FINDING · DETECTION

Winter and Lindskog [157] (2012) documented that the GFW used TLS SNI inspection in combination with IP/port filtering and TCP disruption to block Tor, as recorded in the survey's Table 1. This is one of the earliest published accounts of the GFW applying SNI-based blocking specifically to a circumvention protocol, demonstrating that the GFW correlated multiple detection signals rather than relying on any single technique.

From 2015-aceto-internetInternet Censorship detection: A survey · Table 1 · 2015 · Computer Networks

Implications

Tags

censors
cn
techniques
sni-blockingip-blockingport-blockingrst-injection
defenses
torbridges

Extracted by claude-sonnet-4-6 — review before relying.