You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This talk is about the importance of cryptography to censorship circumvention, taking as motivating case studies real cryptographic attacks that have affected widely deployed circumvention protocols. It is meant as an introduction to censorship threat modeling for the cryptography-capable, and to that end I will comment on how security notions like "attack" and "indistinguishability" map onto the censorship problem.
The talk was given at the Workshop on Attacks in Cryptography 7, which is affiliated with the Crypto conference. The event is more cryptography-focused than censorship- or security-focused. I tried to make the talk serve as an introduction to censorship and circumvention for cryptographers, building the discussion around the attacks on Shadowsocks and obfs4 from my "Comments on certain past cryptographic flaws" article.
The talk goes over these topics:
Definition of censorship and circumvention
Fully encrypted protocols (FEPs)
FEPs used for circumvention (e.g. Shadowsocks, obfs4, VMess)
obfs4 public key Elligator representative distinguishability
Reflection on why these protocols continue being significant, despite these attacks (cost asymmetry of censor classification, non-cryptographic considerations)
The text was updated successfully, but these errors were encountered:
A few weeks ago I gave a talk with the title "How cryptography relates to Internet censorship circumvention". The video of the talk is now online.
https://www.bamsoftware.com/talks/wac7-fep/
Video (45 minutes) with slides and text transcript
YouTube version (Talk 3 of WAC7)
The talk was given at the Workshop on Attacks in Cryptography 7, which is affiliated with the Crypto conference. The event is more cryptography-focused than censorship- or security-focused. I tried to make the talk serve as an introduction to censorship and circumvention for cryptographers, building the discussion around the attacks on Shadowsocks and obfs4 from my "Comments on certain past cryptographic flaws" article.
The talk goes over these topics:
The text was updated successfully, but these errors were encountered: