Threat modeling and circumvention
of Internet censorship

David Fifield

The “border firewall”

Circumvention is reaching the destination despite the censor’s controls.

Commonly assumed
censor capabilities

Sometimes:





Does it make sense to design against the strongest imaginable censor?

Collateral damage

Accidental blocking by the censor, incurred in the course of trying to block something else.

Collateral damage

Accidental blocking by the censor, incurred in the course of trying to block something else.

According to the usual threat models, collateral damage is the only tool the circumventor has.

Virtually all circumvention systems can be understood in terms of collateral damage.

Circumvention systems

Circumvention needs to disguise both address and content.

Disguising content can be steganographic (“look like something”) or randomized (“look like nothing”).

Disguising an address requires protecting the destination and any proxy servers.

My research topics

  1. Building circumvention systems according to evolving censor models
  2. Empirically testing real-world censors to generate better models
  3. Evaluating existing circumvention systems against realistic models

1. Building circumvention systems





2. Testing real-world censors

3. Evaluating circumvention systems against models

My remaining research time will be spent on completing a study of censors’ reaction times; and in deploying Snowflake and documenting its effects.