Circumventing censorship with collage

Sam Burnett, Nick Feamster, Santosh Vempala

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations


Oppressive regimes and even democratic governments restrict Internet access. Existing anti-censorship systems often require users to connect through proxies, but these systems are relatively easy for a censor to discover and block. We explore a possible next step in the censorship arms race: rather than relying on a single system or set of proxies to circumvent censorship firewalls, we use the vast deployment of sites that host user-generated content to breach these firewalls. We have developed Collage, which allows users to exchange messages through hidden channels in sites that host user-generated content. To send a message, a user embeds it into cover traffic and posts the content on some site, where receivers retrieve this content. Collage makes it difficult for a censor to monitor or block these messages by exploiting the sheer number of sites where users can exchange messages and the variety of ways that a message can be hidden. We have built a censorship-resistant news reader using Collage that can retrieve from behind a censorship firewall and show Collage's effectiveness with a live demonstration of its complete infrastructure.

Original languageEnglish (US)
Title of host publicationSIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference
Number of pages2
StatePublished - 2010
Event7th International Conference on Autonomic Computing, SIGCOMM 2010 - New Delhi, India
Duration: Aug 30 2010Sep 3 2010

Publication series

NameSIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference


Other7th International Conference on Autonomic Computing, SIGCOMM 2010
CityNew Delhi

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Theoretical Computer Science


  • availability
  • censorship


Dive into the research topics of 'Circumventing censorship with collage'. Together they form a unique fingerprint.

Cite this