Skip to main content

Censorship Resistance as a Side-Effect

  • Conference paper
  • First Online:
Book cover Security Protocols XXII (Security Protocols 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8809))

Included in the following conference series:

  • 719 Accesses

Abstract

This position paper presents the following thought experiment: can we build communication protocols that (1) are sufficiently useful that they achieve widespread adoption as general-purpose communication mechanisms and (2) thwart censorship as a consequence of their design? We posit that a useful communication platform that is inherently resistant to traffic analysis, if widely adopted and used primarily for purposes not related to censorship circumvention, may be too politically and economically costly for a government to block.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The use of the hash function provides some privacy protections, since it makes it more difficult to cull email addresses and network locations from the directory.

References

  1. Andersen, D.G., Balakrishnan, H., Kaashoek, M.F., Morris, R.: The case for resilient overlay networks. In: Workshop on Hot Topics in Operating Systems (HotOS) (2001)

    Google Scholar 

  2. Burnett, S., Feamster, N., Vempala, S.: Chipping away at censorship firewalls with user-generated content. In: USENIX Security Symposium (USENIX) (2010)

    Google Scholar 

  3. Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: USENIX Security Symposium (USENIX) (2004)

    Google Scholar 

  4. Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.: Infranet: circumventing web censorship and surveillance. In: USENIX Security Symposium (USENIX) (2002)

    Google Scholar 

  5. Gellman, B., Soltani, A.: NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say, The Washington Post, 30 October 2013

    Google Scholar 

  6. Houmansadr, A., Riedl, T., Borisov, N., Singer, A.: I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. In: Network and Distributed System Security Symposium (NDSS) (2013)

    Google Scholar 

  7. Laurie, B., Langley, A., Kasper, E.: Certificate Transparency. RFC 6962, Internet Engineering Task Force (2013)

    Google Scholar 

  8. Moghaddam, H.M., Li, B., Derakhshani, M., Goldberg, I.: SkypeMorph: protocol obfuscation for tor bridges. In: ACM Conference on Computer and Communications Security (CCS) (2012)

    Google Scholar 

  9. Provos, N., Honeyman, P.: Detecting steganographic content on the internet. Technical report 01-11, Center for Information Technology Integration, University of Michigan (2001)

    Google Scholar 

  10. Schuchard, M., Geddes, J., Thompson, C., Hopper, N.: Routing around decoys. In: ACM Conference on Computer and Communications Security (CCS) (2012)

    Google Scholar 

  11. SPDY: An Experimental Protocol for a Faster Web. http://www.chromium.org/spdy/spdy-whitepaper

  12. Stoica, I., Morris, R., Karger, D., Kaashoek, M.F., Balakrishnan, H.: Chord: a scalable peer-to-peer lookup service for internet applications. In: Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (2001)

    Google Scholar 

  13. Syverson, P.F., Goldschlag, D.M., Reed, M.G.: Anonymous connections and onion routing. In: IEEE Symposium on Security and Privacy, Oakland (1997)

    Google Scholar 

  14. White, A.M., Snow, K., Matthews, A., Monrose, F.: Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks. In: IEEE Symposium on Security and Privacy, Oakland (2011)

    Google Scholar 

  15. Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: uncovering spoken phrases in encrypted VoIP conversations. In: IEEE Symposium on Security and Privacy, Oakland (2008)

    Google Scholar 

  16. Wright, C.V., Ballard, L., Monrose, F., Masson, G.M.: Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In: USENIX Security Symposium (USENIX) (2007)

    Google Scholar 

  17. Wustrow, E., Wolchok, S., Goldberg, I., Halderman, J.A.: Telex: anticensorship in the network infrastructure. In: USENIX Security Symposium (USENIX) (2011)

    Google Scholar 

Download references

Acknowledgments

This work is partially supported by NSF CAREER CNS-1149832 and NSF grants CNS-1064986, CNS-1204347, and CNS-1223825. The findings and opinions described in this paper are those of the authors, and do not necessarily reflect the views of the National Science Foundation. Additionally, this material is based upon work supported by the Defense Advanced Research Project Agency (DARPA) and Space and Naval Warfare Systems Center Pacific under Contract No. N66001-11-C-4020. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the Defense Advanced Research Project Agency and Space and Naval Warfare Systems Center Pacific.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Micah Sherr .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Tan, H., Sherr, M. (2014). Censorship Resistance as a Side-Effect. In: Christianson, B., Malcolm, J., Matyáš, V., Švenda, P., Stajano, F., Anderson, J. (eds) Security Protocols XXII. Security Protocols 2014. Lecture Notes in Computer Science(), vol 8809. Springer, Cham. https://doi.org/10.1007/978-3-319-12400-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-12400-1_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-12399-8

  • Online ISBN: 978-3-319-12400-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics