circumvention research · structured · LLM-callable
A structured corpus of how to keep the internet free.
Every paper tagged against a shared taxonomy of censors, detection techniques, and defenses — including work from Roya Ensafi, Amir Houmansadr, Eric Wustrow, Dave Levin, Nick Feamster, Nguyen Phong Hoang, David Fifield, J. Alex Halderman, Niklas Niere, and many others. An MCP server exposes the whole thing to any AI assistant — or ask the corpus directly.
- papers
- 416
- censors
- 20
- techniques
- 23
- defenses
- 37
§ 01 why this exists
A layer the field doesn't have yet.
The censorship-circumvention community has wonderful resources: net4people/bbs for discussion, gfw.report for original research, CensorBib as a maintained bibliography, OONI for measurement.
None of them are LLM-callable. None of them have a consistent structured-metadata schema. None of them let an AI assistant compose a corpus query with operational data in the same conversation.
This corpus adds that one missing layer.
§ 02 core papers
Hand-selected as load-bearing.
If a Lantern protocol designer hadn't read these, the team would expect them to be slowed down. Team consensus marks them as core: true; everyone using the corpus sees them surfaced first.
-
2025-iran-shutdown-measurement
Characterizing Iran's Phased National Internet Shutdown in 2025: A Progressive and Distributed Action
-
2025-aryapour-stealth-blackout
Iran's Stealth Internet Blackout: A New Model of Censorship
-
2025-fan-wallbleed
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
-
2025-geedge-mesa-leak
Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
-
2025-interseclab-internet-coup
The Internet Coup
-
2025-miaan-stealth-blackout
Iran's Stealth Blackout: A Multi-stakeholder Analysis of the June 2025 Internet Shutdown
-
2025-niere-transport
Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer
-
2025-wu-regional-censorship
A Wall Behind A Wall: Emerging Regional Censorship in China
-
2025-zohaib-quic-sni
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
-
2017-frolov-water-pluggable
WATER: a programmable framework for pluggable transports
-
2024-xue-tspu-russia
Tspu: Russia's decentralized censorship system
-
2023-niere-poster
Poster: Circumventing the GFW with TLS Record Fragmentation
-
2023-wu-fully-encrypted-detect
How the Great Firewall of China detects and blocks fully encrypted traffic
-
2022-blocking-tls-circumvention
Large scale blocking of TLS-based censorship circumvention tools in China
-
2020-alice-shadowsocks-detection
How China Detects and Blocks Shadowsocks
-
2020-anonymous-triplet-censors
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
-
2015-frolov-the-use-of-tls
The use of TLS in censorship circumvention
-
2015-ensafi-active-probing
Examining how the Great Firewall discovers hidden circumvention servers
-
2015-fifield-blocking-resistant
Blocking-resistant communication through domain fronting
§ 03 self-updating
The corpus keeps crawling without us.
A pipeline polls arXiv, net4people/bbs, gfw.report, PoPETs, FOCI, USENIX Security, ermao.net, and the Paderborn upb-syssec group's publications and blog for new circumvention research, fetches each candidate via wick (browser-grade, residential-IP web access), then asks Claude to propose taxonomy tags and extract findings against the schema. Every new entry lands as an auto-ingest PR labeled for human review. Below: the most recent additions.
- 2025-iran-shutdown-measurement Characterizing Iran's Phased National Internet Shutdown in 2025: A Progressive and Distributed Action
- 2026-ablove-characterizing Characterizing the Implementation of Censorship Policies in Chinese LLM Services
- 2026-almutairi-server Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
- 2026-anon-letsvpn-vpn 快连(LetsVPN)宣布退出中国大陆:传统VPN时代的眼泪? | 二毛
- 2026-article19-tightening-the-net Tightening the Net: China's Infrastructure of Oppression in Iran
- 2026-brussee-reverse-great-firewall Conceptualizing the reverse great firewall: cybersecurity and the logics of government geo-blocking in China
- 2026-edorh-shieldshare ShieldShare: Building a VPN-backed Android Hotspot for Secure Internet Sharing with Per-User Traffic Accounting
- 2026-ermao-april-airport-outage 2026年四月机场断线潮详解:通报、拔线与涨价预期下,普通用户该怎么应对 / Anatomy of the April 2026 China VPN-Reseller Outage Wave
- 2026-fares-game The Game Has Changed: Revisiting proxy distribution and game theory
- 2026-jois-assemblage Assemblage: Chipping Away at Censorship with Generative Steganography
§ 04 connect
Plug it into your assistant.
One line. Your AI gains search_papers, get_paper, list_taxonomy, and find_related over the corpus.