Climbing China's Great Firewall

Total Page:16

File Type:pdf, Size:1020Kb

Climbing China's Great Firewall Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal Volume 5 Issue 2 Article 2 June 2018 Climbing China's Great Firewall Adam Casey University of Minnesota, Morris Follow this and additional works at: https://digitalcommons.morris.umn.edu/horizons Part of the Computer Sciences Commons Recommended Citation Casey, Adam (2018) "Climbing China's Great Firewall," Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal: Vol. 5 : Iss. 2 , Article 2. Available at: https://digitalcommons.morris.umn.edu/horizons/vol5/iss2/2 This Article is brought to you for free and open access by the Journals at University of Minnesota Morris Digital Well. It has been accepted for inclusion in Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal by an authorized editor of University of Minnesota Morris Digital Well. For more information, please contact [email protected]. Climbing China's Great Firewall Cover Page Footnote This work is licensed under the Creative Commons Attribution- NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/ 4.0/. UMM CSci Senior Seminar Conference, April 2018 Morris, MN. This article is available in Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal: https://digitalcommons.morris.umn.edu/horizons/vol5/iss2/2 Casey: Climbing China's Great Firewall Climbing China’s Great Firewall Adam L. Casey Division of Science and Mathematics University of Minnesota, Morris Morris, Minnesota, USA 56267 [email protected] ABSTRACT 2. BACKGROUND Many different countries censor the internet within their In order to understand how circumvention techniques work state. Citizens frequently wish to avoid the state censor- a basic understanding of some internet protocols and con- ship. There are many different methods that have been de- cepts is required. In this section, background will first be veloped to achieve this. Governments and citizens are in a given on the basic frameworks of the internet. Also, back- constant arms race, with both developing opposing technolo- ground is given on the Transport Control Protocol (TCP). gies. China in particular has the largest population of peo- This background information is necessary to understand how ple on the planet, and the Chinese government attempts to INTANG circumvents the GFW. Information is also given censor the internet. This paper will investigate three meth- on Content Delivery Networks (CDNs). A foundation in ods of navigating around state censorship: Cachebrowser, this subject is necessary to understand how Cachebrowser INTANG and Tor. Cachebrowser and INTANG were devel- circumvents the GFW. An overview of Tor will also be given oped specifically to navigate around state censorship while in this section. Background on Tor is necessary to under- Tor was originally developed for anonymous browsing. This stand one of the most common ways of circumventing inter- paper will analyze their effectiveness and viability to avoid net censorship and to understand how the Chinese govern- censorship. ment attempts to stop Tor traffic. Keywords 2.1 Internet Basics In order to understand how the Chinese government cen- China, Great Firewall, Tor, CDNs, INTANG sors the internet and to understand the TCP protocol, first some internet frameworks must be explained. To begin with client and server roles need to be explained. When you make 1. INTRODUCTION a request to visit a website such as www.facebook.com your The largest group of people in the world with censored computer talks to the server for facebook. This is referred access to the internet is the population of China, with up- to as the server because the user makes a request and the wards of 1.3 billion people. The Chinese government still server serves the content to the user. The user in this case actively censors the internet through a system of network is referred to as the client. monitoring and network manipulation, referred to broadly Before the client actually makes a request to facebook.com as the Great Firewall of China (GFW) [11]. it needs to know how to get to it. Each server on the internet This paper will describe the methods and evaluate the has a unique address associated with it. This is called an IP success of three separate ways of evading the censorship address [10]. In order for the client to find the IP address for of the GFW. These methods are Cachebrowser, INTANG a server they are trying to access they must make a Domain and Tor. These methods each work in very different ways. Name System (DNS) request. This is done by making a Cachebrowser works by allowing the user to easily access request to a DNS server which has a list