FINDING · DEPLOYMENT
TTL-based path analysis showed that all censorship actions (DNS poisoning, HTTP injection, TLS resets) in the June 2025 shutdown occurred at the same network hop across all tested ISPs, indicating a single centralized national border gateway—likely TCI AS gateways—rather than per-ISP enforcement. Global BGP announcements were kept intact throughout, making the shutdown invisible to routing monitors while domestic connectivity collapsed.
From 2025-aryapour-stealth-blackout — Iran's Stealth Internet Blackout: A New Model of Censorship · §4.5 · 2025 · arXiv preprint (cs.NI)
Implications
- Because all enforcement is at a single chokepoint, any circumvention path that bypasses the Iranian border (e.g., Starlink, satellite out-of-band links) fully escapes the censorship stack—tool designers should prioritize out-of-band bootstrap channels for users in such environments.
- BGP-presence-based outage detection cannot detect this 'stealth blackout' model; monitoring tools must include in-country active probes with application-layer measurements to reliably detect this class of shutdown.
Tags
Extracted by claude-sonnet-4-6 — review before relying.