OONI Glossary

Last updated: 3rd July 2023

This glossary contains brief explanations for terms used in OONI apps, methodologies, and research reports.

Translations:

If you would like to see additional terms in this glossary, please open a pull request or send us an email.

API

An Application Programming Interface (API) is an interface that enables programmers to write integration code between different services.

The OONI API provides an interface that enables users to request specific types of OONI data and to download such data in a specific format (JSON). For batch usage, we recommend the OONI PostgreSQL MetaDB.

For a more detailed explanation, we recommend the article “What is an API? In English, please”.

AS

The internet is run by tens of thousands of autonomous systems (AS) that coordinate with each other to share routing information: directions on how to reach IP addresses on the internet.

Generally, an Internet Service Provider (ISP) will be responsible for one or more ASs.

Each AS is responsible for delivering IP packets to a set of IP addresses that it manages.

ASN

An Autonomous System Number (ASN) is a unique identifier of an autonomous system (AS). This number allows the respective autonomous system to exchange routing information with other systems.

An Internet Service Provider (ISP) usually has an officially registered ASN (and they can have more than one ASN).

OONI Probe collects the ASN to identify the network in which each test was performed.

Looking up an ASN number in a web search engine (such as Google) will show you which ISP it corresponds to. For example, searching for ““AS30722"” should return ““Vodafone Italia””.

BGP

The Border Gateway Protocol (BGP) is a protocol used by Autonomous Systems (AS) on the internet to exchange routing information. With this information they are able to discover which AS is responsible for which set of IP addresses and what is the path IP packets need to take in order to reach that particular AS.

BGP data, aggregated and published by organizations such as RIPE and IODA, can be useful in detecting internet outages.

Blocklist

A blocklist is a list of internet resources (such as websites and IP addresses) which are blocked from user access.

Some governments occasionally publish official blocklists (or they get leaked) which contain lists of websites that are considered prohibited in a country in accordance with local legislation.

Internet Service Providers (ISPs) are then ordered to block access to all websites included in such blocklists, commonly involving hundreds (or thousands) of URLs that contain content which is considered illegal in the respective country (such as gambling, file sharing, adult content, political speech, etc.).

Block page

A block page (or “Access Denied Page”) is a web page that is displayed when a user attempts to access a website they are not permitted to view.

This is a censorship technique adopted by Internet Service Providers (ISPs) in several countries (such as Iran, Indonesia, Greece, and Italy).

When a block page is served by an ISP, the user does not view the content of the website they’re trying to access. Instead, they view a web page (the block page) that informs them that they’re not allowed to access the intended website.

A block page is the only form of internet censorship that clearly notifies internet users of the censorship. Often, a block page references the law behind the censorship.

As an example, below is a block page served by ISPs in Indonesia:

Indonesian block page

Based on OONI’s heuristics, internet censorship is automatically confirmed when a block page is detected.

Caching

Caching is the process of storing data in a temporary storage that allows faster access for future usage.

For example, a web server may cache certain web resources so they can be loaded faster when a user requests them.

Circumvention tools

Circumvention tools are technologies that enable their users to bypass internet censorship, such as the blocking of websites and social media apps.

Circumvention tools enable their users to access internet services that are blocked by their Internet Service Providers (ISPs).

VPNs and proxies are common circumvention tools, while Tor also provides its users with online privacy and anonymity (in addition to censorship circumvention).

Client

In the world of computers, a client is a piece of software or hardware that interacts with a service hosted by a server.

The OONI Probe app, for example, is a client that communicates with OONI servers in order to submit testing results.

Data processing pipeline

A data processing pipeline is a software system designed to process data.

The OONI data processing pipeline is responsible for aggregating network measurement data from OONI Probe users and analyzing the data to identify network anomalies around the world.

DNS

DNS stands for “Domain Name System” and it maps domain names to IP addresses.

A domain is a name that is commonly attributed to websites (when they’re created), so that they can be more easily accessed and remembered. For example, wikipedia.org is the domain of the Wikipedia website.

However, computers can’t connect to internet services through domain names, but based on IP addresses: the digital address of each service on the internet. Similarly, in the physical world, you would need the address of a house (rather than the name of the house itself) in order to visit it.

The Domain Name System (DNS) is what is responsible for transforming a human- readable domain name (such as ooni.org) into its numerical IP address counterpart (in this case:104.198.14.52), thus allowing your computer to access the intended website.

DNS hijacking

DNS hijacking (otherwise known as “DNS poisoning”) occurs when, upon looking up the address of a particular domain, the queried DNS resolver is ‘dishonest’, intentionally returning an incorrect answer.

As a result, you either receive the IP address of a block page, or you get a response claiming that the domain name does not exist.

When Internet Service Providers (ISPs) receive government orders to block specific websites, they sometimes adopt this technique. In these cases, it may be possible to circumvent the censorship merely by changing your DNS resolver, or by using encrypted DNS, such as DNS over HTTPS.

DNS lookup

When you try to access a website in your browser, the request is forwarded to a DNS resolver, requesting the corresponding IP address to the domain name you entered.

To check whether websites are blocked by means of DNS, OONI Probe starts off by performing a DNS lookup to see which IP addresses are mapped to tested domains by the user’s DNS resolver. If the IP addresses do not match those allocated by another DNS resolver (known to not implement censorship), it’s possible that censorship is implemented at the DNS level.

A more detailed description of how OONI’s Web Connectivity test works is available here.

DNS over HTTPS

A way to perform DNS lookups using HTTPS.

DNS over TLS

A way to perform DNS lookups using TLS.

DNS over UDP

The standard way to perform DNS lookups over the internet. The client sends a one-off UDP packet to the server containing a query and awaits up until a given timeout to receive the response to the query.

DNS query

A DNS query (otherwise known as a “DNS request”) is a request for information sent from a user’s computer to a DNS server.

In most cases, a DNS request is sent to ask for the IP address associated with a domain name (such as ooni.org).

DNS resolver

A DNS resolver is a server which maps domain names to IP addresses, operating like an “address book”.

A DNS resolver manages DNS requests (for all the clients on its network) and is responsible for transforming host (/domain) names (such as ooni.org) into IP addresses (such as 104.198.14.52).

Internet Service Providers (ISPs), amongst other service providers (such as Google), run DNS resolvers that can be queried to receive the IP address of a given website.

DNS spoofing

DNS spoofing (also referred to as “DNS injection”) occurs when DNS queries are intercepted and spoofed (faked) DNS answers are injected in response.

This does not involve DNS misconfiguration, nor is it similar to DNS hijacking where DNS resolvers reply with a forged response.

DNS spoofing is a more sophisticated technique that imitates the legitimate response of the queried DNS server, yet providing fake data.

When Internet Service Providers (ISPs) receive government orders to block specific websites, they sometimes adopt this technique, intercepting DNS traffic and replying with a spoofed response for the banned sites (preventing access).

DNS tampering

DNS tampering is an umbrella term used to describe various forms of DNS interference, including DNS hijacking and DNS spoofing.

Internet services (such as websites and apps) are hosted on IP addresses, which are digital addresses on the internet. To visit a website, you need its IP address.

To obtain the IP address of a website, your computer needs to query a DNS resolver for it (since it manages a database of IP addresses that correspond to domains).

DNS tampering occurs when, upon performing a DNS Lookup for a website, a wrong IP address is being returned, preventing you from visiting the requested website.

DNS tampering can happen in various ways, including:

DNS tampering is a common censorship technique adopted by Internet Service Providers (ISPs) around the world.

The OONI Probe apps measure the DNS tampering of websites and apps.

Domain fronting

Domain fronting (also sometimes known as “cloud fronting”) is a censorship circumvention technique which relies on using a popular domain name hosted on a big cloud service provider to “front” traffic towards a circumvention service hosted on the same cloud service.

For example, this could involve setting up a service on the Google Cloud under the domain circumvention-service.google-cloud.com, but fronting it via google.com. This means that from the perspective of someone observing network traffic, all that they can see is an encrypted TLS connection towards google.com. Yet, inside of this encrypted connection, the client says “actually I want to access circumvention-service.google-cloud.com”, circumventing any potential block.

