Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror

Comment Re:Not A Moment Too Soon (Score 1) 198

In most parts of the world, everyone uses the government ISP already. That's a given.

This software is installed in an ISP that's beyond the control of the censors. I don't think Merit Network or the University of Colorado are going to worry much about whether they or their users are breaking the network laws of some random country halfway around the world.

Comment Re:Not A Moment Too Soon (Score 1) 198

They had the Psiphon folks doing the operations side of things. There's a presumption that the users can get the Psiphon software through some mechanism, and install it on their computers. I guess the Psiphon bundle includes the public key, maybe hidden in some way, maybe not, but in any case if they've figured out some way to sneak the Psiphon bundle past the bad guys, sneaking the public key past the bad guys seems like it wouldn't be any harder.

Comment Re:Not A Moment Too Soon (Score 1) 198

TFA doesn't provide much technical info, but the papers it links to explain this in some detail.

In a nutshell, crypto and steganography: using the public key of the system, the client hides a signal in a TLS connection, which the TapDance station can recognize because it knows the private key. If you don't know the private key, the TLS connection looks like an ordinary stream of encrypted TLS records. In fact, it is a valid TLS connection, so the server doesn't think anything is weird about it either.

Submission + - The TapDance anti-censorship and circumvention app has been deployed at scale

An anonymous reader writes: Earlier this week, Professor Eric Wustrow, from the University of Colorado at Boulder, presented An ISP-Scale Deployment of TapDance at the USENIX Workshop on Free and Open Communications on the Internet. TapDance is an anti-censorship, circumvention application based on "refraction networking" (formerly known as "decoy routing") that has been the subject of academic research for several years. Now, with integration with Psiphon, 50,000 users, a deployment that spans two ISPs, and an open source release, it seems to have graduated to the real world.

Comment What happened to USENIX? (Score 1) 45

USENIX used to be one of my favorite conferences. Important work was presented there. Or at least work that, at the time, seemed like it had the potential to be important, although no program committee has yet been perfect at foreseeing the future...

This just seems like a silly joke taken too far.

Comment Re:What part of Proxy don't you get? (Score 1) 79

Good grief, we know this is Slashdot so reading TFA is generally scoffed at, but at least read past the first sentence of a summary. The Subject of my post says it all. It is trivial to set up a proxy so that customer => Cloud service which can't be blocked => TOR.

You wrote that a proxies "aren't really necessary". I was responding to that. Good grief, indeed.

If you'd like to move the goalposts by claiming that the summary isn't want you wrote, that's fine. I'll respond to your claim that proxies are easy to set up. Yes, they are. And they're really easy to block too, if someone is motivated to do so. If they weren't difficult to block, there would be laws in place that would make them harder to set up.

Comment won't work for long (Score 2) 79

The TLS handshake passes the name of the host being connected to (for the purpose of fetching its certificate) in plaintext. So if a site isn't being blocked, it's just a matter of time before the ISPs close this trivial loophole.

The next step is to ask for a different certificate that is being used on the same IP, by hacking the TLS handshake to specify a different hostname in the handshake than it uses in the HTTP request it sends later. This will probably just annoy whoever ends up paying for the bandwidth, and the loophole will get closed eventually.

Slashdot Top Deals

"The voters have spoken, the bastards..." -- unknown

Working...