Repository logo
About
Deposit
Communities & Collections
All of UWSpace
  • English
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Latviešu
  • Magyar
  • Nederlands
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Vecna, Ivy"

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Item
    Troll Patrol: Detecting Blocked Tor Bridges
    (University of Waterloo, 2024-09-16) Vecna, Ivy; Goldberg, Ian
    Tor is an important tool for protecting people against Internet surveillance and censorship. Therefore, some governments that wish to monitor or restrict their people’s use of the Internet attempt to block access to Tor. Bridges are circumvention proxies that provide routes around this censorship, enabling people to access Tor, even in countries that ordinarily censor it. However, a motivated censor may work to identify these bridges and block access to them. To impede the censor’s attempts at identifying and blocking bridges, reputation-based systems for bridge distribution such as Hyphae, Salmon, and Lox have been proposed. These systems place greater trust in users when the bridges they know remain uncensored and reduced trust in users when bridges they know become censored. In order to enact these changes in trust, it is necessary to know which bridges have been blocked and which have not, but Tor does not currently have a systematic way to detect blocked bridges. In this work, we present Troll Patrol, a system for automatically detecting censorship of Tor bridges. This system infers bridge reachability based on already-existing bridge usage statistics and novel anonymous user reports that we design for this purpose. We evaluate our system using a simulation and demonstrate that user reports improve our ability to detect bridge censorship, compared to using statistics on bridge use alone. We describe an attack that allows the censor to evade detection if classification of bridge blockage relies on bridge statistics alone, and we demonstrate that user reports allow us to defend against this attack.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback