• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Jabber Zeus developer ‘MrICQ’ extradited to US from Italy

 | 

Chrome 142 Released: Two high-severity V8 flaws fixed, $100K in rewards paid

 | 

Android Apps misusing NFC and HCE to steal payment data on the rise

 | 

Conduent January 2025 breach impacts 10M+ people

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 69

 | 

Security Affairs newsletter Round 548 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Ukrainian extradited to US over Conti ransomware involvement

 | 

BadCandy Webshell threatens unpatched Cisco IOS XE devices, warns Australian government

 | 

China-linked UNC6384 exploits Windows zero-day to spy on European diplomats

 | 

Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks

 | 

EY Exposes 4TB SQL Server Backup Publicly on Microsoft Azure

 | 

Suspected Chinese actors compromise U.S. Telecom firm Ribbon Communications

 | 

U.S. CISA adds XWiki Platform, and Broadcom VMware Aria Operations and VMware Tools flaws to its Known Exploited Vulnerabilities catalog

 | 

Brush exploit can cause any Chromium browser to collapse in 15-60 seconds

 | 

Ex-Defense contractor exec pleads guilty to selling cyber exploits to Russia

 | 

Dentsu’s US subsidiary Merkle hit by cyberattack, staff and client data exposed

 | 

Hacktivists breach Canada’s critical infrastructure, cyber Agency warns

 | 

Russian hackers, likely linked to Sandworm, exploit legitimate tools against Ukrainian targets

 | 

U.S. CISA adds Dassault Systèmes DELMIA Apriso flaws to its Known Exploited Vulnerabilities catalog

 | 

Herodotus Android malware mimics human typing to evade detection

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Security
  • Deep Web and censorship

Deep Web and censorship

Pierluigi Paganini June 19, 2012

 

We clarified the use of anonymizing networks is not only related to criminal intents, they represent in fact a powerful instrument to elude censorship introduced by governments in critical areas of the planet. We have provided the examples of Syria and Iran, but the world is full of similar operations that introduce a detailed monitoring as part of a government cyber strategy.

Let’s take as example the Tor network and the censorship filtering made by governments to avoid that compromising news could be divulgated outside the country.

As descried TOR infrastructure uses SSL connection this means that in case of SSL filtering it is possible to block related traffic. It’s already happened for example early this year Iranian intelligence blocked SSL protocol on national networks, making impossible the use of TOR network and also bridged access to the network. Similar censorships have had a dramatic impact for freedom of expression and on free circulation of the information, Iran was one of the countries where the usage of tor network is more intense due fierce persecution of the regime against dissidents.

As we seen the Tor community replied to the censorship with the development of a tool to avoid filtering actions to restore the access to the TOR network.

Technically the filtering is implemented using Deep Packet Inspection (DPI) algorithms to the discrimination of Internet traffic made on the protocol.  The algorithms define the rules for traffic analysis based on the inspection both data part and header of each packet in transit for a specific control point.

Deep Packet Inspection enables advanced network management and security functions as well as internet data mining, eavesdropping, and censorship, and it is largely used by every government with purposes of crime prevention and defense for cyber attacks, but it is also used to reduce the openness of the Internet.

The most advanced filtering tools are provided by western companies that have catch the opportunity of business represented by censorship applied by countries such as China, Iran and Syria.

Very interesting are some projects related the Tor network and to its final purpose, internet freedom, the Tor developers Arturo Filasto and Jacob Appelbaum have released OONI-probe.

OONI is the Open Observatory for Network Interference and its aim is to collect high quality data using open methodologies, using Free and Open Source Software (FL/OSS) to share observations and data about the kind, methods and amount of surveillance and censorship in the world.

Similar projects have been promoted to defend human rights and the observation of the levels of surveillance, censorship, and networked discrimination.

Basically OONI project has developed an open-source software tool, installable on every PC connected to the network, to collect data to analyze network interferences.

Unlike other censorship tracking projects like HerdictWeb or the Open Net Initiative, OONI will allow anyone to run the testing application and share their results publicly.

Figura 1 – Herdict Censorship Monitoring

The most famous interferences discovered with the tool are the censorship by T-Mobile of its prepaid phones’ browser and also by the Palestinian Authority to block opposition websites. In this Palestinian case the minister responsible for the censorship was forced to resign.