As a result, the censor would either have to block all of Google Cloud (and therefore disrupt other services too) or they would have a hard time distinguishing requests towards circumvention-service.google-cloud.com from requests to google.com. This concept is called “collateral freedom”, as it relies on censors not causing collateral damage by blocking access to big services (such as Google Cloud) that many other services rely on.

Domain name

A domain is a name that is commonly attributed to websites (when they’re created), so that they can be more easily accessed and remembered.

For example, www.wikipedia.org is the domain of the Wikipedia website.

DPI

Deep packet inspection (DPI) is a method of examining and managing network traffic. This technology is used for a detailed inspection of data being sent over a computer network.

As DPI enables advanced network management, it is commonly used by corporations and Internet Service Providers (ISPs).

However, DPI technology can also be used for implementing internet censorship (blocking of specific websites or apps) and online surveillance.

Endpoint

Combination of an IP address, a port and a protocol name that uniquely identifies a client or server on the internet. For example, the 1.1.1.1 address on port 443 using the TCP protocol identifies an endpoint used by Cloudflare DNS over HTTPS services.

It is common to represent endpoints using a compact notation like: 1.1.1.1:443/tcp, where : separates the address and the port and / separates the port and the protocol.

False positive

A false positive is a test result that wrongly indicates that a particular condition or attribute is present.

Within the OONI context, false positives are OONI Probe test results (flagged as “anomalous”) which incorrectly indicate the presence of network interference (such as the blocking of a website or app).

OONI Probe test results, collected from the network of the user, are automatically compared with test results collected from a non-censored network. If the results don’t match, then the OONI Probe test result in question is flagged as an “anomaly”, indicating potential network interference. Many of these anomalies are in fact cases of network interference, while some are false positives.

False positives can occur due a number of reasons (partly due to limitations to OONI methodologies, and partly due to the very nature of how the internet works), such as the following:

HTTP

The Hypertext Transfer Protocol (HTTP) is the underlying protocol used by the World Wide Web to transfer or exchange data across the internet.

The HTTP protocol allows communication between a client and a server. It does so by handling a client’s request to connect to a server, and the server’s response to the client’s request.

All websites include an HTTP (or HTTPS) prefix (such as http://example.com/) so that your computer (the client) can request and receive the content of a website (hosted on a server).

The transmission of data over the HTTP protocol is unencrypted.

HTTPS

The Hypertext Transfer Protocol Secure (HTTPS) – also known as HTTP over TLS, or HTTP over SSL – is the HTTP protocol over an encrypted channel.

Over the last years, most major websites on the internet started supporting HTTPS (such as https://www.facebook.com/) so that the transmission of data (such as passwords to login to websites) over the HTTP protocol is encrypted.

HTTP blocking

HTTP blocking is an umbrella term used to describe various forms of HTTP interference with the intention of preventing clients from retrieving information from specific servers.

To access a website on the internet, an HTTP request is sent to the server hosting the website you’re trying to reach. If the request was successful, the server will reply with the contents of the website, allowing access.

When Internet Service Providers (ISPs) receive government orders to block specific websites, HTTP blocking is a common censorship technique that they may adopt. There are many ways that they can implement censorship on the HTTP protocol, such as the following:

The OONI Probe Web Connectivity test checks the above scenarios when measuring websites for HTTP blocking (and other forms of internet censorship).

HTTPS collectors

An HTTPS collector is a server that collects data over the encrypted HTTPS protocol.

OONI utilizes HTTPS collectors in order to collect network measurements from OONI Probe users around the world.

HTTP header

HTTP headers are used to transmit metadata about the HTTP request or response to the server or the client.

Certain HTTP headers are standardised for transmitting common bits of information, such as the User-Agent header field, which is used to tell the server which browser is performing the request.

Every time you connect to a server, you (the client) send a request through the HTTP protocol to that server. Such requests include HTTP headers, which request certain types of information based on various types of information fields (“HTTP header fields”). These fields include the “Host header”, which includes information about the specific domain you want to access. For example, when you connect to ooni.org, the ‘host’ header of your HTTP request includes information which communicates that you want to access that domain.

When measuring the blocking of websites, the OONI Probe Web Connectivity test compares the HTTP headers of the tested website from the network of the user with a non-censored network (as part of a larger testing methodology).

HTTP request

Every time you visit a website, your browser (the client) sends a request (“HTTP request”) through the HTTP protocol to the server that is hosting the website. A server normally replies with a “HTTP response” which includes the content of the website it is hosting.

In some cases though, Internet Service Providers (ISP) prevent users from accessing certain websites by blocking or interfering with the connection between them and the server. This is a form of HTTP blocking, measured by the OONI Probe app.

HTTP response

Every time you visit a website, your browser (the client) sends a request ("HTTP request”) through the HTTP protocol to the server that is hosting the website.

In response to an HTTP request, a server will send an HTTP response, which includes HTTP response headers and optionally a response body, which in the case of a website will be the content of the page.

HTTP status codes

HTTP status codes are standardized codes (maintained by the Internet Assigned Numbers Authority or IANA) that are issued by a server in response to a client’s request. As suggested by their name, these codes communicate the status of an HTTP response.

HTTP status codes are divided into specific ranges, depending on the type of status they are communicating:

Common HTTP status codes include:

When measuring the blocking of websites, the OONI Probe Web Connectivity test compares the HTTP status codes of the tested website from the network of the user with a non-censored network (as part of a larger testing methodology).

HTTP transparent proxy

An HTTP transparent proxy is a type of middlebox, an intermediary system that sits between a client and a server and performs actions over the HTTP protocol.

When a user makes a request to a server (for example, to access wikipedia.org), the transparent proxy intercepts the request to perform various actions (such as caching, redirection, and authentication).

Many Internet Service Providers (ISPs) around the world use HTTP transparent proxies for a number of purposes; for example, to improve network performance or to provide users with faster access to websites.

Sometimes though, HTTP transparent proxies are also used to implement internet censorship and/or surveillance.

The OONI Probe app includes two tests designed to measure networks with the aim of identifying the presence of HTTP transparent proxies.

Instant Messaging

Instant messaging (IM) technology is a type of online chat which offers real-time text transmission over the internet.

WhatsApp, Facebook Messenger, and Telegram are examples of IM apps, all of which are measured for censorship by the OONI Probe app.

Internet

The internet is a decentralized, international network of networks.

Devices, such as computers, connect to each other and form a network. Each network is connected to other networks, which are connected to each other through electronic, wireless and optical networking technologies.

Multiple interconnected networks form the internet.

Internet blackout

An internet blackout (also referred to as “internet outage” or “internet shutdown”) occurs when the internet is completely turned-off in a country or region. The area or network affected by the internet blackout has no internet access at all.

An internet blackout may be intentional (ordered by a government) – in which case, it constitutes a form of internet censorship – or it may have been caused unintentionally (for example, due to disruption of cables).

Since OONI Probe requires internet connectivity in order to perform tests, measuring internet blackouts is currently out of scope.

Several public data sources are available for monitoring internet blackouts, such as IODA.

Internet censorship

Internet censorship is the intentional control or suppression of what can be accessed, published, or viewed on the internet.

Internet Service Providers (ISPs) usually implement internet censorship based on government orders and/or in compliance with national legislation. This involves blocking access to specific websites and/or applications, preventing users of that specific network from accessing specific internet services.

As internet censorship is implemented on the network level, it may differ from network to network, and from country to country.

IP address

An Internet Protocol (IP) address is a unique numerical address that identifies a device or service on the internet.

An IP address serves 2 main functions:

  1. Identification: An IP address distinguishes a system from all other systems on the internet.

  2. Location: An IP address serves as a digital address for a system, enabling other systems on the internet to reach it.

To connect to the internet, every device is assigned an IP address.

ISP

An Internet Service Provider (ISP) is an organization that provides services for accessing and using the internet.

ISPs can be state-owned, commercial, community-owned, non-profit, or otherwise privately owned.

Vodafone, AT&T, Airtel, and MTN are examples of ISPs.

Measurement

A network measurement is the process of measuring certain attributes of a network.

Within the OONI context, a measurement is the result of an OONI Probe test.

Each OONI Probe test is designed to measure different forms of network interference. Depending on the test, each OONI measurement contains a different result.

Here is an example of an OONI measurement: https://explorer.ooni.org/measurement/20191024T090549Z_AS42668_D8RVKYKWbqzaTopEcH3K6qy8yzOHVe1QgNeyzn686G1CbEveKU?input=http://kavkaznews.com/

Metadata

Metadata is often described as “data about data” and is used to provide context and description of the data.

Examples of metadata for a document may include its author and the date of publication.

Middlebox

A middlebox is a computer networking device that transforms, inspects, filters, or otherwise manipulates traffic for purposes other than packet forwarding.

Many Internet Service Providers (ISPs) around the world use middleboxes to improve network performance, provide users with faster access to websites, and for a number of other networking purposes.

Sometimes though, middleboxes are also used to implement internet censorship and/or surveillance.

The OONI Probe app includes two tests designed to measure networks with the aim of identifying the presence of middleboxes.

Mirror website

A mirror website is a replica of another website. Such websites have different URLs, but identical or near-identical content.

Mirror websites are often set up in an attempt to circumvent internet censorship. When ISPs block access to a website, they block access to its URL. By changing the domain name, these website owners can enable the public to access the content of their site.

Nettest

Nettest is an abbreviation for “network test”.

Within the OONI context, nettests refer to OONI Probe network measurement tests.

Descriptions for OONI Probe nettests are available here: https://ooni.org/nettest/

Network

Devices, such as computers, connect to each other and form a network to exchange data.

Each network is connected to other networks, which are connected to each other through electronic, wireless and optical networking technologies. The internet is formed by multiple interconnected networks.

Network anomaly

A network anomaly is network behavior that deviates from what is standard, normal, or expected.

Within the OONI context, network anomalies are testing results which deviate from what is expected based on the methodologies of OONI Probe tests.

OONI Probe test results, collected from the network of the user, are automatically compared with test results collected from a non-censored network. If the results don’t match, then the OONI Probe test result in question is flagged as an “anomaly”, indicating potential network interference.

Network interference

Network interference is an umbrella term used to describe various forms of interference that occur on networks on the internet.

Within the OONI context, the term network interference is primarily used to refer to cases of internet censorship and traffic manipulation.

Onion services

Onion services (previously known as “Tor hidden services”) are internet services that can only be accessed over the Tor network, providing their users with all the security of HTTPS with the added privacy benefits of Tor Browser.

Websites, for example, can be placed in an anonymous network location through the use of onion services, which allow them to hide their IP address and provide more privacy to their visitors. You can distinguish such websites through their .onion addresses, such as https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion/ or https://www.nytimesn7cgmftshazwhfgzm37qxb44r64ytbb2dj3x62d2lljsciiyd.onion.

OONI bouncer

The OONI bouncer is the service that is responsible for informing OONI Probe clients:

OONI collector

The OONI collector is the service that is used for collecting measurements from OONI Probe clients around the world.

OONI Explorer

OONI Explorer is a web interface which provides a location to explore, search, and download all network measurements collected through OONI Probe tests from 2012 until today.

OONI nettest helpers

The OONI nettest helpers implement server-side protocols that are of assistance to OONI Probe clients running tests. For example, OONI Probe clients speak to a test helper to learn what the expected content of a website is in order to do the control comparison and determine if that website is blocked.

OONI Probe

OONI Probe is free and open source software designed to measure internet censorship and other forms of network interference.

OONI Probe has been developed by the Open Observatory of Network Interference since 2012 and is available on Android, iOS, Linux, Windows and macOS.

OONI Run

OONI Run is a web interface that enables OONI Probe mobile app users to generate links for customized OONI Probe testing.

This tool serves to coordinate censorship measurement with other OONI Probe users in a country or around the world.

OONI Run links can be generated by adding URLs of the user’s choice. The goal is to share this generated OONI Run link with other OONI Probe mobile app users, so that they can test the sites that were chosen when the link was generated.

The OONI Run platform can also be used to generate widget code to embed an OONI button (for customized OONI Probe testing) on a website.

Performance

Network performance is a measure to define the quality of a network connection. This can be measured in several ways (e.g. speed, bandwidth, latency, error rate).

Protocol

Protocols are a set of rules or procedures for transmitting data between electronic devices (such as computers) on the internet. These rules determine how information will be structured and how it will be sent and received over the internet.

The internet consists of various types of protocols, such as the Internet Protocol (IP) which is used to direct data packets to a specific computer or server.

Proxy

A proxy is a server that acts as an intermediary service through which you can channel some or all of your internet communication. Proxies can therefore be used to bypass internet censorship.

Raspberry Pi

Raspberry Pi is the name of a series of single-board computers made by the Raspberry Pi Foundation, a UK charity that aims to educate people in computing and create easier access to computing education.

OONI previously created an OONI Probe distribution for Raspberry Pis, called Lepidopter.

Server

A server is a computer that remains on and connected to the internet in order to provide internet services to other computers.

All internet services (such as websites, apps, and emails) are hosted on servers, which are responsible for receiving requests from other computers and responding to those requests (for example, by providing access to the websites they’re hosting).

TCP

The Transmission Control Protocol (TCP) is one of the main protocols on the internet.

To connect to a website, your computer needs to establish a TCP connection to the address of that website.

TCP works on top of the Internet Protocol (IP), which defines how to address computers on the internet.

When speaking to a machine over the TCP protocol you use an IP and port pair, also called endpoint, which looks something like this: 10.20.1.1:8080.

The main difference between TCP and (another very popular protocol called) UDP is that TCP has the notion of a “connection”, making it a “reliable” transport protocol.

TCP/IP blocking

TCP/IP blocking is a form of internet censorship that is implemented by preventing a client from establishing a TCP connection to an internet service.

This is achieved by either preventing the target IP from being reachable or actively resetting (i.e. injecting TCP RST packets) the connection to the IP:Port pair.

OONI Probe measures the TCP/IP blocking of websites and apps.

Test input

Test input (in the context of OONI Probe) is an internet resource (such as a URL, domain, or IP address) that is the target of a measurement.

Test list

A test list is a machine-readable CSV file that includes URLs that are tested for censorship by tools like OONI Probe.

Censorship measurement projects like OONI rely on a global community of volunteers who run censorship detection tests from local vantage points. In light of bandwidth constraints, testing most websites available on the internet is not practical (nor possible in many cases). Instead, our measurements focus on a sample of websites provided in “test lists”: machine-readable CSV files with a set of curated, interesting URLs.

There are two types of test lists:

Test lists are hosted and managed by the Citizen Lab.

TLS

Transport Layer Security (TLS) – also referred to as “SSL” – is a cryptographic protocol that allows you to maintain a secure, encrypted connection between your computer and an internet service.

When you connect to a website though TLS, the address of the website will begin with HTTPS (such as https://archive.org/), instead of HTTP.

Tor

The Tor network, which is free and open source, provides its users with online anonymity, privacy, and censorship circumvention. Tor software is designed to bounce communications around a distributed network of relays run by volunteers around the world, thereby hiding its users’ IP addresses and enabling them to circumvent online tracking and internet censorship.

Traffic manipulation

Traffic manipulation (a form of network interference) describes adversarial access to a network connection with capabilities to modify the data stream.

A middlebox (a computer networking device), for example, can be used by an Internet Service Provider (ISP) to inspect, transform, filter, or otherwise manipulate internet traffic.

UDP

The User Datagram Protocol (UDP) is one of the main protocols on the internet.

Unlike TCP, which has the the notion of a “connection” and is reliable, UDP allows one to send one-off packets over the internet.

URL

A URL is the address of a World Wide Web page.

For example, https://archive.org/ is a URL, while archive.org is a domain.

Vantage point

A network vantage point is a unique network location from which internet measurements are performed. In the context of OONI Probe, we consider a vantage point to be a unique network and country pair, such as the vantage point of “Vodafone in Italy”.

VPN

A Virtual Private Network (VPN) is software that creates an encrypted connection (commonly called “tunnel”) from your device to a server (run by a VPN provider).

When you browse the internet through this “tunnel”, websites and other online services will receive requests from the IP address of that server, rather than from your actual IP address.

VPNs can therefore be used to circumvent internet censorship.


Special thanks to Anatol (OONI community member) for contributing to this glossary.