of IP addresses for uncensored versions of websites that are usually blocked by different websites in a cache. The client tells the DNS server accessing the cached versions of these sites that the Chinese the website they are trying to access. The server then sends government cannot feasibly block for reasons that will be the client the IP address of the website they are trying to discussed in section 3.1. INTANG works by manipulating access. Finally, the client can make a request to the server the internet traffic being sent by the user's machine directly they are trying to access and send data to it and the server to avoid censorship by manipulating packets which will be can send data back to the client. discussed in depth in section 3.2. Tor works by bouncing One way the Chinese government attempts to censor the the user's connection through multiple different nodes. This internet is by manipulating the records on DNS servers to makes it difficult to track. How the Chinese government return incorrect IPs for websites or to drop packets for re- probes for Tor servers will be discussed in section 3.3 quests to websites the government does not want clients to be able to access. This practice is referred to broadly as DNS poisoning [3]. This work is licensed under the Creative Commons Attribution- Another way the Chinese government attempts to censor NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/. the internet is through a technique called IP address filtering UMM CSci Senior Seminar Conference, April 2018 Morris, MN. [5]. This is where the IP of the website you are trying to Published by University of Minnesota Morris Digital Well, 2018 1 Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal, Vol. 5, Iss. 2 [2018], Art. 2 Figure 1: Diagram of a TCP packet taken from [9]. access is blocked at the hardware level, usually on your home to this paper the relevant ones are SYN/ACK/FIN/RST. router. This is different from DNS poisoning because even The ACK flag indicates that the packet is an acknowledge- if we know the IP address of the website we are attempting ment packet. The RST flag indicates that the connection to access we cannot get to it. should be reset. The SYN flag indicates that sequence num- The final censorship technique that will be mentioned in bers should be synced. In practice this should only be used this paper is keyword censorship [11]. This is where the at the beginning of the connection process. The FIN (finish) Chinese government monitors the client's internet traffic and flag indicates that this is the last packet from the sender. will terminate connections with keywords the government Another important aspect of the TCP protocol to know has deemed sensitive. This is a way to block connections for this paper is Time to live (TTL). Each packet is given if the IP of the website is not blocked and its DNS records a TTL. The TTL indicates how long the packet will stay in have not been poisoned. the network before it destroys itself. This is useful so that Another concept that is necessary to understand circum- packets do not clog up network infrastructure forever if they vention techniques is the idea of a proxy, sometimes referred do not reach their intended destination. to as a proxy server [7]. A proxy is essentially a server that There are three main steps to transmitting data using the makes web requests for you. Instead of talking directly to TCP protocol. This first step is to establish the connection the server the client wants to access, it talks to a different using a handshake process. A connection is a link between server, which talks to the server the client wants to talk client and host where data can be sent freely between client to. Then the proxy server then takes the information the and server. Next the actual data is sent. Finally the con- intended server sent it and sends it back to the client. nection is terminated. Connection establishment is a multistage process. The first stage is when the user establishes a connection to the 2.2 The TCP Protocol server. Next the user sends a SYN (sync) packet to the Transport Control Protocol (TCP) [10] is one of the main server. Once the server receives this SYN packet it sends an internet standards. The main data structure of TCP is the ACK (Acknowledgement) packet back to the user along with packet. Data is sent in discrete pieces in order. One of these a SYN packet. The next step to establish data exchange pieces is referred to as packet. This order is maintained is for the user to send an ACK packet back to the server. by incrementing the sequence number with each new packet After this process has been completed regular data transfer that is sent.
