SlideShare a Scribd company logo
1 of 35
Download to read offline
Censorship detection
                            Arturo `hellais` Filasto’




Sunday, September 4, 2011
Whoami

                    • @hellais on twitter
                    • hellais@torproject.org
                    • art@globaleaks.org
                    • art@fuffa.org
                    • art@winstonsmith.org

Sunday, September 4, 2011
What is Censorship?

                    • Internet filtering is a form of non
                            democratic oppression on people.
                    • It allows those in power to subvert the
                            reality.




Sunday, September 4, 2011
Filternet

                    • It’s a distorsion of what is in reality the
                            internet.
                    • Follows the subjectiveness of the
                            authorities
                    • This does not help humanity

Sunday, September 4, 2011
La soluzione a quelli che sono percepiti
                 soggettivamente come contenuti inappropriati è
                           oggettivamente più contenuti




Sunday, September 4, 2011
Tor

                    • Tor software downloads are currently
                            blocked from China, Iran, Lebanon, Qatar,
                            etc.
                    • Tor delivers via email, write to
                            gettor@torproject.org and we will send
                            you a client to bootstrap a Tor client



Sunday, September 4, 2011
Hidden Services


                    • They allow a server to give access to
                            content anonymously
                    • This bypasses censorship in place


Sunday, September 4, 2011
Tor Hidden Services

                    • am4wuhz3zifexz5u.onion
                    • Anonymity for the Server
                    • DoS protection
                    • End-To-End encryption

Sunday, September 4, 2011
How HS work

                Client
                                         Hidden Server
                               IP

                               IP
                                    IP



Sunday, September 4, 2011
How HS work

                    Client
                                           Hidden Server
                                 IP

                                 IP
                                      IP
                        RP



Sunday, September 4, 2011
Why use HS

                    • Avoid retaliation for what you publish
                    • Securely host and serve content
                    • Stealth Hidden Service


Sunday, September 4, 2011
How filtering is
                                 performed
                    • Depends on the location and entities
                            performing it
                    • A mix of commercial products and open
                            source software
                            • Lebanon ISP’s use Free Software
                            • Syria uses commercial Blue Coat devices
                            • US/NSA use commercial Narus devices
Sunday, September 4, 2011
Filtering taxonomy

                    • Logging (passive)
                    • Network and protocol Hijacking
                    • Injection (modify content, 302, rst etc.)
                    • Dropping (packets not transmitted)

Sunday, September 4, 2011
Filter detection
                                   techniques

                    • Important to classify by risk profile
                    • People running filter detection tools must
                            know how invasive the technique is




Sunday, September 4, 2011
OONI

                    • Open Observatory of Network
                            Interference
                    • I am working on this with Jacob Appelbaum
                            as part of The Tor Project
                    • An extensible and flexible tool to perform
                            censorship detection



Sunday, September 4, 2011
Existing testing tools

                    • Netalyzr, rTurtle, Herdict.
                    • Unfortunately either the raw data results
                            or even the tools themselves are closed :(
                    • They only release reports, without the
                            original raw data



Sunday, September 4, 2011
Goals for OONI

                    • Make a something Open Source and publish
                            the raw data collected
                    • Have hackers write code and sociologist
                            write reports ;)




Sunday, September 4, 2011
Filtering detection
                                     techniques
                    •       High risk and Active
                            •   request for certain “bad” resources (test censorship lists)
                            •   keyword injection
                            •   anything that may trigger DPI devices
                    •       Low risk and Active
                            •   TTL walking
                            •   Network latency
                    •       Passive
                            •   In the future proxooni to proxy traffic with a SOCKS proxy and
                                detect anomalies as the user does his normal internet activities



Sunday, September 4, 2011
Fingerprinting of the
                                 application

                    • Most existing tools that we audited leak
                            who they are
                    • In OONI reports will only be submitted
                            over Tor




Sunday, September 4, 2011
The scientific method
                    • Control
                      • What you know is a good result
                      • It can also be a request done over Tor
                    • Experiment
                      • Check if it matches up with the result
                      • If it does not there is an anomaly that
                            must be explored


Sunday, September 4, 2011
Brief excursus on
                            censorship in the
                                  World


Sunday, September 4, 2011
Syria: BlueCoat

                    • They are using commerical bluecoat
                            devices
                    • Anonymous Telecomix contributors
                            produced a good analysis




Sunday, September 4, 2011
Syria: BlueCoat
                    •       SERVER is located outside Syria
                    •       CLIENT1 is located inside Syria
                    •       CLIENT connects to SERVER port 5060, no
                            connection
                    •       CLIENT connects to SERVER port 443,
                            connection works
                    •       CLIENT connects to SERVER port 80, the
                            headers in the response are rewritten


