Kevin Bock (@kkevsterrr) 's Twitter Profile
Kevin Bock

@kkevsterrr

CNO developer, censorship evasion, and security. PhD in CS. Creator of Geneva (censorship.ai): learns how to evade state censors. former blue check

ID: 2980033335

calendar_today15-01-2015 17:16:18

98 Tweet

240 Followers

838 Following

Roya Ensafi (@royaensafi) 's Twitter Profile Photo

Next, presented by Sadia Nourin, a new system that measures censorship without the endpoint participation, especially useful for countries with small populations, and extremely repressive regimes. Sadia Nourin Kevin Bock 𝓟𝓱𝓸𝓷𝓰 Dave Levin petsymposium.org/foci/2023/foci…

Next, presented by  <a href="/sadia__nourin/">Sadia Nourin</a>, a new system that measures censorship without the endpoint participation, especially useful for countries with small populations, and extremely repressive regimes.  <a href="/sadia__nourin/">Sadia Nourin</a> <a href="/kkevsterrr/">Kevin Bock</a> <a href="/NP_tokumei/">𝓟𝓱𝓸𝓷𝓰</a> <a href="/DistributedDave/">Dave Levin</a>
petsymposium.org/foci/2023/foci…
Roya Ensafi (@royaensafi) 's Twitter Profile Photo

Presented by Aaron, this work investigates the impact of Russian censorship on transit traffic, affecting ASes in at least 9 of neighboring countries. Aaron Kevin Bock Dave Levin 🔗 petsymposium.org/foci/2023/foci…

Presented by <a href="/a_a_ron_ortwein/">Aaron</a>, this work investigates the impact of Russian censorship on transit traffic, affecting ASes in at least
9 of neighboring countries. <a href="/a_a_ron_ortwein/">Aaron</a> <a href="/kkevsterrr/">Kevin Bock</a> <a href="/DistributedDave/">Dave Levin</a>
🔗 petsymposium.org/foci/2023/foci…
Roya Ensafi (@royaensafi) 's Twitter Profile Photo

Presented by Kevin Bock, this paper explores server-side censorship evasion strategies & proposes distributed training model enabling users to contribute to discovering such strategies. Nhi Tran Dave Levin petsymposium.org/foci/2023/foci…

Presented by <a href="/kkevsterrr/">Kevin Bock</a>, this paper explores server-side censorship evasion strategies &amp; proposes distributed training model enabling users to contribute to discovering such strategies. Nhi Tran  <a href="/DistributedDave/">Dave Levin</a>

petsymposium.org/foci/2023/foci…
Ram (@ramakrishnan13s) 's Twitter Profile Photo

📢Today ACM SIGCOMM, I will be presenting work on passively detecting connection tampering using large-scale, user-generated data. Read our paper: ramakrishnansr.com/assets/passive… (1/5)

📢Today <a href="/ACMSIGCOMM/">ACM SIGCOMM</a>, I will be presenting work on passively detecting connection tampering using large-scale, user-generated data. Read our paper: ramakrishnansr.com/assets/passive… (1/5)
Ram (@ramakrishnan13s) 's Twitter Profile Photo

This work is the result of an extensive collaboration between academia and industry. Congrats to Louis-Henri Merino, Kevin Bock, Marwan Fayed, Dave Levin, Nick Sullivan, Luke Valenta! Our detection is deployed live Cloudflare Radar at: radar.cloudflare.com/security-and-a… (5/5)

Cloudflare (@cloudflare) 's Twitter Profile Photo

Cloudflare Radar is constantly monitoring the Internet for widespread disruptions. Here we examine several recent noteworthy disruptions detected in the first month of Q3, including traffic anomalies observed in Bangladesh, Syria, Pakistan, and Venezuela. cfl.re/3A14dy4

Grant Slatton (@grantslatton) 's Twitter Profile Photo

Took a parallel computing class in university The prof would slip unsolved problems into problem sets in the hope some genius student would accidentally solve it E.g. an assignment would just casually say "Parallelize Dijkstra's algorithm" as if it was straightforward

Cloudflare (@cloudflare) 's Twitter Profile Photo

Cloudflare brings visibility to the practice of connection tampering as observed from our global network. cfl.re/3TiFEUb

𝓟𝓱𝓸𝓷𝓰 (@np_tokumei) 's Twitter Profile Photo

Since this post is going viral, and as someone who has done some research on🇨🇳's Great Firewall (GFW). There're a few useful things I would like to share: (1) Despite the inclusion of 六四天安門 in its HTML body, which is a bizarre thing to do IMO since the phrase is really

gfw.report (@gfw_report) 's Twitter Profile Photo

🚨We discovered Wallbleed, a vulnerability in the Great Firewall of China, allowing anyone leaks its memory. Since 2021, we reverse-engineered its logic, evaluated impact, and monitored patches. Wallbleed reveals censorship devices’ global privacy risks: gfw.report/publications/n…

🚨We discovered Wallbleed, a vulnerability in the Great Firewall of China, allowing anyone leaks its memory. Since 2021, we reverse-engineered its logic, evaluated impact, and monitored patches. Wallbleed reveals censorship devices’ global privacy risks: gfw.report/publications/n…
Lukasz Olejnik (@lukolejnik) 's Twitter Profile Photo

Chinese Great Firewall (website access blockade and. content filter for internet traffic) was leaking data! It's a fascinating discovery of security and privacy vulnerability in a large-scale technical censorship system. "Traffic with no relation to China could be leaked".

Chinese Great Firewall (website access blockade and. content filter for internet traffic) was leaking data! It's a fascinating discovery of security and privacy vulnerability in a large-scale technical censorship system. "Traffic with no relation to China could be leaked".
Nick Sullivan (@grittygrease) 's Twitter Profile Photo

If you haven't been tracking, RCS texting is rolling out end-to-end encryption using MLS. This is a huge triumph of the IETF and the collaborative approach to creating internet-grade protocols championed there. arstechnica.com/gadgets/2025/0…

Cher Scarlett 🌌 (@cherthedev) 's Twitter Profile Photo

“ minutes after DOGE accessed the NLRB's systems, someone with an IP address in Russia started trying to log in... Whoever was attempting to log in was using one of the newly created DOGE accounts — and the person had the correct username and password” npr.org/2025/04/15/nx-…

Tom Warner (@warnerta) 's Twitter Profile Photo

The buried lede is, Russia hacked DOGE, obtained a DOGE username and password and tried to use it to access federal data soon after DOGE got access. The login was blocked but the hack might have allowed Russia to piggyback on DOGE's access to far more. npr.org/2025/04/15/nx-…

Kevin Bock (@kkevsterrr) 's Twitter Profile Photo

Unfortunately not as impossible as the anticensorship community would like it to be (see the success rates of VPNs in China during state events...) Or turn to Turkmenistan, where reports have surfaced of citizens having to swear on the Koran that they will not use a VPN!