Tuesday 28 April 2015

internet censorship, how to defeat internet censorship, bypassing internet filters,


https://www.youtube.com/watch?v=jeX7k1w-Pog
The greatest danger to free speech on the Internet today is filtering of traffic using protocol fingerprinting. Protocols such as SSL, Tor, BitTorrent, and VPNs are being summarily blocked, regardless of their legal and ethical uses. Fortunately, it is possible to bypass this filtering by reencoding traffic into a form which cannot be correctly fingerprinted by the filtering hardware. I will be presenting a tool called Dust which provides an engine for reencoding traffic into a variety of forms. By developing a good model of how filtering hardware differentiates traffic into different protocols, a profile can be created which allows Dust to reencode arbitrary traffic to bypass the filters. Dust is different than other approaches because it is not simply another obfuscated protocol. It is an engine which can encode traffic according to the given specifications. As the filters change their algorithms for protocol detection, rather than developing a new protocol, Dust can just be reconfigured to use different parameters. In fact, Dust can be automatically reconfigured using examples of what traffic is blocked and what traffic gets through. Using machine learning a new profile is created which will reencode traffic so that it resembles that which gets through and not that which is blocked. Dust has been created with the goal of defeating real filtering hardware currently deployed for the purpose of censoring free speech on the Internet. In this talk I will discuss how the real filtering hardware work and how to effectively defeat it.

bypass, internet, censorship, with, google, public, dns, tricks, Cool, bored, Random2013, Security, dc21, Conference, Las Vegas, Def Con, 2013 Hacker Dc21 Def Con Def Con Las Vegas Defcon Convention Conference Hackers Security, Hacker, DEFCO...YouTube Editor, Hacking, Computer Security (Software Genre), Virtual Private Network (Software Genre), Transport Layer Security (Protocol), Information Secur..., Internet Censorship, Internet Censorship, how to bypass internet censorship

No comments:

Post a Comment