Sunday, September 4, 2011
Syria: BlueCoat
                                           GET /HTTP/1.1
                                           Host: SERVER
                              User-Agent: Standard-browser-User-Agent
                                       Accept: text/html,etc.
                                  Accept-Encoding: gzip,deflate,sdch
                                  Accept-Language: en-US,en;q=0.8
                            Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
                                    X-Forwarded-For: CLIENT
                                    Cache-Control: max-stale=0
                                      Connection: Keep-Alive
                                X-BlueCoat-Via: 2C044BEC00210EB6




Sunday, September 4, 2011
Syria: BlueCoat


                    • More details and funness to come in the
                            following days ;)




Sunday, September 4, 2011
Funny ⅖ Off Topic
                                discovery
                    • Who has ever used a captive portal?
                    • Skype makes you pay access with it’s credit
                    • It has problems doing login
                    • It uses a captive portal

Sunday, September 4, 2011
Sunday, September 4, 2011
Iran




Sunday, September 4, 2011
Iran

                    •       Nokia has reportedly sold equipment to the
                            Iranian government. It helps wiretap, track,
                            and crush dissenting members of Iranian
                            society. Nokia claims that this is ethical
                            because they were forced to put legal
                            intercepts into their products by the West.




Sunday, September 4, 2011
Italy

                    • Currently two methods are being used:
                     • DNS based
                     • ISP level blacklisting


Sunday, September 4, 2011
Sunday, September 4, 2011
libero.it




Sunday, September 4, 2011
Free communications


                    • Are something that is important to the
                            progress of humanity.




Sunday, September 4, 2011
Questions?




Sunday, September 4, 2011
Sunday, September 4, 2011

More Related Content

Similar to Censorship Detection Techniques

サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011Gohsuke Takama
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Fred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UIFred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UIAxway Appcelerator
 
Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011Charles Nutter
 
Using+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applicationsUsing+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applicationsMuhammad Ikram Ul Haq
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive SecurityAndy Hoernecke
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive securityScott Behrens
 
Intro to Micro-frameworks
Intro to Micro-frameworksIntro to Micro-frameworks
Intro to Micro-frameworksjsmith92
 
102611 justice and journalism
102611 justice and journalism102611 justice and journalism
102611 justice and journalismVal Hoeppner
 
Doctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 ParisDoctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 ParisJonathan Wage
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven Innovationideas.org
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven InnovationSimon Grice
 
Track f interoperable ip-delivery_ch_e ofer shragay
Track f   interoperable ip-delivery_ch_e ofer shragayTrack f   interoperable ip-delivery_ch_e ofer shragay
Track f interoperable ip-delivery_ch_e ofer shragaychiportal
 
2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN Architecture2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN ArchitectureSimon Coles
 
Are Your Tests Really Helping You?
Are Your Tests Really Helping You?Are Your Tests Really Helping You?
Are Your Tests Really Helping You?LB Denker
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
 

Similar to Censorship Detection Techniques (20)

GloabLeaks ESC2011
GloabLeaks ESC2011GloabLeaks ESC2011
GloabLeaks ESC2011
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
 
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
サイバー犯罪・サイバースパイ活動とアイデンティティ_11-04-2011
 
Pres e safety-yd
Pres e safety-ydPres e safety-yd
Pres e safety-yd
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Fred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UIFred Spencer: Designing a Great UI
Fred Spencer: Designing a Great UI
 
Managing in an XML environment
Managing in an XML environmentManaging in an XML environment
Managing in an XML environment
 
Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011Building Languages for the JVM - StarTechConf 2011
Building Languages for the JVM - StarTechConf 2011
 
Using+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applicationsUsing+javascript+to+build+native+i os+applications
Using+javascript+to+build+native+i os+applications
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive security
 
Intro to Micro-frameworks
Intro to Micro-frameworksIntro to Micro-frameworks
Intro to Micro-frameworks
 
102611 justice and journalism
102611 justice and journalism102611 justice and journalism
102611 justice and journalism
 
Doctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 ParisDoctrine In The Real World sflive2011 Paris
Doctrine In The Real World sflive2011 Paris
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven Innovation
 
Data Driven Innovation
Data Driven InnovationData Driven Innovation
Data Driven Innovation
 
Track f interoperable ip-delivery_ch_e ofer shragay
Track f   interoperable ip-delivery_ch_e ofer shragayTrack f   interoperable ip-delivery_ch_e ofer shragay
Track f interoperable ip-delivery_ch_e ofer shragay
 
2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN Architecture2005 04 05 SRI ELN Architecture
2005 04 05 SRI ELN Architecture
 
Are Your Tests Really Helping You?
Are Your Tests Really Helping You?Are Your Tests Really Helping You?
Are Your Tests Really Helping You?
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Censorship Detection Techniques

