PGP source code and internals
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
An algorithmic approach to social networks
An algorithmic approach to social networks
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
ConceptDoppler: a weather tracker for internet censorship
Proceedings of the 14th ACM conference on Computer and communications security
DHT routing using social links
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Ignoring the great firewall of china
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Authenticated out-of-band communication over social links
Proceedings of the first workshop on Online social networks
Sybil-resilient online content voting
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
FaceTrust: assessing the credibility of online personas via social networks
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Chipping away at censorship firewalls with user-generated content
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
Proximax: measurement-driven proxy dissemination (short paper)
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing
Proceedings of the 2012 ACM conference on Computer and communications security
A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies
International Journal of E-Politics
Leveraging Social Feedback to Verify Online Identity Claims
ACM Transactions on the Web (TWEB)
Hi-index | 0.00 |
Many countries exploit control over the Internet infrastructure to block access to "grey" materials. One common way to access blocked contents is to relay traffic via an unblocked proxy operating outside the censored domain. This paper discusses the challenges facing any proxy-based circumvention system and argues that a successful system should disseminate proxies' addresses to legitimate users while shielding the addresses from the censor who, posing as a user, could learn of and block the proxies themselves.We propose Kaleidoscope, a circumvention system that disseminates proxy addresses over a social network whose links correspond to existing real world social relationships among users. Kaleidoscope ensures each node learns only a small, consistent subset of the proxies. Because the censor is unlikely to subvert a large fraction of the social graph, he is not able to learn of, and thus block, a large number of proxies.