circumvention research · structured · LLM-callable
A structured corpus of how to keep the internet free.
Every paper tagged against a shared taxonomy of censors, detection techniques, and defenses. An MCP server exposes the whole thing to any AI assistant.
- papers
- 393
- censors
- 20
- techniques
- 23
- defenses
- 37
§ 01 why this exists
A layer the field doesn't have yet.
The censorship-circumvention community has wonderful resources: net4people/bbs for discussion, gfw.report for original research, CensorBib as a maintained bibliography, OONI for measurement.
None of them are LLM-callable. None of them have a consistent structured-metadata schema. None of them let an AI assistant compose a corpus query with operational data in the same conversation.
This corpus adds that one missing layer.
§ 02 core papers
Hand-selected as load-bearing.
If a Lantern protocol designer hadn't read these, the team would expect them to be slowed down. Team consensus marks them as core: true; everyone using the corpus sees them surfaced first.
-
2025-fan-wallbleed
Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
-
2025-geedge-mesa-leak
Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
-
2025-interseclab-internet-coup
The Internet Coup
-
2025-iran-shutdown-measurement
Measuring the June 2025 Iran nationwide internet shutdown
-
2025-wu-regional-censorship
A Wall Behind A Wall: Emerging Regional Censorship in China
-
2025-zohaib-quic-sni
Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
-
2017-frolov-water-pluggable
WATER: a programmable framework for pluggable transports
-
2024-xue-tspu-russia
Tspu: Russia's decentralized censorship system
-
2023-wu-fully-encrypted-detect
How the Great Firewall of China detects and blocks fully encrypted traffic
-
2022-blocking-tls-circumvention
Large scale blocking of TLS-based censorship circumvention tools in China
-
2020-alice-shadowsocks-detection
How China Detects and Blocks Shadowsocks
-
2020-anonymous-triplet-censors
Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
-
2015-frolov-the-use-of-tls
The use of TLS in censorship circumvention
-
2015-ensafi-active-probing
Examining how the Great Firewall discovers hidden circumvention servers
-
2015-fifield-blocking-resistant
Blocking-resistant communication through domain fronting
§ 03 recent additions
- 2026-ablove-characterizing Characterizing the Implementation of Censorship Policies in Chinese LLM Services
- 2026-almutairi-server Server, Client, or Relay? Dual-Role Detection of Circumvention Relays
- 2026-fares-game The Game Has Changed: Revisiting proxy distribution and game theory
- 2026-jois-assemblage Assemblage: Chipping Away at Censorship with Generative Steganography
- 2026-kamali-huma Huma: Censorship Circumvention via Web Protocol Tunneling with Deferred Traffic Replacement
- 2026-lange-towards Towards Automated DNS Censorship Circumvention
- 2026-lee-quicstep QUICstep: Evaluating connection migration based QUIC censorship circumvention
- 2026-lipphardt-dual Dual Standards: Examining Content Moderation Disparities Between API and WebUI Interfaces in Large Language Models
- 2026-ratliff-mirage Mirage: Private, Mobility-based Routing for Censorship Evasion
- 2026-sheffey-geedge Geedge Cases: Censorship Measurement Insights from the Geedge Networks Leak
§ 04 connect
Plug it into your assistant.
One line. Your AI gains search_papers, get_paper, list_taxonomy, and find_related over the corpus.