  • 1. Censorship detection Arturo `hellais` Filasto’ Sunday, September 4, 2011
  • 2. Whoami • @hellais on twitter • hellais@torproject.org • art@globaleaks.org • art@fuffa.org • art@winstonsmith.org Sunday, September 4, 2011
  • 3. What is Censorship? • Internet filtering is a form of non democratic oppression on people. • It allows those in power to subvert the reality. Sunday, September 4, 2011
  • 4. Filternet • It’s a distorsion of what is in reality the internet. • Follows the subjectiveness of the authorities • This does not help humanity Sunday, September 4, 2011
  • 5. La soluzione a quelli che sono percepiti soggettivamente come contenuti inappropriati è oggettivamente più contenuti Sunday, September 4, 2011
  • 6. Tor • Tor software downloads are currently blocked from China, Iran, Lebanon, Qatar, etc. • Tor delivers via email, write to gettor@torproject.org and we will send you a client to bootstrap a Tor client Sunday, September 4, 2011
  • 7. Hidden Services • They allow a server to give access to content anonymously • This bypasses censorship in place Sunday, September 4, 2011
  • 8. Tor Hidden Services • am4wuhz3zifexz5u.onion • Anonymity for the Server • DoS protection • End-To-End encryption Sunday, September 4, 2011
  • 9. How HS work Client Hidden Server IP IP IP Sunday, September 4, 2011
  • 10. How HS work Client Hidden Server IP IP IP RP Sunday, September 4, 2011
  • 11. Why use HS • Avoid retaliation for what you publish • Securely host and serve content • Stealth Hidden Service Sunday, September 4, 2011
  • 12. How filtering is performed • Depends on the location and entities performing it • A mix of commercial products and open source software • Lebanon ISP’s use Free Software • Syria uses commercial Blue Coat devices • US/NSA use commercial Narus devices Sunday, September 4, 2011
  • 13. Filtering taxonomy • Logging (passive) • Network and protocol Hijacking • Injection (modify content, 302, rst etc.) • Dropping (packets not transmitted) Sunday, September 4, 2011
  • 14. Filter detection techniques • Important to classify by risk profile • People running filter detection tools must know how invasive the technique is Sunday, September 4, 2011
  • 15. OONI • Open Observatory of Network Interference • I am working on this with Jacob Appelbaum as part of The Tor Project • An extensible and flexible tool to perform censorship detection Sunday, September 4, 2011
  • 16. Existing testing tools • Netalyzr, rTurtle, Herdict. • Unfortunately either the raw data results or even the tools themselves are closed :( • They only release reports, without the original raw data Sunday, September 4, 2011
  • 17. Goals for OONI • Make a something Open Source and publish the raw data collected • Have hackers write code and sociologist write reports ;) Sunday, September 4, 2011
  • 18. Filtering detection techniques • High risk and Active • request for certain “bad” resources (test censorship lists) • keyword injection • anything that may trigger DPI devices • Low risk and Active • TTL walking • Network latency • Passive • In the future proxooni to proxy traffic with a SOCKS proxy and detect anomalies as the user does his normal internet activities Sunday, September 4, 2011
  • 19. Fingerprinting of the application • Most existing tools that we audited leak who they are • In OONI reports will only be submitted over Tor Sunday, September 4, 2011
  • 20. The scientific method • Control • What you know is a good result • It can also be a request done over Tor • Experiment • Check if it matches up with the result • If it does not there is an anomaly that must be explored Sunday, September 4, 2011
  • 21. Brief excursus on censorship in the World Sunday, September 4, 2011
  • 22. Syria: BlueCoat • They are using commerical bluecoat devices • Anonymous Telecomix contributors produced a good analysis Sunday, September 4, 2011
  • 23. Syria: BlueCoat • SERVER is located outside Syria • CLIENT1 is located inside Syria • CLIENT connects to SERVER port 5060, no connection • CLIENT connects to SERVER port 443, connection works • CLIENT connects to SERVER port 80, the headers in the response are rewritten Sunday, September 4, 2011
  • 24. Syria: BlueCoat GET /HTTP/1.1 Host: SERVER User-Agent: Standard-browser-User-Agent Accept: text/html,etc. Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 X-Forwarded-For: CLIENT Cache-Control: max-stale=0 Connection: Keep-Alive X-BlueCoat-Via: 2C044BEC00210EB6 Sunday, September 4, 2011
  • 25. Syria: BlueCoat • More details and funness to come in the following days ;) Sunday, September 4, 2011
  • 26. Funny ⅖ Off Topic discovery • Who has ever used a captive portal? • Skype makes you pay access with it’s credit • It has problems doing login • It uses a captive portal Sunday, September 4, 2011
  • 29. Iran • Nokia has reportedly sold equipment to the Iranian government. It helps wiretap, track, and crush dissenting members of Iranian society. Nokia claims that this is ethical because they were forced to put legal intercepts into their products by the West. Sunday, September 4, 2011
  • 30. Italy • Currently two methods are being used: • DNS based • ISP level blacklisting Sunday, September 4, 2011
  • 33. Free communications • Are something that is important to the progress of humanity. Sunday, September 4, 2011