FINDING · DETECTION
Five commercial filtering products (FortiGuard, Squid, Netsweeper, Websense, WireFilter) were identified in 7 of 36 block-page clusters via copyright notices in HTML comments, HTTP header strings, or URL path patterns; the remaining 29 clusters contained no identifying markup. WireFilter was first detected in the wild in Saudi Arabia (AS 25019) in 2011, representing a newly deployed filtering product not previously observed in measurements.
From 2014-jones-automated — Automated Detection and Fingerprinting of Censorship Block Pages · §5.2, Table 2 · 2014 · Internet Measurement Conference
Implications
- Commercial filtering products leak vendor identity through HTTP headers and HTML comments; circumvention infrastructure operators can passively scan for these signatures to map which products are deployed in target countries before designing evasion.
- Roughly 80% of block-page clusters had no vendor attribution, suggesting significant undocumented filtering infrastructure; circumvention tools should not assume blocking behavior matches any known vendor's documented ruleset.
Tags
Extracted by claude-sonnet-4-6 — review before relying.