Censorship Chokepoints: New Battlegrounds for Regional Surveillance, Censorship and Influence on the Internet
- URL: http://arxiv.org/abs/2510.18394v1
- Date: Tue, 21 Oct 2025 08:14:10 GMT
- Title: Censorship Chokepoints: New Battlegrounds for Regional Surveillance, Censorship and Influence on the Internet
- Authors: Yong Zhang, Nishanth Sastry,
- Abstract summary: We argue that modern censorship can be better understood through a new lens that we term chokepoints.<n>We argue that modern censorship can be better understood through a new lens that we term chokepoints.
- Score: 6.705399830595934
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Undoubtedly, the Internet has become one of the most important conduits to information for the general public. Nonetheless, Internet access can be and has been limited systematically or blocked completely during political events in numerous countries and regions by various censorship mechanisms. Depending on where the core filtering component is situated, censorship techniques have been classified as client-based, server-based, or network-based. However, as the Internet evolves rapidly, new and sophisticated censorship techniques have emerged, which involve techniques that cut across locations and involve new forms of hurdles to information access. We argue that modern censorship can be better understood through a new lens that we term chokepoints, which identifies bottlenecks in the content production or delivery cycle where efficient new forms of large-scale client-side surveillance and filtering mechanisms have emerged.
Related papers
- SoK: Advances and Open Problems in Web Tracking [71.54586748169943]
Web tracking is a pervasive and opaque practice that enables personalized advertising, and conversion tracking.<n>Web tracking is undergoing a once-in-a-generation transformation driven by shifts in the advertising industry, the adoption of anti-tracking countermeasures by browsers, and the growing enforcement of emerging privacy regulations.<n>This Systematization of Knowledge (SoK) aims to consolidate and synthesize this wide-ranging research, offering a comprehensive overview of the technical mechanisms, countermeasures, and regulations that shape the modern and rapidly evolving web tracking landscape.
arXiv Detail & Related papers (2025-06-16T23:30:54Z) - Advancing Obfuscation Strategies to Counter China's Great Firewall: A Technical and Policy Perspective [4.606106768645647]
China's Great Firewall (GFW) exemplifies one of the most extensive and technologically sophisticated internet censorship frameworks worldwide.<n>This paper critically examines the GFW's principal detection techniques, including Deep Packet Inspection (DPI), domain name tampering, and traffic fingerprinting.<n>In parallel, we evaluate emerging countermeasures that leverage obfuscation, encryption, and routing innovations to circumvent these restrictions.
arXiv Detail & Related papers (2025-03-03T19:51:50Z) - Modern DDoS Threats and Countermeasures: Insights into Emerging Attacks and Detection Strategies [49.57278643040602]
Distributed Denial of Service (DDoS) attacks persist as significant threats to online services and infrastructure.<n>This paper offers a comprehensive survey of emerging DDoS attacks and detection strategies over the past decade.
arXiv Detail & Related papers (2025-02-27T11:22:25Z) - A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges [0.32985979395737774]
In this paper, we firstly provide a survey of Internet censorship techniques.<n> Secondly, we survey censorship measurement methodology, including a coverage of available datasets.<n>In cases where it is beneficial, we bridge the terminology and taxonomy of Internet censorship with related domains.
arXiv Detail & Related papers (2025-02-20T17:50:50Z) - CensorLab: A Testbed for Censorship Experimentation [15.411134921415567]
We design and implement CensorLab, a generic platform for emulating Internet censorship scenarios.<n>CensorLab aims to support all censorship mechanisms previously or currently deployed by real-world censors.<n>It provides an easy-to-use platform for researchers and practitioners enabling them to perform extensive experimentation.
arXiv Detail & Related papers (2024-12-20T21:17:24Z) - Pathfinder: Exploring Path Diversity for Assessing Internet Censorship Inconsistency [8.615061541238589]
We investigate Internet censorship from a different perspective by scrutinizing the diverse censorship deployment inside a country.
We reveal that the diversity of Internet censorship caused by different routing paths inside a country is prevalent.
We identify that different hosting platforms also result in inconsistent censorship activities due to different peering relationships with the ISPs in a country.
arXiv Detail & Related papers (2024-07-05T01:48:31Z) - Countering Malicious Content Moderation Evasion in Online Social
Networks: Simulation and Detection of Word Camouflage [64.78260098263489]
Twisting and camouflaging keywords are among the most used techniques to evade platform content moderation systems.
This article contributes significantly to countering malicious information by developing multilingual tools to simulate and detect new methods of evasion of content.
arXiv Detail & Related papers (2022-12-27T16:08:49Z) - Detecting Network-based Internet Censorship via Latent Feature
Representation Learning [4.862220550600935]
We design and evaluate a classification model based on latent feature representation learning and an image-based classification model to detect network-based Internet censorship.
To infer latent feature representations from network reachability data, we propose a sequence-to-sequence autoencoder.
To estimate the probability of censorship events from the inferred latent features, we rely on a densely connected multi-layer neural network model.
arXiv Detail & Related papers (2022-09-12T11:16:26Z) - The Web Is Your Oyster -- Knowledge-Intensive NLP against a Very Large
Web Corpus [76.9522248303716]
We propose a new setup for evaluating existing KI-NLP tasks in which we generalize the background corpus to a universal web snapshot.
We repurpose KILT, a standard KI-NLP benchmark initially developed for Wikipedia, and ask systems to use a subset of CCNet - the Sphere corpus.
We find that despite potential gaps of coverage, challenges of scale, lack of structure and lower quality, retrieval from Sphere enables a state-of-the-art-and-read system to match and even outperform Wikipedia-based models.
arXiv Detail & Related papers (2021-12-18T13:15:34Z) - Leveraging Multi-Source Weak Social Supervision for Early Detection of
Fake News [67.53424807783414]
Social media has greatly enabled people to participate in online activities at an unprecedented rate.
This unrestricted access also exacerbates the spread of misinformation and fake news online which might cause confusion and chaos unless being detected early for its mitigation.
We jointly leverage the limited amount of clean data along with weak signals from social engagements to train deep neural networks in a meta-learning framework to estimate the quality of different weak instances.
Experiments on realworld datasets demonstrate that the proposed framework outperforms state-of-the-art baselines for early detection of fake news without using any user engagements at prediction time.
arXiv Detail & Related papers (2020-04-03T18:26:33Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.