FINDING · DETECTION
Because Bangladesh's ban targeted specific named applications rather than underlying protocols, users successfully substituted functionally equivalent but unlisted apps: 'Banning Facebook, Viber, and Whatsapp for security purposes was not sufficient. For example, I used IMO to operate those apps. So, ultimately, nothing happened.' Authorities responded by expanding the blocklist to cover substitute apps, producing a reactive cat-and-mouse dynamic over the 26-day ban.
From 2017-morshed-when — When the Internet Goes Down in Bangladesh · Findings – Response to the Ban · 2017 · Computer-Supported Cooperative Work and Social Computing
Implications
- Application-name or brand-based blocking is inherently reactive; circumvention tools should avoid being identifiable by a stable branded name in app stores or traffic metadata, since blocklist expansion follows adoption curves.
- Designing circumvention at the protocol layer rather than as a named branded app makes blocklist expansion harder; generic or chameleon transports that blend with ambient traffic provide no stable target to block.
Tags
Extracted by claude-sonnet-4-6 — review before relying.