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • Poster: Introducing Massbrowser: a Censorship Circumvention System Run by the Masses
    Poster: Introducing MassBrowser: A Censorship Circumvention System Run by the Masses Milad Nasr∗, Anonymous∗, and Amir Houmansadr University of Massachusetts Amherst fmilad,[email protected] ∗Equal contribution Abstract—We will present a new censorship circumvention sys- side the censorship regions, which relay the Internet traffic tem, currently being developed in our group. The new system of the censored users. This includes systems like Tor, VPNs, is called MassBrowser, and combines several techniques from Psiphon, etc. Unfortunately, such circumvention systems are state-of-the-art censorship studies to design a hard-to-block, easily blocked by the censors by enumerating their limited practical censorship circumvention system. MassBrowser is a set of proxy server IP addresses [14]. (2) Costly to operate: one-hop proxy system where the proxies are volunteer Internet To resist proxy blocking by the censors, recent circumven- users in the free world. The power of MassBrowser comes from tion systems have started to deploy the proxies on shared-IP the large number of volunteer proxies who frequently change platforms such as CDNs, App Engines, and Cloud Storage, their IP addresses as the volunteer users move to different a technique broadly referred to as domain fronting [3]. networks. To get a large number of volunteer proxies, we This mechanism, however, is prohibitively expensive [11] provide the volunteers the control over how their computers to operate for large scales of users. (3) Poor QoS: Proxy- are used by the censored users. Particularly, the volunteer based circumvention systems like Tor and it’s variants suffer users can decide what websites they will proxy for censored from low quality of service (e.g., high latencies and low users, and how much bandwidth they will allocate.
    [Show full text]
  • Retweeting Through the Great Firewall a Persistent and Undeterred Threat Actor
    Retweeting through the great firewall A persistent and undeterred threat actor Dr Jake Wallis, Tom Uren, Elise Thomas, Albert Zhang, Dr Samantha Hoffman, Lin Li, Alex Pascoe and Danielle Cave Policy Brief Report No. 33/2020 About the authors Dr Jacob Wallis is a Senior Analyst working with the International Cyber Policy Centre. Tom Uren is a Senior Analyst working with the International Cyber Policy Centre. Elise Thomas is a Researcher working with the International Cyber Policy Centre. Albert Zhang is a Research Intern working with the International Cyber Policy Centre. Dr Samanthan Hoffman is an Analyst working with the International Cyber Policy Centre. Lin Li is a Researcher working with the International Cyber Policy Centre. Alex Pascoe is a Research Intern working with the International Cyber Policy Centre. Danielle Cave is Deputy Director of the International Cyber Policy Centre. Acknowledgements ASPI would like to thank Twitter for advanced access to the takedown dataset that formed a significant component of this investigation. The authors would also like to thank ASPI colleagues who worked on this report. What is ASPI? The Australian Strategic Policy Institute was formed in 2001 as an independent, non‑partisan think tank. Its core aim is to provide the Australian Government with fresh ideas on Australia’s defence, security and strategic policy choices. ASPI is responsible for informing the public on a range of strategic issues, generating new thinking for government and harnessing strategic thinking internationally. ASPI International Cyber Policy Centre ASPI’s International Cyber Policy Centre (ICPC) is a leading voice in global debates on cyber and emerging technologies and their impact on broader strategic policy.
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • Iclab: a Global, Longitudinal Internet Censorship Measurement Platform
    ICLab: A Global, Longitudinal Internet Censorship Measurement Platform Arian Akhavan Niaki∗y Shinyoung Cho∗yz Zachary Weinberg∗x Nguyen Phong Hoangz Abbas Razaghpanahz Nicolas Christinx Phillipa Gilly yUniversity of Massachusetts, Amherst zStony Brook University xCarnegie Mellon University {arian, shicho, phillipa}@cs.umass.edu {shicho, nghoang, arazaghpanah}@cs.stonybrook.edu {zackw, nicolasc}@cmu.edu Abstract—Researchers have studied Internet censorship for remains elusive. We highlight three key challenges that must nearly as long as attempts to censor contents have taken place. be addressed to make progress in this space: Most studies have however been limited to a short period of time and/or a few countries; the few exceptions have traded off detail Challenge 1: Access to Vantage Points. With few ex- for breadth of coverage. Collecting enough data for a compre- ceptions,1 measuring Internet censorship requires access to hensive, global, longitudinal perspective remains challenging. “vantage point” hosts within the region of interest. In this work, we present ICLab, an Internet measurement The simplest way to obtain vantage points is to recruit platform specialized for censorship research. It achieves a new balance between breadth of coverage and detail of measurements, volunteers [37], [43], [73], [80]. Volunteers can run software by using commercial VPNs as vantage points distributed around that performs arbitrary network measurements from each the world. ICLab has been operated continuously since late vantage point, but recruiting more than a few volunteers per 2016. It can currently detect DNS manipulation and TCP packet country and retaining them for long periods is difficult. Further, injection, and overt “block pages” however they are delivered.
    [Show full text]
  • Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy
    Working Paper No. 2017.2 Computational Propaganda in Taiwan: Where Digital Democracy Meets Automated Autocracy Nicholas J. Monaco, Google Jigsaw Table of Contents Abstract ....................................................................................................................... 3 Introduction ................................................................................................................. 3 Case study ................................................................................................................... 5 Media and social media landscape in Taiwan ................................................................... 5 Overview of computational propaganda in Taiwan .......................................................... 9 Automation and propaganda .......................................................................................... 10 Fake news ........................................................................................................................ 13 Cross-Strait propaganda ................................................................................................. 15 The 2016 Diba Facebook expedition .............................................................................. 22 Conclusion ................................................................................................................. 25 About the Author ...................................................................................................... 27 References ................................................................................................................
    [Show full text]
  • How the Chinese Government Fabricates Social Media Posts
    American Political Science Review (2017) 111, 3, 484–501 doi:10.1017/S0003055417000144 c American Political Science Association 2017 How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument GARY KING Harvard University JENNIFER PAN Stanford University MARGARET E. ROBERTS University of California, San Diego he Chinese government has long been suspected of hiring as many as 2 million people to surrep- titiously insert huge numbers of pseudonymous and other deceptive writings into the stream of T real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim https://doi.org/10.1017/S0003055417000144 . or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime.
    [Show full text]
  • The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F
    July 2016, Volume 27, Number 3 $14.00 The Danger of Deconsolidation Roberto Stefan Foa and Yascha Mounk Ronald F. Inglehart The Struggle Over Term Limits in Africa Brett L. Carter Janette Yarwood Filip Reyntjens 25 Years After the USSR: What’s Gone Wrong? Henry E. Hale Suisheng Zhao on Xi Jinping’s Maoist Revival Bojan Bugari¡c & Tom Ginsburg on Postcommunist Courts Clive H. Church & Adrian Vatter on Switzerland Daniel O’Maley on the Internet of Things Delegative Democracy Revisited Santiago Anria Catherine Conaghan Frances Hagopian Lindsay Mayka Juan Pablo Luna Alberto Vergara and Aaron Watanabe Zhao.NEW saved by BK on 1/5/16; 6,145 words, including notes; TXT created from NEW by PJC, 3/18/16; MP edits to TXT by PJC, 4/5/16 (6,615 words). AAS saved by BK on 4/7/16; FIN created from AAS by PJC, 4/25/16 (6,608 words). PGS created by BK on 5/10/16. XI JINPING’S MAOIST REVIVAL Suisheng Zhao Suisheng Zhao is professor at the Josef Korbel School of International Studies, University of Denver. He is executive director of the univer- sity’s Center for China-U.S. Cooperation and editor of the Journal of Contemporary China. When Xi Jinping became paramount leader of the People’s Republic of China (PRC) in 2012, some Chinese intellectuals with liberal lean- ings allowed themselves to hope that he would promote the cause of political reform. The most optimistic among them even thought that he might seek to limit the monopoly on power long claimed by the ruling Chinese Communist Party (CCP).
