net4people / bbs

Forum for discussing Internet censorship circumvention
3.45k stars 82 forks source link

FOCI, PETS, HotPETs 2023 videos #307

Open wkrp opened 1 year ago

wkrp commented 1 year ago

The presentation videos for the 2023 editions of Free and Open Communications on the Internet (FOCI), Privacy Enhancing Technologies Symposium (PETS), and Hot Topics in Privacy Enhancing Technologies (HotPETs) are online at the @petsymposium YouTube channel.

There were many papers about censorship and circumvention. Let me know if there are any I missed. Not all the papers have presentation videos.

Paper title PDF Video Artifact
Chasing Shadows: A security analysis of the ShadowTLS proxy PDF YouTube
Advancing the Art of Censorship Data Analysis PDF
Security Notions for Fully Encrypted Protocols PDF
CensorWatch: On the Implementation of Online Censorship in India PDF Homepage
A Worldwide View of Nation-state Internet Censorship PDF YouTube Zenodo
The Use of Push Notification in Censorship Circumvention PDF
Detecting Network Interference Without Endpoint Participation PDF YouTube
Running a high-performance pluggable transports Tor bridge PDF YouTube Homepage
Towards a Comprehensive Understanding of Russian Transit Censorship PDF YouTube
Proteus: Programmable Protocols for Censorship Circumvention PDF Source code
Voiceover: Censorship-Circumventing Protocol Tunnels with Generative Modeling PDF
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies PDF YouTube
Dolphin: A Cellular Voice Based Internet Shutdown Resistance System PDF YouTube
Lox: Protecting the Social Graph in Bridge Distribution PDF YouTube Source code
CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates PDF
HotPETs keynote: The Power of Community Participation in Shaping Digital Rights Tech YouTube
gaukas commented 1 year ago

I have the recorded presentation for Chasing Shadows: A security analysis of the ShadowTLS proxy here: https://youtu.be/yDjx70RlSNk without the Q&A section, if that helps. Thanks!

wkrp commented 1 year ago

I have the recorded presentation for Chasing Shadows: A security analysis of the ShadowTLS proxy here

Added it to the table, thanks.