<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>dpi &#8211; TrueVPN Blog</title>
	<atom:link href="https://blog.truevpns.com/tag/dpi/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.truevpns.com</link>
	<description>The world&#039;s #1 Trusted VPN provider</description>
	<lastBuildDate>Mon, 04 May 2020 20:38:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.10</generator>

<image>
	<url>https://blog.truevpns.com/wp-content/uploads/2020/04/cropped-logo-app-1-32x32.png</url>
	<title>dpi &#8211; TrueVPN Blog</title>
	<link>https://blog.truevpns.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>TrueVPN Rolls Out DPI Bypass Mechanisms!</title>
		<link>https://blog.truevpns.com/truevpn-rolls-out-dpi-bypass-mechanisms/</link>
		
		<dc:creator><![CDATA[TrueVPN]]></dc:creator>
		<pubDate>Mon, 04 May 2020 20:38:12 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[TrueVPN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[dpi]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[truevpn]]></category>
		<guid isPermaLink="false">https://blog.truevpns.com/?p=414</guid>

					<description><![CDATA[When you are living or staying in a restrictive country where personal rights are usually getting scrapped away, you will most likely have a problem when trying to access certain websites on the internet. Most of the time, the restrictive countries are enforcing their internet laws to their citizens, forcing them to follow the guidelines as laid out by the government.]]></description>
										<content:encoded><![CDATA[
<p class="has-drop-cap">When you are living or staying in a restrictive country where personal rights are usually getting scrapped away, you will most likely have a problem when trying to access certain websites on the internet. Most of the time, the restrictive countries are enforcing their internet laws to their citizens, forcing them to follow the guidelines as laid out by the government.</p>



<p>The government will totally control the people’s behavior over the internet by using the technology that won’t allow them to exercise their online privacy rights or personal freedom on the internet. One of the methods used by the restrictive government to block your online traffic is by using a system called DPI or <a href="https://blog.truevpns.com/what-is-deep-packet-inspection/" class="aioseop-link"><strong>Deep Packet Inspection</strong></a>.</p>



<p>What the <a href="https://blog.truevpns.com/what-is-deep-packet-inspection/" class="aioseop-link">DPI</a> system is doing is that it will analyze the internet traffic that is coming through your ISP. It will identify your traffic type and either allow the traffic to reach the internet or block it. If you are using the regular ISP traffic, the system will allow you to access the internet, while if you are using the VPN traffic, the system can recognize it and block your connection from reaching the internet. This is an advanced traffic monitoring system installed by the restrictive government to prevent people from using private connections and force them to follow the government’s internet regulations.</p>



<h2>Background</h2>



<p>As TrueVPN focuses on security and privacy, It&#8217;s clear that DPI is a huge issue!<br>When talking about privacy and security, We must consider that DPI that performed by some countries for <a href="https://blog.truevpns.com/what-is-vpn-blocking-and-how-to-bypass-it/" class="aioseop-link">VPN blocking</a> or any other political reason comes against user&#8217;s privacy.</p>



<p><strong>Why we consider it as a huge privacy issue?</strong><br>Alright, to answer that, we need to understand <a href="https://blog.truevpns.com/what-is-deep-packet-inspection/" class="aioseop-link">how Deep Packet Inspection works.</a></p>



<p>Well, <strong>Deep packet inspection</strong> evaluates the data part and the header of a <strong>packet</strong> that is transmitted through an <strong>inspection</strong> point, weeding out any non-compliance to protocol, spam, viruses, intrusions, and any other defined criteria to block the <strong>packet</strong> from passing through the <strong>inspection</strong> point.</p>



<figure class="wp-block-image size-large"><img width="700" height="305" src="https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_.png" alt="" class="wp-image-415" srcset="https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_.png 700w, https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_-300x131.png 300w, https://blog.truevpns.com/wp-content/uploads/2020/05/700px-SSL_Deep_Inspection_Explanation.svg_-450x196.png 450w" sizes="(max-width: 700px) 100vw, 700px" /></figure>



<p>Deep packet inspection can examine the content of messages and identify the specific application or service it comes from. In addition, filters can be programmed to look for and reroute network traffic from a specific Internet Protocol (IP) address range or a certain online service like Facebook.</p>



<p>So by looking to the image above, We can see that DPI acts like <a aria-label="MITM Attacks (opens in a new tab)" href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" target="_blank" rel="noreferrer noopener nofollow" class="aioseop-link">MITM Attacks</a>, So the encrypted user&#8217;s traffic has to be decrypted to read its data then re-encrypt it again and re-send the encrypted data to the CA. So we <strong>MUST</strong> consider that this is a huge issue of user&#8217;s privacy.</p>



<h2>HOW TRUEVPN SOLVED THE ISSUE?</h2>



<p>Ok, At TrueVPN we believe deeply in security and user privacy, Every user has rights to privacy, because we believe that privacy is a human right and it should be respected.</p>



<blockquote class="wp-block-quote"><p>All human beings have three lives: public, private, and secret.</p><cite><strong>Gabriel García Márquez</strong></cite></blockquote>



<p>For a long while, TrueVPN was trying to solve this issue and bypassing DPI without redirecting user&#8217;s traffic or missing with CA. If you do not know what is that means, So you must have a little knowledge of Networking.</p>



<h3>TRUEVPN RESEARCH</h3>



<p>Based on our Research, We&#8217;ve developed an AI tool to analyze the ISP&#8217;s connection policies before establishing the connection, by performing that, we can check if the ISP blocks the used VPN protocol by the user or recently performed Deep Packet Inspection or Bandwidth Throttling based on analytics data. This tool is powered by <a aria-label="Skytells&#039;s latest AI (opens in a new tab)" href="https://blog.skytells.org" target="_blank" rel="noreferrer noopener" class="aioseop-link">Skytells&#8217;s latest AI</a>, and its powerful enough to analyze these policies. </p>



<p>Of course these tools are deployed on <a href="https://www.truevpns.com" class="aioseop-link" target="_blank" rel="noopener">TrueVPN&#8217;s iOS App</a> for version <strong>2.5</strong> and later.</p>



<figure class="wp-block-image size-large"><img width="1024" height="386" src="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-1024x386.jpg" alt="" class="wp-image-416" srcset="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-1024x386.jpg 1024w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-300x113.jpg 300w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-768x289.jpg 768w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-450x170.jpg 450w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642-780x294.jpg 780w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0642.jpg 1242w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Policy Checks feature on TrueVPN</figcaption></figure>



<h3>HOW IT WORKS?</h3>



<p>When you <a aria-label="Enable Policy Checks (opens in a new tab)" href="https://help.truevpns.com/kb/what-is-policy-checks/" target="_blank" rel="noreferrer noopener" class="aioseop-link">Enable Policy Checks</a> on TrueVPN, The app will perform some checks before establishing the VPN connection, And try to solve any detected issues regarding the ISP or the living country if possible.</p>



<p>Lets give it an example, Imagine of a user named Doe, lives in country X, while country X is performing a Deep Packet Inspection targeting VPN providers to crack em down, So, When the users opens the VPN app and taps connect, Here&#8217;s what&#8217;s going to happen in the background</p>



<ol><li>User Taps or Clicks (Connect to a VPN)</li><li>The VPN app will choose the VPN protocol if it not set by user.</li><li>The App chooses iKEv2 or IPSec</li><li>The app begins to connect using IKEv2 or IPSec</li><li>The App receives connection timeout message</li></ol>



<p>And here&#8217;s why, When the App tries to choose the protocol on the 2nd step, it doesn&#8217;t check if the protocol has an issue regarding <a href="https://blog.truevpns.com/what-is-vpn-blocking-and-how-to-bypass-it/" class="aioseop-link">VPN Blocking</a> in the current location or not, so it may ends up with connection timeout if it fails to connect.</p>



<p><strong>But</strong>, by using an analytics tools based on research such as <a href="https://help.truevpns.com/kb/what-is-policy-checks/" class="aioseop-link" target="_blank" rel="noopener">Policy Checks Mechanisms </a>TrueVPN will perform the following steps regarding the connection.</p>



<ol><li>User Taps or Clicks on (Connect to a VPN)</li><li>TrueVPN performs some checks on user&#8217;s connection</li><li>If there&#8217;s an issue regarding the connection (See Image), The app tries to solve it first.</li><li>After solving the issue, The app will choose an obfuscated protocol</li><li> The app begins to connect using obfuscated protocol powered with proxy tunnel</li><li>The App receives success response from server.</li></ol>



<figure class="wp-block-image size-large"><img width="806" height="1024" src="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-806x1024.jpg" alt="" class="wp-image-417" srcset="https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-806x1024.jpg 806w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-236x300.jpg 236w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-768x975.jpg 768w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-1210x1536.jpg 1210w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-450x571.jpg 450w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644-780x990.jpg 780w, https://blog.truevpns.com/wp-content/uploads/2020/05/IMG_0644.jpg 1242w" sizes="(max-width: 806px) 100vw, 806px" /><figcaption>Bypassing Deep Packet Inspection</figcaption></figure>



<p>So by performing that, TrueVPN will only use a custom obfuscated protocols when needed, and these protocols are empowered by proxy tunnel to prevent DPI detection, And finally the app can bypass the VPN Blocking.</p>


		<aside class="rb-related is-dark-style is-light-text">
			<h6 class="rb-related-header h3">You May Also Like</h6>
			<div class="rb-related-content rb-row rb-n15-gutter">
									<div class="rb-col-t6 rb-col-m12 rb-p15-gutter">
						<div class="rb-related-el">
															<div class="p-feat">
									<span class="rb-iwrap pc-75"><img width="280" height="210" src="https://blog.truevpns.com/wp-content/uploads/2022/04/truedome-1-280x210.png" class="attachment-pixwell_280x210 size-pixwell_280x210 wp-post-image" alt="TrueDome by TrueVPN" /></span>
								</div>
							<h6 class="related-title">TrueDome Annual Report: Unmatched Cybersecurity in Action.</h6>							<a class="related-link" href="https://blog.truevpns.com/truedome-annual-report-unmatched-cybersecurity-in-action/" title="TrueDome Annual Report: Unmatched Cybersecurity in Action."></a>
						</div>
					</div>
									<div class="rb-col-t6 rb-col-m12 rb-p15-gutter">
						<div class="rb-related-el">
															<div class="p-feat">
									<span class="rb-iwrap pc-75"><img width="280" height="210" src="https://blog.truevpns.com/wp-content/uploads/2022/04/Ram-only-280x210.png" class="attachment-pixwell_280x210 size-pixwell_280x210 wp-post-image" alt="" loading="lazy" /></span>
								</div>
							<h6 class="related-title">TrueVPN upgrades its infrastructure to 100% RAM-only servers</h6>							<a class="related-link" href="https://blog.truevpns.com/truevpn-upgrades-its-servers-to-ram-only-servers/" title="TrueVPN upgrades its infrastructure to 100% RAM-only servers"></a>
						</div>
					</div>
							</div>
		</aside>
		



<h2>POLICY CHECKS FAQs</h2>



<p>Here are some answers related to this feature.</p>



<p><strong>Is Policy Checks Feature Free?</strong><br>Yes, This feature is free.</p>



<p><strong>Should in use TrueVPN with Policy Checks?</strong><br>If you&#8217;re living in a country cracks down VPN connectivity or recently performed DPI, You must enable this feature. </p>



<p><strong>Will This Decrease or Increase Connection Speed?</strong><br>Of course no, This feature are just a mechanisms, designed to perform some analytics on ISP and connection <strong>before</strong> you connect to a VPN.</p>



<h2>Conclusion</h2>



<p>If you live in one of the countries who have issues with VPN Providers and tries to crack them down by blocking VPN protocols or performing DPI, Then TrueVPN is your best choice, because the app can bypass that easily.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is Deep Packet Inspection?</title>
		<link>https://blog.truevpns.com/what-is-deep-packet-inspection/</link>
		
		<dc:creator><![CDATA[TrueVPN]]></dc:creator>
		<pubDate>Sun, 03 May 2020 19:04:56 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data and Security]]></category>
		<category><![CDATA[deep packet inspection]]></category>
		<category><![CDATA[dpi]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://blog.truevpns.com/?p=404</guid>

					<description><![CDATA[Deep packet inspection, which is also known as DPI, information extraction, IX, or complete packet inspection, is a type of network packet filtering.]]></description>
										<content:encoded><![CDATA[
<p class="has-drop-cap">Deep packet inspection, which is also known as DPI, information extraction, IX, or complete packet inspection, is a type of network packet filtering. Deep packet inspection evaluates the data part and the header of a packet that is transmitted through an inspection point, weeding out any non-compliance to protocol, spam, viruses, intrusions, and any other defined criteria to block the packet from passing through the inspection point.</p>



<p>Deep packet inspection is also used to decide if a particular packet is redirected to another destination. In short, deep packet inspection is able to locate, detect, categorize, block, or reroute packets that have specific code or data payloads that are not detected, located, categorized, blocked, or redirected by conventional packet filtering. Unlike plain packet filtering, deep packet inspection goes beyond examining packet headers.</p>



<h1>HOW DEEP PACKET INSPECTION WORKS?</h1>



<p>Deep packet inspection is a form of packet filtering usually carried out as a function of your firewall. It is applied at the Open Systems Interconnection&#8217;s application layer.</p>



<p>Deep packet inspection&nbsp;evaluates the contents&nbsp;of a packet that is going through a checkpoint. Using rules that are assigned by you, your Internet service provider, or the network or systems administrator, deep packet inspection determines what to do with these packets in real time.</p>



<p>Deep packet inspection is able to check the contents of these packets and then figure out where it came from, such as the service or application that sent it. In addition, it can work with filters in order to find and redirect network traffic from an online service, such as Twitter or Facebook, or from a particular IP address.</p>



<h1>DPI VS. CONVENTIONAL PACKET FILTERING</h1>



<p>Conventional packet filtering only reads the header information of each packet. This was a basic approach that was less sophisticated than the modern approach to packet filtering largely due to the technology limitations at the time. Firewalls had very little processing power, and it was not enough to handle large volumes of packets. In other words, conventional packet filtering was similar to reading the title of a book, without awareness or evaluation of the content inside the cover.</p>



<p>With the advent of new technologies, deep packet inspection became feasible. As it became more thorough and complete, it became more comparable to picking up a book, cracking it open, and reading it from cover to cover.</p>



<h1>USE CASES FOR DPI</h1>



<p>There are several uses for deep packet inspection. It can act as both an intrusion detection system or a combination of intrusion prevention and intrusion detection. It can identify specific attacks that your firewall, intrusion prevention, and intrusion detection systems cannot adequately detect.</p>



<p>If your organization has users who are using their laptops for work, then deep packet inspection is vital in preventing worms, spyware, and viruses from getting into your corporate network. Furthermore, using deep packet inspection is based on rules and policies defined by you, allowing your network to detect if there are prohibited uses of approved applications.</p>



<p>Deep packet inspection is also used by network managers to help ease the flow of network traffic. For instance, if you have a high priority message, you can use deep packet inspection to enable high-priority information to pass through immediately, ahead of other lower priority messages. You can also prioritize packets that are mission-critical, ahead of ordinary browsing packets. If you have problems with peer-to-peer downloads, you can use deep packet inspection to throttle or slow down the rate of data transfer. DPI can also be used to enhance the capabilities of ISPs to prevent the exploitation of IoT devices in DDOS attacks by&nbsp;blocking malicious requests&nbsp;from devices.</p>



<p>Mobile service operators and other similar service providers also use deep packet inspection to tailor-fit their offerings to individual subscribers allowing them to differentiate data usage as “all you can eat,” wall garden, or value added. Record labels and other copyright holders can also request ISPs to block their content from being downloaded illegally – a process achieved through deep packet inspection.</p>



<p>Other times, deep packet inspection is used to serve targeted advertising to users, lawful interception, and policy enforcement. Deep packet inspection can also prevent some types of buffer overflow attacks.&nbsp;</p>



<p>Lastly, deep packet inspection can help you prevent anybody from leaking information, such as when e-mailing a confidential file. Instead of being able to successfully send out a file, the user will instead receive information on how to get the necessary permission and clearance to send it.</p>



<p>As with other technologies, deep packet inspection can also be used for less than admirable purposes, such as eavesdropping and censorship. In fact, the&nbsp;Chinese government&nbsp;has been known to use deep packet inspection to monitor the country&#8217;s network traffic and censor some content and sites that are harmful to their interests. This is how China has been able to block out pornography, religious information, materials concerning political dissent, and even popular websites such as Wikipedia, Google, and Facebook.</p>



<p>While DPI has many potential use cases, it can easily detect the recipient or sender of the content that it monitors, so there are some concerns around privacy. This is primarily a concern when DPI is used in the context of marketing and advertising, through monitoring the behavior of users and selling browsing and other data to marketing or advertising companies.</p>



<h1>DEEP PACKET INSPECTION TECHNIQUES</h1>



<p>Two primary types of products utilize deep packet inspection: firewalls that have implemented features of IDS, such as content inspection, and IDS systems that aim to protect the network rather than focus only on detecting attacks. Some of the&nbsp;main techniques&nbsp;used for deep packet inspection include:</p>



