FINDING · EVALUATION

In measurements conducted over 10 days in early February 2006, the GFW scanned approximately two-thirds of packets from a 256-address block per hourly probe, with address selection following a structured (non-random) pattern consistent with simple modular assignment to a limited pool of IDS devices. After several days, the inspected fraction rose to nearly all addresses, suggesting a configuration change to expand capacity.

From 2006-clayton-ignoringIgnoring the Great Firewall of China · §6.1 · 2006 · Privacy Enhancing Technologies

Implications

Tags

censors
cn
techniques
dpikeyword-filtering

Extracted by claude-sonnet-4-6 — review before relying.