2012
DOI: 10.1007/978-3-642-31680-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Evading Censorship with Browser-Based Proxies

Abstract: Abstract. While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that generates a large number of short-lived proxies. Clients using the system seamlessly hop from one proxy to the next as these browserbased proxies appear and disappear. We discuss a number of technical challenge… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 44 publications
(35 citation statements)
references
References 7 publications
0
35
0
Order By: Relevance
“…As a comparison, Tor can provide speed ranging in 40-300 KB/s and when introducing obfuscation plugins, the speed can only reach 30-80 KB/s [13,14]. The overhead of traffic shaping is about 30%, which is similar to SkypeMorph [14].…”
Section: B Throughput Performance 1) Upper Bound Performancementioning
confidence: 99%
See 2 more Smart Citations
“…As a comparison, Tor can provide speed ranging in 40-300 KB/s and when introducing obfuscation plugins, the speed can only reach 30-80 KB/s [13,14]. The overhead of traffic shaping is about 30%, which is similar to SkypeMorph [14].…”
Section: B Throughput Performance 1) Upper Bound Performancementioning
confidence: 99%
“…Our threat model is similar to other censorship circumvention tools [13], there are 4 objects in our model:…”
Section: A Threat Model and Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Bridges that run the flashproxy [18] and meek [19] transports route traffic through third party web browsers and content delivery networks. The bridges and transports that are accessible in each country vary.…”
Section: Introductionmentioning
confidence: 99%
“…Most notable among these is Tor [2], which, while originally designed to provide anonymity, has also seen wide use in circumvention. Other proposals include Telex [3], Infranet [4] and Ultrasurf [5] as well as several enhancements to Tor [6][7][8]. The existence of circumvention systems makes the censor's job harder: The censor must block all circumvention tools in order to remain effective.…”
Section: Introductionmentioning
confidence: 99%