We live in a digital age, but one where some governments prevent their citizens from using secure encrypted protocols (think SSL ie. HTTPS webbrowsing, ESMTP email, Tor, VPNs, torrents etc) FOR THEIR HUMAN RIGHT OF FREEDOM OF SPEECH ... we've seen this a lot in the past from North Korea, Iran, and more recently Egyptian and Syrian govt ("the west" even currently getting a LOT of attacks by the Syrian Electronic Army on sites like NYTimes, Twitter etc), and there are also many other nations who refuse to give their citizens freedom of speech.
Here is another option, a very clever software tool called 'Dust', by researcher Brandon Wiley, just presented at Defcon ... PDF
src: http://www.schneier.com/blog/archives/2013/08/evading_interne.html
Here is another option, a very clever software tool called 'Dust', by researcher Brandon Wiley, just presented at Defcon ... PDF
src: http://www.schneier.com/blog/archives/2013/08/evading_interne.html
The greatest danger to free speech on the Internet today is filtering of traffic using protocol fingerprinting. Protocols such as SSL, Tor, BitTorrent, and VPNs are being summarily blocked, regardless of their legal and ethical uses. Fortunately, it is possible to bypass this filtering by reencoding traffic into a form which cannot be correctly fingerprinted by the filtering hardware. I will be presenting a tool called Dust which provides an engine for reencoding traffic into a variety of forms. By developing a good model of how filtering hardware differentiates traffic into different protocols, a profile can be created which allows Dust to reencode arbitrary traffic to bypass the filters.
Dust is different than other approaches because it is not simply another obfuscated protocol. It is an engine which can encode traffic according to the given specifications. As the filters change their algorithms for protocol detection, rather than developing a new protocol, Dust can just be reconfigured to use different parameters. In fact, Dust can be automatically reconfigured using examples of what traffic is blocked and what traffic gets through. Using machine learning a new profile is created which will reencode traffic so that it resembles that which gets through and not that which is blocked. Dust has been created with the goal of defeating real filtering hardware currently deployed for the purpose of censoring free speech on the Internet. In this talk I will discuss how the real filtering hardware work and how to effectively defeat it.
Last edited: