Concepedia

Publication | Closed Access

Examining How the Great Firewall Discovers Hidden Circumvention Servers

103

Citations

16

References

2015

Year

Abstract

Recently, the operators of the national censorship infrastructure of China began to employ "active probing" to detect and block the use of privacy tools. This probing works by passively monitoring the network for suspicious traffic, then actively probing the corresponding servers, and blocking any that are determined to run circumvention servers such as Tor.

References

YearCitations

Page 1