DEFENSES
meta-resistance Meta-circumvention / framework
Papers about how to design circumvention systems generally — turbo-tunnel, Proteus, Marionette, programmable-protocols framings.
13 PAPERS ON FILE
- 2025-sharma-cenpush CenPush: Blocking-Resistant Control Channel Using Push Notifications
- 2025-wrana-sok-surveillance SoK: The Spectre of Surveillance and Censorship in Future Internet Architectures
- 2023-wails-proteus Proteus: Programmable Protocols for Censorship Circumvention
- 2020-fifield-turbo Turbo Tunnel, a good way to design censorship circumvention protocols
- 2018-martiny-proof-of-censorship Proof-of-Censorship: Enabling centralized censorship-resistant content providers
- 2016-elahi-framework A Framework for the Game-theoretic Analysis of Censorship Resistance
- 2016-khattak-sok SoK: Making Sense of Censorship Resistance Systems
- 2016-tschantz-sok SoK: Towards Grounding Censorship Circumvention in Empiricism
- 2011-seltzer-infrastructures Infrastructures of Censorship and Lessons from Copyright Resistance
- 2010-mahdian-fighting Fighting Censorship with Algorithms
- 2010-pfitzmann-terminology A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
- 2005-perng-censorship Censorship Resistance Revisited
- 2004-danezis-economics The Economics of Censorship Resistance