<p>●<strong>&nbsp;Pattern or signature matching</strong>&nbsp;– One approach to using firewalls that have adopted IDS features, pattern or signature matching, analyzes each packet against a database of known network attacks. The downside to this approach is that it’s effective only for known attacks, and not for attacks that have yet to be discovered.<br>●&nbsp;<strong>Protocol anomaly</strong>&nbsp;– Another approach to using firewalls with IDS features, protocol anomaly uses a “default deny” approach, which is a key security principle. Using this technique, protocol definitions are used to determine which content should be allowed. This differs from the approach of simply allowing all content that doesn’t match the signatures database, as occurs in the case of pattern or signature matching. The primary benefit of protocol anomaly is that it offers protection against unknown attacks.<br>●<strong>&nbsp;IPS solutions</strong>&nbsp;– Some IPS solutions implement DPI technologies. These solutions have similar functionality to in-line IDS, although they have the ability to block detected attacks in real-time. One of the biggest challenges in using this technique is the risk of false positives, which can be mitigated to some extent through the creation of conservative policies.</p>



<p>Some limitations exist with these and other DPI techniques, although vendors offer solutions aiming to eliminate the practical and architectural challenges through various means. Additionally, DPI solutions are now offering a range of other complimentary technologies such as VPNs, malware analysis, anti-spam filtering, URL filtering, and other technologies, providing more comprehensive network protection.</p>



<h1>CHALLENGES OF DPI</h1>



<p>No technology is perfect, and deep packet inspection is no exception. It has three distinct weaknesses:</p>



<p>1. Deep packet inspection is very effective in preventing attacks such as denial of service attacks, buffer overflow attacks, and even some forms of malware. But it can also be used to<strong>&nbsp;create similar attacks</strong>.&nbsp;</p>



<p>2. Deep packet inspection can make your current firewall and other security software you use more&nbsp;<strong>complicated and harder to manage</strong>. You need to be sure that you constantly update and revise deep packet inspection policies to ensure continued effectiveness.</p>



<p>3. Deep packet inspection can<strong>&nbsp;slow down your network&nbsp;</strong>by dedicating resources for your firewall to be able to handle the processing load.</p>



<p>Aside from privacy concerns and the inherent limitations of deep packet inspection, some concerns have arisen due to the use of HTTPS certificates and even VPNs with privacy tunneling. Some firewalls are now offering HTTPS inspections, which would decrypt the HTTPS-protected traffic and determine whether the content is permitted to pass through. However, deep packet inspection continues to be a&nbsp;valuable practice&nbsp;for purposes ranging from performance management to network analytics, forensics, and enterprise security.</p>



<h1><strong>GOVERNMENTAL USE OF DPI</strong></h1>



<p>In addition to using DPI for the security of their own networks, governments in North America, Europe, and Asia use DPI for various purposes such as&nbsp;surveillance&nbsp;and&nbsp;censorship. <br>Many of these programs are classified.</p>



<h2>United States</h2>



<p>FCC adopts Internet&nbsp;CALEA&nbsp;requirements: The FCC, pursuant to its mandate from the U.S. Congress, and in line with the policies of most countries worldwide, has required that all telecommunication providers, including Internet services, be capable of supporting the execution of a court order to provide real-time communication forensics of specified users. In 2006, the FCC adopted new Title 47, Subpart Z, rules requiring Internet Access Providers to meet these requirements. DPI was one of the platforms essential to meeting this requirement and has been deployed for this purpose throughout the U.S.</p>



<h2>China</h2>



<p>The Chinese government uses Deep Packet Inspection to monitor and censor network traffic and content that it claims is harmful to Chinese citizens or state interests. This material includes pornography, information on religion, and political dissent.&nbsp;<br>Chinese network&nbsp;<a href="https://en.wikipedia.org/wiki/ISP" class="aioseop-link" target="_blank" rel="noopener">ISPs</a>&nbsp;use DPI to see if there is any sensitive keyword going through their network. If so, the connection will be cut. People within China often find themselves blocked while accessing Web sites containing content related to&nbsp;Taiwanese&nbsp;and&nbsp;Tibetan&nbsp;independence,&nbsp;Falun Gong, the&nbsp;Dalai Lama, the&nbsp;<a href="https://en.wikipedia.org/wiki/Tiananmen_Square_protests_of_1989" class="aioseop-link" target="_blank" rel="noopener">Tiananmen Square protests and massacre of 1989</a>, political parties that oppose that of the ruling Communist party, or a variety of anti-Communist movements &nbsp;as those materials were signed as DPI sensitive keywords already. China previously blocked all VoIP traffic in and out of their country&nbsp;but many available VOIP applications now function in China. Voice traffic in&nbsp;Skype&nbsp;is unaffected, although text messages are subject to filtering, and messages containing sensitive material, such as curse-words, are simply not delivered, with no notification provided to either participant in the conversation. China also blocks visual media sites such as YouTube.com and various photography and blogging sites.</p>



<h2>Iran</h2>



<p>The Iranian government purchased a system, reportedly for deep packet inspection, in 2008 from Nokia Siemens Networks (NSN) (a joint venture Siemens AG, the German conglomerate, and Nokia Corp., the Finnish cell telephone company), now NSN is Nokia Solutions and Networks, according to a report in the <em>Wall Street Journal</em> in June, 2009, quoting NSN spokesperson Ben Roome. According to unnamed experts cited in the article, the system enables authorities to not only block communication but to monitor it to gather information about individuals, as well as alter it for disinformation purposes.</p>



<h2>Russian Federation</h2>



<p>DPI is not yet mandated in Russia.&nbsp;Federal Law №139&nbsp;enforces blocking websites on the&nbsp;Russian Internet blacklist&nbsp;using IP filtering, but does not force ISPs into analyzing the data part of packets. Yet some ISPs still use different DPI solutions to implement blacklisting. For 2019, the governmental agency&nbsp;Roskomnadzor&nbsp;is planning a nationwide rollout of DPI after a pilot project in one of the country&#8217;s regions, at an estimated cost of 20 billion roubles (US$300M).</p>



<p></p>



<h2>Singapore</h2>



<p>The city state reportedly employs deep packet inspection of Internet traffic.</p>



<h2>Syria</h2>



<p>The state reportedly employs deep packet inspection of Internet traffic, to analyze and block unallowed transit.</p>



<h2>Malaysia</h2>



<p>The incumbent Malaysian Government, headed by Barisan Nasional, was said to be using DPI against a political opponent during the run-up to the 13th general elections held on 5 May 2013.</p>



<p>The purpose of DPI, in this instance, was to block and/or hinder access to selected websites, e.g. Facebook accounts, blogs and news portals.</p>



<h2>Egypt</h2>



<p>Since 2015, Egypt reportedly started to join the list which was constantly being denied by the Egyptian National Telecom Regulatory Authority (NTRA) officials. However, it came to news when the country decided to block the encrypted messaging app&nbsp;Signal&nbsp;as announced by the application&#8217;s developer.</p>



<p>In April 2017, all VOIP applications including FaceTime, Facebook Messenger, Viber, Whatsapp calls and Skype have been all blocked in the country.</p>


		<aside class="rb-related is-dark-style is-light-text">
			<h6 class="rb-related-header h3">You May Also Like</h6>
			<div class="rb-related-content rb-row rb-n15-gutter">
									<div class="rb-col-t6 rb-col-m12 rb-p15-gutter">
						<div class="rb-related-el">
															<div class="p-feat">
									<span class="rb-iwrap pc-75"><img width="280" height="210" src="https://blog.truevpns.com/wp-content/uploads/2022/04/truedome-1-280x210.png" class="attachment-pixwell_280x210 size-pixwell_280x210 wp-post-image" alt="TrueDome by TrueVPN" loading="lazy" /></span>
								</div>
							<h6 class="related-title">TrueDome Annual Report: Unmatched Cybersecurity in Action.</h6>							<a class="related-link" href="https://blog.truevpns.com/truedome-annual-report-unmatched-cybersecurity-in-action/" title="TrueDome Annual Report: Unmatched Cybersecurity in Action."></a>
						</div>
					</div>
									<div class="rb-col-t6 rb-col-m12 rb-p15-gutter">
						<div class="rb-related-el">
															<div class="p-feat">
									<span class="rb-iwrap pc-75"><img width="280" height="210" src="https://blog.truevpns.com/wp-content/uploads/2022/04/Ram-only-280x210.png" class="attachment-pixwell_280x210 size-pixwell_280x210 wp-post-image" alt="" loading="lazy" /></span>
								</div>
							<h6 class="related-title">TrueVPN upgrades its infrastructure to 100% RAM-only servers</h6>							<a class="related-link" href="https://blog.truevpns.com/truevpn-upgrades-its-servers-to-ram-only-servers/" title="TrueVPN upgrades its infrastructure to 100% RAM-only servers"></a>
						</div>
					</div>
							</div>
		</aside>
		



<p></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
