TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Censors Ignore Unencrypted HTTP/2 Traffic (2024)

62 pointsby ArinaSabout 1 month ago

6 comments

puttycatabout 1 month ago
Nice research, but I can only guess that this was fixed ten minutes after the report was published?
评论 #43686354 未加载
Naru41about 1 month ago
I don't see the point - ASCII vs. binary doesn't make any real difference. And there's no an actual unencrypted HTTP/2 traffic, so there's no incentive to censor.
userbinatorabout 1 month ago
The obvious follow-up is to then put a (possibly obfuscated) TLS connection in the request and response bodies, creating another tunneling method.
评论 #43700103 未加载
joshstrangeabout 1 month ago
Ok, I’ll ask the stupid question:<p>Why not use _Encrypted_ HTTP&#x2F;2 traffic? The article goes on and on about HTTP 1.1 and unencrypted HTTP 2.0 but never once mentioned encrypted HTTP 2.0 which I would assume shares the exact same binary&#x2F;“hard to block” characteristics of unencrypted HTTP 2.0.<p>I can only assume that everyone knows why that’s already blocked in China, but I don’t
评论 #43692824 未加载
graemepabout 1 month ago
Maybe they monitor rather than censor unencrypted traffic? That could be more of a problem for those in authoritarian countries.
exabrialabout 1 month ago
If anyone wants to know why I&#x27;ve been adamant we absolutely need unencrypted QUIC mode, here&#x27;s your answer.<p>Trojan horses are used by the good guys too.
评论 #43687335 未加载
评论 #43686788 未加载