FINDING · DETECTION

Users in Thailand relied on incident-driven tool selection—running a fresh Google search for a proxy or VPN each time they hit a block—which the paper identifies as a systematic vulnerability: the Thai Royal Police exploited this pattern after the 2014 coup by linking a phishing application to a government block page, harvesting email addresses and gaining application-level access to Facebook profile information. The paper further notes that orchestrated stricter censorship could drive users to a government-operated malicious tool.

From 2017-gebhart-internetInternet Censorship in Thailand: User Practices and Potential Threats · §5.3.3, §6.2.2 · 2017 · European Symposium on Security \& Privacy

Implications

Tags

censors
generic
techniques
ip-blockingpacket-injection
defenses
tunnelingpluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.