FINDING · DEFENSE

The paper evaluates all major circumvention techniques available in 2003 and concludes that only application-layer proxies (HTTP, SOCKS, JAP, peek-a-booty) and IP tunneling can defeat all three blocking layers (IP filtering, DNS tampering, filtering proxies) simultaneously. Encryption alone cannot circumvent IP or DNS blocking; HTTPS hides URL paths but not the destination host; DNS-over-HTTPS/DNSSEC can detect but not defeat DNS tampering without a third-party resolver.

From 2003-dornseif-governmentGovernment mandated blocking of foreign Web content · §2.4 · 2003 · DFN-Arbeitstagung über Kommunikationsnetze

Implications

Tags

censors
generic
techniques
ip-blockingdns-poisoning
defenses
tunnelingtor

Extracted by claude-sonnet-4-6 — review before relying.