voidly

Block-evasion success-rate index: which circumvention tools actually reach their bootstrap endpoint, per country

Activists and journalists routinely ask which circumvention tool actually works in a given country. The honest historical answer has been "try a few and see what survives." The Voidly evidence table records every measured block of a known bootstrap endpoint with probe counts embedded in the upstream_claim text ("11/11 probes anomalous for psiphon.ca"). We aggregate those rows into a per-country per-tool success rate over the last 30 days. Tools covered: Tor (rolled-up OONI tor test), Lantern, Psiphon, Snowflake, ProtonVPN, ExpressVPN, Mullvad, VPN Gate, plus a generic-VPN aggregate. First run: 17,144 candidate evidence rows, 131 (country, tool) pairs across 34 countries. Best-working combos are all Tor in countries with aggressive but non-GFW-grade filtering: Venezuela (96.7% n=153), Indonesia (96.4% n=584), Turkey (96.2% n=1,223), Malaysia (96.1% n=77), Iraq (94.3% n=176). Worst countries (even best tool fails): Azerbaijan (best=ProtonVPN at 0% over 70 probes), Pakistan (best=Tor at 0.3% over 1,495 probes — every commercial-VPN domain is near 100% blocked), Egypt, Belarus. Honest caveats inline in every API response: probe coverage uneven, "probe success" != "real user success" (DPI passes synthetic measurement traffic), domain-fronted tools (Snowflake, Lantern, Psiphon) are systematically under-estimated by static-domain probes, self-hosted WireGuard / OpenVPN on a private IP is invisible to OONI and cannot be measured. Tor rows aggregate every transport (vanilla / obfs4 / Snowflake / Meek); per-transport breakdown is out of scope for v1. Live at GET /v1/atlas/evasion/{cc} + GET /v1/atlas/evasion/leaderboard + GET /v1/atlas/evasion/info. Cron daily 06:00 UTC.

#evasion#tor#vpn#circumvention#evidence-based#transparency#ml-honesty#investigative

Raw data