{"citation":{"ieee":"N. Niere, F. Lange, N. Heitmann, and J. Somorovsky, “Encrypted Client Hello (ECH) in Censorship Circumvention,” presented at the Free and Open Communications on the Internet, Washington, D.C., 2025.","apa":"Niere, N., Lange, F., Heitmann, N., & Somorovsky, J. (2025). Encrypted Client Hello (ECH) in Censorship Circumvention. Free and Open Communications on the Internet, Washington, D.C.","chicago":"Niere, Niklas, Felix Lange, Nico Heitmann, and Juraj Somorovsky. “Encrypted Client Hello (ECH) in Censorship Circumvention,” 2025.","short":"N. Niere, F. Lange, N. Heitmann, J. Somorovsky, in: 2025.","mla":"Niere, Niklas, et al. Encrypted Client Hello (ECH) in Censorship Circumvention. 2025.","bibtex":"@inproceedings{Niere_Lange_Heitmann_Somorovsky_2025, title={Encrypted Client Hello (ECH) in Censorship Circumvention}, author={Niere, Niklas and Lange, Felix and Heitmann, Nico and Somorovsky, Juraj}, year={2025} }","ama":"Niere N, Lange F, Heitmann N, Somorovsky J. Encrypted Client Hello (ECH) in Censorship Circumvention. In: ; 2025."},"oa":"1","author":[{"id":"63563","first_name":"Niklas","full_name":"Niere, Niklas","last_name":"Niere"},{"full_name":"Lange, Felix","last_name":"Lange","id":"67893","first_name":"Felix"},{"orcid":"0009-0003-7687-7044","full_name":"Heitmann, Nico","last_name":"Heitmann","first_name":"Nico","id":"74619"},{"first_name":"Juraj","id":"83504","orcid":"0000-0002-3593-7720","last_name":"Somorovsky","full_name":"Somorovsky, Juraj"}],"year":"2025","main_file_link":[{"url":"https://www.petsymposium.org/foci/2025/foci-2025-0016.pdf","open_access":"1"}],"user_id":"63563","conference":{"end_date":"2025-07-14","location":"Washington, D.C.","start_date":"2025-07-14","name":"Free and Open Communications on the Internet"},"_id":"60503","title":"Encrypted Client Hello (ECH) in Censorship Circumvention","language":[{"iso":"eng"}],"type":"conference","keyword":["censorship","circumvention","ECH","TLS"],"date_updated":"2025-07-03T07:14:23Z","has_accepted_license":"1","file":[{"file_size":755171,"success":1,"file_id":"60505","creator":"nniklas","date_created":"2025-07-03T07:11:14Z","content_type":"application/pdf","date_updated":"2025-07-03T07:11:14Z","file_name":"foci-2025-0016.pdf","relation":"main_file","access_level":"closed"}],"ddc":["006"],"date_created":"2025-07-03T07:14:00Z","status":"public","abstract":[{"lang":"eng","text":"Censors have long censored Transport Layer Security (TLS) traffic by inspecting the domain name in the unencrypted Server Name Indication (SNI) extension. By encrypting the SNI extension, the Encrypted ClientHello (ECH) prevents censors from blocking TLS traffic to certain domains. Despite this promising outlook, ECH’s current capability to contest TLS censorship is unclear; for instance, Russia has started censoring ECH connections successfully. This paper clarifies ECH’s current role for TLS censorship. To this end, we evaluate servers’ support for ECH and its analysis and subsequent blocking by censors. We determine Cloudflare as the only major provider supporting ECH. Additionally, we affirm previously known ECH censorship in Russia and uncover indirect censorship of ECH through encrypted DNS censorship in China and Iran. Our findings suggest that ECH’s contribution to censorship circumvention is currently limited: we consider ECH’s dependence on encrypted DNS especially challenging for ECH’s capability to circumvent censorship. We stress the importance of censorship-resistant ECH to solve the long-known problem of SNI-based TLS censorship."}],"file_date_updated":"2025-07-03T07:11:14Z"}