect the Internet in new ways every day, be it through increased blocking
during sensitive events or through user tracking, surveillance, and targeting. Governments, …

[HTML][HTML] Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI

MB de Assumpção, MA dos Reis… - Forensic Science …, 2023 - Elsevier
Starting from Windows 11, the Trusted Platform Module (TPM) 2.0 has become a computer
requirement, providing hardware-based security capabilities. This poses a challenge to …

TCP Segmentation to Evade NIDS

Y Lamansky - 2024 - search.proquest.com
The rapid expansion of the internet has not only revolutionized global access to information,
but has led to the widespread implementation of internet censorship by governments and …

[PDF][PDF] Evaluating server-side internet proxy detection methods

H Hoogstraaten - 2018 - filelist.tudelft.nl
In today’s use of the internet it is popular to obfuscate the originating Internet Protocol (IP)
address to the receiving end of the internet connection. This can be achieved by using an …

Poster: Circumventing the GFW with TLS Record Fragmentation

N Niere, S Hebrok, J Somorovsky… - Proceedings of the 2023 …, 2023 - dl.acm.org
State actors around the world censor the HTTPS protocol to block access to certain websites.
While many circumvention strategies utilize the TCP layer only little emphasis has been …

[HTML][HTML] Unmixing the mix: Patterns and challenges in Bitcoin mixer investigations

P Tippe, C Deckers - Forensic Science International: Digital Investigation, 2025 - Elsevier
This paper investigates the operational patterns and forensic traceability of Bitcoin mixing
services, which pose significant challenges to anti-money laundering efforts. We analyze …

Throttling Twitter: an emerging censorship technique in Russia

D Xue, R Ramesh, VS S, L Evdokimov… - Proceedings of the 21st …, 2021 - dl.acm.org
… On the same day, internet user ValdikSS disclosed that the relaxed regular expression
matching rule *t.co* was being used, which caused considerable collateral damage [34] to non-…

Reducing distinguishability of DTLS for usage in Snowflake

TS Midtlien - 2024 - ntnuopen.ntnu.no
… The fingerprint was found in Snowflake captures from ValdikSS in 20216, and was not found
in the non-snowflake capture7 from the same time. The fingerprint was also found by joining …

Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer

N Niere, F Lange, R Merget… - 2025 IEEE Symposium on …, 2025 - computer.org
HTTPS composes large parts of today’s Internet traffic and has long been subject to censorship
efforts in different countries. While censors analyze the Transport Layer Security (TLS) …