    [Show full text]
  • An Analysis of Contributions to Wikipedia from Tor
    Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor Chau Tran Kaylea Champion Andrea Forte Department of Computer Science & Engineering Department of Communication College of Computing & Informatics New York University University of Washington Drexel University New York, USA Seatle, USA Philadelphia, USA [email protected] [email protected] [email protected] Benjamin Mako Hill Rachel Greenstadt Department of Communication Department of Computer Science & Engineering University of Washington New York University Seatle, USA New York, USA [email protected] [email protected] Abstract—User-generated content sites routinely block contri- butions from users of privacy-enhancing proxies like Tor because of a perception that proxies are a source of vandalism, spam, and abuse. Although these blocks might be effective, collateral damage in the form of unrealized valuable contributions from anonymity seekers is invisible. One of the largest and most important user-generated content sites, Wikipedia, has attempted to block contributions from Tor users since as early as 2005. We demonstrate that these blocks have been imperfect and that thousands of attempts to edit on Wikipedia through Tor have been successful. We draw upon several data sources and analytical techniques to measure and describe the history of Tor editing on Wikipedia over time and to compare contributions from Tor users to those from other groups of Wikipedia users. Fig. 1. Screenshot of the page a user is shown when they attempt to edit the Our analysis suggests that although Tor users who slip through Wikipedia article on “Privacy” while using Tor. Wikipedia’s ban contribute content that is more likely to be reverted and to revert others, their contributions are otherwise similar in quality to those from other unregistered participants and to the initial contributions of registered users.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • End of News:Internet Censorship in Turkey
    https://www.freewebturkey.com/end-of-news End of news: Internet censorship in Turkey This report was published as part of the Free Web Turkey project carried out by the Media and Law Studies Association between November 2019 and October 2020. http://www.freewebturkey.com | http://www.mlsaturkey.com About MLSA and Free Web Turkey The Media and Law Studies Association (MLSA) was founded in 2017 and its main field of activity is of- fering legal protection to journalists and people tried in freedom of expression cases. As the MLSA, we aim to provide guidance to websites, media organizations and all content producers facing censorship in digital media on methods of coping with censorship, offering them legal consultancy, tools to avoid censorship and a set of internet services that would ease their efforts within the scope of the Free Web Turkey project, which we have been conducting in the field of internet freedom for a year. Besides, we bring together groups working in the field of digital freedoms and freedom of expression to organize panels, roundtable discussions, publish articles, and conduct training programs for content producers to raise awareness against censorship. Another goal of our project is to organize the network of communication and solidarity between institutions, which is one of the most essential components in combating digital censorship. To this end, we try to keep an up-to- date list of blocked URLs and create a database so that we can run a joint and more powerful campaign against censorship. While doing all these, we aim to protect the freedom of expression in the law, the Constitution and international conventions, and to exercise this right effectively.
    [Show full text]
  • BRKSEC-2011.Pdf
    #CLUS About Garlic and Onions A little journey… Tobias Mayer, Technical Solutions Architect BRKSEC-2011 #CLUS Me… CCIE Security #14390, CISSP & Motorboat driving license… Working in Content Security & TLS Security tmayer{at}cisco.com Writing stuff at “blogs.cisco.com” #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Agenda • Why anonymization? • Using Tor (Onion Routing) • How Tor works • Introduction to Onion Routing • Obfuscation within Tor • Domain Fronting • Detect Tor • I2P – Invisible Internet Project • Introduction to Garlic Routing • Conclusion #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 Cisco Webex Teams Questions? Use Cisco Webex Teams (formerly Cisco Spark) to chat with the speaker after the session How 1 Find this session in the Cisco Events App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKSEC-2011 by the speaker until June 18, 2018. #CLUS © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Different Intentions Hide me from Government! Hide me from ISP! Hide me from tracking! Bypass Corporate Bypass Country Access Hidden policies restrictions (Videos…) Services #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Browser Identity Tracking does not require a “Name” Tracking is done by examining parameters your browser reveals https://panopticlick.eff.org #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Proxies EPIC Browser #CLUS BRKSEC-2011 © 2018 Cisco and/or its affiliates.
    [Show full text]