TRANSMISSION 0001 · FIELD STATION OPEN · LLM-CALLABLE
The field's literature.
Indexed.
A controlled-vocabulary corpus of censorship-circumvention research. Every paper tagged against a shared taxonomy of censors, detection techniques, and defenses. An MCP server exposes the whole thing to any AI assistant.
- papers
- 393
- censors
- 20
- techniques
- 23
- defenses
- 37
EXHIBIT №01 WHY THIS EXISTS
A layer the field doesn't have yet.
The censorship-circumvention community has wonderful resources: net4people/bbs for discussion, gfw.report for original research, CensorBib as a maintained bibliography, OONI for measurement.
None of them are LLM-callable. None of them have a consistent structured-metadata schema. None of them let an AI assistant compose a corpus query with operational data in the same conversation.
This corpus adds that one missing layer.
The thing that compounds
The schema and the controlled vocabulary outlive whatever model you read it through. Frontier models change every six months. The taxonomy of censors / techniques / defenses doesn't.
EXHIBIT №02 CORE PAPERS
Hand-selected as load-bearing.
If a Lantern protocol designer hadn't read these, the team would expect them to be slowed down. Team consensus marks them as core: true; everyone using the corpus sees them surfaced first.
-
2025-fan-wallbleed
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
-
2025-geedge-mesa-leak
Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
-
2025-interseclab-internet-coup
The Internet Coup
-
2025-iran-shutdown-measurement
Measuring the June 2025 Iran nationwide internet shutdown
-
2025-wu-regional-censorship
A Wall Behind A Wall: Emerging Regional Censorship in China
-
2025-zohaib-quic-sni
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
-
2017-frolov-water-pluggable
WATER: a programmable framework for pluggable transports
-
2024-xue-tspu-russia
Tspu: Russia's decentralized censorship system
-
2023-wu-fully-encrypted-detect
How the Great Firewall of China detects and blocks fully encrypted traffic
-
2022-blocking-tls-circumvention
Large scale blocking of TLS-based censorship circumvention tools in China
-
2020-alice-shadowsocks-detection
How China Detects and Blocks Shadowsocks
-
2020-anonymous-triplet-censors
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
-
2015-frolov-the-use-of-tls
The use of TLS in censorship circumvention
-
2015-ensafi-active-probing
Examining how the Great Firewall discovers hidden circumvention servers
-
2015-fifield-blocking-resistant
Blocking-resistant communication through domain fronting
EXHIBIT №03 RECENT ADDITIONS
- 2026-ablove-characterizing Characterizing the Implementation of Censorship Policies in Chinese LLM Services
- 2026-almutairi-server Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
- 2026-fares-game The Game Has Changed: Revisiting proxy distribution and game theory
- 2026-jois-assemblage Assemblage: Chipping Away at Censorship with Generative Steganography
- 2026-kamali-huma Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement
- 2026-lange-towards Towards Automated DNS Censorship Circumvention
- 2026-lee-quicstep QUICstep: Evaluating connection migration based QUIC censorship circumvention
- 2026-lipphardt-dual Dual Standards: Examining Content Moderation Disparities Between API and WebUI Interfaces in Large Language Models
- 2026-ratliff-mirage Mirage: Private, Mobility-based Routing for Censorship Evasion
- 2026-sheffey-geedge Geedge Cases: Censorship Measurement Insights from the Geedge Networks Leak
EXHIBIT №04 JOIN THE NETWORK
Plug it into your assistant.
One install. Your AI gains search_papers, get_paper, list_taxonomy, and find_related over the corpus.