Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Internet Web servers: workload characterization and performance implications
IEEE/ACM Transactions on Networking (TON)
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Telex: anticensorship in the network infrastructure
SEC'11 Proceedings of the 20th USENIX conference on Security
StegoTorus: a camouflage proxy for the Tor anonymity system
Proceedings of the 2012 ACM conference on Computer and communications security
Proceedings of the 22nd international conference on World Wide Web companion
A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies
International Journal of E-Politics
Conscript your friends into larger anonymity sets with JavaScript
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.00 |
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that generates a large number of short-lived proxies. Clients using the system seamlessly hop from one proxy to the next as these browser-based proxies appear and disappear. We discuss a number of technical challenges that had to be overcome for this system to work and report on its performance and security. We show that browser-based short-lived proxies provide adequate bandwidth for video delivery and argue that blocking them can be challenging.