Get a t-shirt
Suggest a Paper!
Suggest a Paper you would like to see being annotated by the community (url):
Send us your email and we will tell you when it's available:
Enter your email to receive a new paper every week:
Join our newsletter to receive a new paper every week
Ask a question or post a comment about the paper
Join the discussion! Sign up below to be able to comment and ask questions.
Facebook Sign Up
Google Sign Up
To add a question/comment to a specific line, equation, table or graph simply click on it.
Click on the annotations on the left side of the paper to read and reply to the questions and comments.
Internet censorship in China is quite severe. Allegedly, the Chines...
**Deep packet inspection (DPI)** is a technique for packet filterin...
**Tor bridges** Tor works by routing your traffic through a netw...
Transport Layer Security (TLS) provides you with an encrypted and s...
In other words, the goal is to prevent DPI from being used to ident...
**Domain fronting** is a way of circumventing a firewall. With doma...
[You can check out a full list of current Pluggable Transports here...
A **SOA (Start of Authority)** DNS record provides some extra infor...