You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In a thread at the NTC forum, @ValdikSS posted about written evaluations of various DPI systems done by Roskomnadzor. One of these systems, Carbon Reductor DPI X, is available for trial download as an ISO image. I haven't tested it, but it looks like it's meant to work on standard PC hardware. The download directory is here:
A while ago we discussed acquiring a DPI box to analyze. Well, this may be the chance! This could be a fascinating opportunity to test and understand a real DPI system in a controlled environment. (You would want to install it on an isolated network to prevent it phoning home.) I'm particularly interested in another observation of @ValdikSS's:
You would want to install it on an isolated network to prevent it phoning home
This is a trial version of a premium software, you need it to access the internet to at least activate trial period.
And please remember this is not a generic DPI solution. It's built for Russian censorship in mind, to automate Russian censorship.
This is a trial version of a premium software, you need it to access the internet to at least activate trial period.
Well, I was assuming that some amount of cracking / reverse engineering would be required in any case--possibly there's a way to disable whatever on-line checks exist. Or alternatively, let it be connected to the Internet, be careful not to send anything sensitive through it, and capture all the traffic it sends back home.
In a thread at the NTC forum, @ValdikSS posted about written evaluations of various DPI systems done by Roskomnadzor. One of these systems, Carbon Reductor DPI X, is available for trial download as an ISO image. I haven't tested it, but it looks like it's meant to work on standard PC hardware. The download directory is here:
A while ago we discussed acquiring a DPI box to analyze. Well, this may be the chance! This could be a fascinating opportunity to test and understand a real DPI system in a controlled environment. (You would want to install it on an isolated network to prevent it phoning home.) I'm particularly interested in another observation of @ValdikSS's:
I'm curious to know what kinds of unknown protocols cause this reporting to happen.
Here is the Roskomnadzor report (Russian):
Here are the sha256sums. You can see that in many cases, the same file appears multiple times under different filenames.
The text was updated successfully, but these errors were encountered: