Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data
@article{Gill2015CharacterizingWC, title={Characterizing Web Censorship Worldwide: Another Look at the OpenNet Initiative Data}, author={Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman}, journal={ACM Trans. Web}, year={2015}, volume={9}, pages={4:1-4:29} }
In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, this data had been analyzed with little automation, focusing on what content had been blocked, rather than how blocking was carried out. In this study, we use more rigorous automation to obtain a longitudinal, global view of the technical means used for web censorship. We also identify blocking that…
Figures and Tables from this paper
34 Citations
Where The Light Gets In: Analyzing Web Censorship Mechanisms in India
- Computer ScienceInternet Measurement Conference
- 2018
This work developed various techniques and heuristics to correctly assess censorship and study the underlying mechanism used by nine major ISPs in India, and demonstrated that existing censorship detection tools like OONI are grossly inaccurate.
Measuring I2P Censorship at a Global Scale
- Computer ScienceFOCI @ USENIX Security Symposium
- 2019
This paper presents an opportunistic censorship measurement infrastructure built on top of a network of distributed VPN servers run by volunteers, which was used to measure the extent to which the I2P anonymity network is blocked around the world.
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
- Computer Science2020 IEEE Symposium on Security and Privacy (SP)
- 2020
ICLab, an Internet measurement platform specialized for censorship research, is presented, which achieves a new balance between breadth of coverage and detail of measurements, by using commercial VPNs as vantage points distributed around the world.
Analyzing internet censorship in Pakistan
- Computer Science2016 IEEE 2nd International Forum on Research and Technologies for Society and Industry Leveraging a better tomorrow (RTSI)
- 2016
This is the first study in literature analyzing and comparing the behaviour of five ISPs in Pakistan using automated detection methods based on active probing measurements, providing both qualitative and quantitative results to gauge how major ISPs are censoring web content in Pakistan.
A Case for Marrying Censorship Measurements with Circumvention
- Computer ScienceHotNets
- 2015
C-Saw is a browser-based platform set up as a lightweight client-side proxy that adapts its circumvention approach to the particular censorship mechanism deployed by a user's ISP, achieving a better balance of circumvention effectiveness and performance.
Your state is not mine: a closer look at evading stateful internet censorship
- Computer ScienceInternet Measurement Conference
- 2017
This paper undertake, arguably, the most extensive measurement study on TCP-level GFW evasion techniques, with several vantage points within and outside China, and with clients subscribed to multiple ISPs, finding that the state-of-the art evasion techniques are no longer very effective on the GFW.
Incentivizing censorship measurements via circumvention
- Computer ScienceSIGCOMM
- 2018
C-Saw is presented, a system that measures Internet censorship by offering data-driven censorship circumvention to users, and it is shown that it is effective at collecting and disseminating censorship measurements, selecting circumvention approaches, and optimizing user experience.
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
- Computer ScienceProc. Priv. Enhancing Technol.
- 2017
Analysis of content and longevity of 758,191 webpages drawn from 22 different probe lists, of which 15 are alleged to be actual blacklists of censored webpages in particular countries, three were compiled using a priori criteria for selecting pages with an elevated chance of being censored, and four are controls, finds that the lists have very little overlap.
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
- Computer ScienceFOCI @ USENIX Security Symposium
- 2020
This work analyzes the DNS injection behavior of the Great Firewall of China over a period of nine months using the Alexa top 1M domains as a test list and observes a sharp decline in public IPs injected by the GFW in November 2019.
References
SHOWING 1-10 OF 109 REFERENCES
CensMon: A Web Censorship Monitor
- Computer ScienceFOCI
- 2011
The design and implemention of a web censorship monitor, called CensMon, which can successfully detect censored content and spot the filtering technique used by the censor is presented.
Analysis of country-wide internet outages caused by censorship
- Computer ScienceTNET
- 2014
This paper detected what it believes were Libya's attempts to test firewall-based blocking before they executed more aggressive BGP-based disconnection during censorship episodes in Egypt and Libya.
Making sense of internet censorship: a new frontier for internet measurement
- Computer ScienceCCRV
- 2013
It is argued that, although it may not always be feasible to guarantee free and open access to information, citizens have the right to know when their access has been obstructed, restricted, or tampered with, so they can make informed decisions on information access.
ConceptDoppler: a weather tracker for internet censorship
- Education, EconomicsCCS '07
- 2007
ConceptDoppler, an architecture for maintaining a censorship “weather report” about what keywords are filtered over time is proposed, and it is shown that LSA can effectively pare down a corpus of text and cluster filtered keywords for efficient probing.
A method for identifying and confirming the use of URL filtering products for censorship
- BusinessInternet Measurement Conference
- 2013
The results show that these products are being used to block a range of content, including oppositional political speech, religious discussion and gay and lesbian material, speech generally protected by international human rights norms.
A Taxonomy of Internet Censorship Resistance Strategies
- Computer Science
- 2012
A taxonomy of Internet censorship resistance strategies and techniques extracted from analyzing proposed and implemented systems is presented to form the CORDON taxonomy, and future work needed to solve the fundamental problems facing all systems today is identified.
The collateral damage of internet censorship by DNS injection
- Computer ScienceComput. Commun. Rev.
- 2012
It is found that most collateral damage arises from resolvers querying TLD name servers who’s transit passes through China rather than effects due to root servers (F, I, J) located in China.
Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace
- Computer ScienceAccess Controlled
- 2010
Access Controlled offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.
Netalyzr: illuminating the edge network
- Computer ScienceIMC '10
- 2010
A detailed study of 130,000 measurement sessions that the service has recorded since it was made publicly available in June 2009 is presented, along with describing Netalyzr 's architecture and system implementation.
Inferring Mechanics of Web Censorship Around the World
- EducationFOCI
- 2012
Through a combination of personal contacts and Planet-Lab nodes, this work conducts experiments to explore the mechanics of Web censorship in 11 countries around the world, including China, providing insights into the diversity of modus operandi of censorsAround the world.