Tor’s Ooniprobe, Now Available On Android and iOS, Helps People Track Internet Censorship

In 2012, researchers at Tor announced Ooniprobe, an open-source tool to collect data about local meddling with the computer’s network connections, and also whether the government was censoring something. The team has now released a new app, available f… Continue reading Tor’s Ooniprobe, Now Available On Android and iOS, Helps People Track Internet Censorship

Camera Restricta Ensures Original Photography

Proper documentation is important, and when traveling it is commonly achieved via photography. Redundant documentation is often inefficient, and the Camera Restricta — in a commentary on the saturation of photographed landmarks and a recent debate on photographic censorship in the EU — aims to challenge the photographer into taking unique photographs.

Camera Restricta has a 3D-printed body, housing a smartphone for gps data, display and audio output, while an ATTiny85 serves to control the interdicting function of the camera. When the user sets up to take a picture using Camera Restricta, an app running on the phone queries a …read more

Continue reading Camera Restricta Ensures Original Photography

Can SNI faking be useful for bypassing web filters?

There are several countries in our progressive world that apply filtering rules defined by the state — implementing censorship.

As I can suppose, ISPs are blocking websites by their IPs. Just because they can’t see the URL inside the packet — it is behind the SSL/TLS.

But there is an another way of detection — SNI. It is just an optional extension, but it’s now commonly used and is sent in plaintext, so we can analyze it.

So what if we sniff the packet before sending and remove or change its SNI value to some allowed server?

If this substitution going to be detected by the server as MITM and my request will be dropped? Does it affect the checksum or some other authenticity parameters?

Continue reading Can SNI faking be useful for bypassing web filters?

Threatpost News Wrap, January 20, 2017

Mike Mimoso, Tom Spring, and Chris Brook discuss security-wise what they hope will and won’t change under a Trump presidency, then discuss the news of the week, including SHA-1 deprecation, Carbanak’s return, and the WhatsApp “backdoor” debacle. Continue reading Threatpost News Wrap, January 20, 2017

Internet Filtering in Authoritarian Regimes

Interesting research: Sebastian Hellmeier, "The Dictator’s Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes," Politics & Policy, 2016 (full paper is behind a paywall): Abstract: Following its global diffusion during the last decade, the Internet was expected to become a liberation technology and a threat for autocratic regimes by facilitating collective action. Recently, however, autocratic regimes took control… Continue reading Internet Filtering in Authoritarian Regimes

Internet Filtering in Authoritarian Regimes

Interesting research: Sebastian Hellmeier, "The Dictator’s Digital Toolkit: Explaining Variation in Internet Filtering in Authoritarian Regimes," Politics & Policy, 2016 (full paper is behind a paywall): Abstract: Following its global diffusion during the last decade, the Internet was expected to become a liberation technology and a threat for autocratic regimes by facilitating collective action. Recently, however, autocratic regimes took control… Continue reading Internet Filtering in Authoritarian Regimes