FINDING · EVALUATION
As of 2015, TLS tampering detection was implemented by only a small minority of surveyed censorship measurement tools: explicitly by Holz et al.'s Crossbear (2012) and OONI (2012), and partially by Soghoian and Stamm (2011) and UBICA (2013). The majority of the 13+ surveyed platforms detected DNS tampering and HTTP manipulation but lacked TLS coverage, creating a systematic blind spot in published censorship measurement.
From 2015-aceto-internet — Internet Censorship detection: A survey · Table 2 · 2015 · Computer Networks
Implications
- Circumvention projects should not rely on published measurement studies to detect SNI-based or certificate-based blocking of their tools — coverage gaps mean TLS-layer interference is systematically underreported in the literature.
- When building diagnostic capability into a circumvention client, include TLS-layer probes (certificate validation, SNI echo response) as first-class signals alongside DNS and TCP-level checks.
Tags
Extracted by claude-sonnet-4-6 — review before relying.