FINDING · EVALUATION

As of 2015, TLS tampering detection was implemented by only a small minority of surveyed censorship measurement tools: explicitly by Holz et al.'s Crossbear (2012) and OONI (2012), and partially by Soghoian and Stamm (2011) and UBICA (2013). The majority of the 13+ surveyed platforms detected DNS tampering and HTTP manipulation but lacked TLS coverage, creating a systematic blind spot in published censorship measurement.

From 2015-aceto-internetInternet Censorship detection: A survey · Table 2 · 2015 · Computer Networks

Implications

Tags

techniques
tls-fingerprintsni-blocking
defenses
ech-esni

Extracted by claude-sonnet-4-6 — review before relying.