Get the latest tech news

Censors Ignore Unencrypted HTTP/2 Traffic (2024)


Using Unencrypted HTTP/2 to Circumvent Censorship

In China, HTTP/1.1 is censored with a combination of different TCP RST packets with the ACK flag set or not, depending on the specific domain. For previous HTTP versions, censors could analyze the first message sent by the client to extract the connection’s destination from human-readable ASCII bytes. Curl’s built-in support for unencrypted HTTP/2 can be used to access specific HTML sites but its usability is limited in comparison to a full-fletched web browser.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of censors

censors

Related news:

News photo

Meta censors pro-Palestinian views on a global scale, report claims