Five commercial filtering products (FortiGuard, Squid, Netsweeper, Websense, WireFilter) were identified in 7 of 36 block-page clusters via copyright notices in HTML comments, HTTP header strings, or URL path patterns; the remaining 29 clusters contained no identifying markup. WireFilter was first detected in the wild in Saudi Arabia (AS 25019) in 2011, representing a newly deployed filtering product not previously observed in measurements.
From 2014-jones-automated — Automated Detection and Fingerprinting of Censorship Block Pages
· §5.2, Table 2
· 2014
· Internet Measurement Conference
Implications
Commercial filtering products leak vendor identity through HTTP headers and HTML comments; circumvention infrastructure operators can passively scan for these signatures to map which products are deployed in target countries before designing evasion.
Roughly 80% of block-page clusters had no vendor attribution, suggesting significant undocumented filtering infrastructure; circumvention tools should not assume blocking behavior matches any known vendor's documented ruleset.