Figura 2 – OONI – Palestinian Censorship

 

One of the main sources of information regarding the monitoring and surveillance activities on internet is represented by OpenNet Initiative project that collects global data on Internet filtering using technical and contextual tools. The project produces detailed report on internet control made in every country of the world, distinguishing the type of control and also the filtering type (e.g. Selective filtering, Substantial filtering,Pervasive filtering).

 

Figura 3 – OpenNet Initiative

As we have demonstrated the monitoring of internet is worldwide recognized as a primary goal for governments, internet users are seeing their freedom of expression constantly menaced by implementation of filtering mechanisms for different purposes, due this reason as we will see many organization are promoting the development of tools to elude censorship mechanism, obfsproxy is certainly one of the most important.

Obfsproxy tool

We have just introduced monitoring and filter operations to block traffic to avoid free internet access discovering also that in many cases the implementation of DPI system could interfere also with the access to Tor network.

Tor community has developed a specific tool, obfsproxy that attempts to circumvent censorship, operating a tunneling of the Tor traffic between the client and the bridge servers. The communications between user’s client and bridges are usually addressed by applications for traffic monitoring that are able to detect Tor traffic blocking it.

The traffic is suitably disguised in order to circumvent the control activities, this is possible through operation of encoding and decoding operated by the interlocutors of the communication. Obfstool tool supports multiple protocols for traffic transformation, called pluggable transports, for example, there might be a HTTP transport which transforms Tor traffic to look like regular HTTP traffic. The Tor team praises the “obfs2” module that adds an encryption wrapper around Tor’s traffic, using a handshake that has no recognizable byte patterns.

 

The Iranian censorship an opportunity to test the obfsproxy tool

On February 10, the Iranian Tor users were unable to access to Tor network because the government had begun blocking all SSL/TLS traffic. The regime is reportedly blocking HTTPS security protocol, and preventing the use of software residents use to bypass the state-run firewall. As result of the censorship operation all Google services such as gmail were inaccessible and also any website that replies on https.

Tor was a collateral effect because it’s network uses SSL communications between client and servers.

Following some graphs that show the evidence of censorship applied by Iranian Government confirmed also by declarations made by high officials of the government of Teheran.

Tor Community prompted responded diffusing two “Tor Obfsproxy Browser Bundle” that was pointing a couple obfsproxy bridges. A group of brave volunteers tested the solution helping the Tor developers to tune the application. On February 13th the development team released a stable version with new versions of Vidalia, Tor, and Obfsproxy, It was a success as demonstrated by the following picture.

The development of censorship avoidance tools has the primary purpose to make difficult for the censors the definition of a pattern for the traffic filtering.

Of course is a first step in the direction of freedom, the bundle in fact included 14 preconfigured bridge addresses, if censors discover them they be could filtered. To avoid similar detecting the developer have included in the new Vidalia release the possibility to manually configure the obfsproxy bridge addresses eliminating preconfigured addresses.

One of the main problems related to traffic analysis is the phenomena of false positives, the usage of monitoring system could block also legal traffic and a censorship avoidance tool could operate due to make difficult the filtering. In this optical have worked the Tor developers, they have won the battle but the war for freedom is hard and the censors continually refine weapons to intercept.

Obviously we support unconditionally the work of these organizations that are fighting against all forms of repression and censorship, waiting a day when every internet users could be free to express it thought without fears.

Pierluigi Paganini


facebook linkedin twitter

anonymizing networks Censorship China Deep Web DPI system Iran monitoring Obfsproxy tool OONI OpenNet Initiative project Syria Tor

you might also like

Pierluigi Paganini November 03, 2025
Jabber Zeus developer ‘MrICQ’ extradited to US from Italy
Read more
Pierluigi Paganini November 03, 2025
Chrome 142 Released: Two high-severity V8 flaws fixed, $100K in rewards paid
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Jabber Zeus developer ‘MrICQ’ extradited to US from Italy

    Cyber Crime / November 03, 2025

    Chrome 142 Released: Two high-severity V8 flaws fixed, $100K in rewards paid

    Security / November 03, 2025

    Android Apps misusing NFC and HCE to steal payment data on the rise

    Security / November 03, 2025

    Conduent January 2025 breach impacts 10M+ people

    Data Breach / November 03, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 69

    Malware / November 02, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT