Nytro Posted January 23, 2012 Report Posted January 23, 2012 [h=1]28C3: How governments have tried to block Tor (en)[/h]For more information visit: 28C3: speakersTo download the video visit: Documentation - 28C3 public wikiPlaylist 28C3: 28C3: Behind Enemy Lines - YouTube Speakers: Jacob Appelbaum | Roger DingledineIran blocked Tor handshakes using Deep Packet Inspection (DPI) in January2011 and September 2011. Bluecoat tested out a Tor handshake filter inSyria in June 2011. China has been harvesting and blocking IP addressesfor both public Tor relays and private Tor bridges for years.Roger Dingledine and Jacob Appelbaum will talk about how exactly thesegovernments are doing the blocking, both in terms of what signatures theyfilter in Tor (and how we've gotten around the blocking in each case),and what technologies they use to deploy the filters -- including theuse of Western technology to operate the surveillance and censorshipinfrastructure in Tunisia (Smartfilter), Syria (Bluecoat), and othercountries. We'll cover what we've learned about the mindset of the censoroperators (who in many cases don't want to block Tor because they useit!), and how we can measure and track the wide-scale censorship in thesecountries. Last, we'll explain Tor's development plans to get ahead ofthe address harvesting and handshake DPI arms races.Link: Tocmai l-am vazut, e ceva ce trebuie vazut, ce s-a intamplat in Iran, China, Siria, Tunisia, Egipt se poate intampla si la noi, si e bine sa stim ce se intampla, ce se poate face pentru monitorizarea traficului. Quote
actunderdc Posted January 23, 2012 Report Posted January 23, 2012 E misto, l-am vazut mai demult, tot aici a mai fost postat https://rstcenter.com/forum/45915-how-governments-have-tried-block-tor.rst Quote
Nytro Posted January 24, 2012 Author Report Posted January 24, 2012 Ah, stiam ca a mai fost postat, dar credeam ca versiunea in limba germana, de aceea am postat. Quote