• About TC
  • Affiliate Disclaimer
  • Privacy Policy
  • TOS
  • Contact
Monday, July 7, 2025
Techcratic
  • TC
  • AI
    Artificial Intelligence

    Transforming network operations with AI: How Swisscom built a network assistant using Amazon Bedrock

    Artificial Intelligence

    EgoDex: Learning Dexterous Manipulation from Large-Scale Egocentric Video

    Artificial Intelligence

    Instruction-Following Pruning for Large Language Models

    Artificial Intelligence

    How to Combine Streamlit, Pandas, and Plotly for Interactive Data Apps

    Artificial Intelligence

    Tailor responsible AI with new safeguard tiers in Amazon Bedrock Guardrails

    Artificial Intelligence

    Automate Data Quality Reports with n8n: From CSV to Professional Analysis

    Artificial Intelligence

    NewDay builds A Generative AI based Customer service Agent Assist with over 90% accuracy

    Artificial Intelligence

    5 Things You Need to Know About Agentic AI

    Artificial Intelligence

    Normalizing Flows are Capable Generative Models

  • App Zone

    Top 3 Dev Tool Apps of 2025: Features, Pros, and Cons

    Top 3 Launcher Apps for Apple: Features, Pros, and Cons

    Top 3 Launcher Apps for Apple: Features, Pros, and Cons

    Top 3 Launcher Apps for Android: Features, Pros, and Cons

    Top 3 Launcher Apps for Android: Features, Pros, and Cons

    Top 3 Card Game Apps of 2025: Features, Pros, and Cons

    Top 3 Card Game Apps of 2025: Features, Pros, and Cons

    Top 3 Medical Apps of 2025: Features, Pros, and Cons

    Top 3 Medical Apps of 2025: Features, Pros, and Cons

    Top 3 Travel Apps of 2025: Features, Pros, and Cons

    Top 3 Travel Apps of 2025: Features, Pros, and Cons

    Top 3 Casual Game Apps for 2025: Features, Pros, and Cons

    Top 3 Casual Game Apps for 2025: Features, Pros, and Cons

    Top 3 Food Apps for 2025: Features, Pros, and Cons

    Top 3 Food Apps for 2025: Features, Pros, and Cons

    Top 3 Sport Apps for 2025: Features, Pros, and Cons

    Top 3 Sport Apps for 2025: Features, Pros, and Cons

  • Apple
    Here’s how iPhone 17 Pro will differentiate itself from previous iPhone models

    New iPhone 17 Pro renders highlight aluminum design, repositioned Apple logo

    Yes, you can run Windows 11 on your Mac — and it’s only $15

    Run Windows apps on your Mac with Windows 11 Pro — now just $9.97

    How to stop LG & Samsung smart TV tracking, screen captures

    How to stop LG & Samsung smart TV tracking, screen captures

    Apple’s F1 expected to hit $300M at the box office this weekend

    Apple’s F1 expected to hit $300M at the box office this weekend

    Apple is reportedly working on a cheaper MacBook, but will it stick the landing?

    Apple is reportedly working on a cheaper MacBook, but will it stick the landing?

    Apple @ Work: Macs have never been more expensive to repair, but never been more reliable

    Apple @ Work: Macs have never been more expensive to repair, but never been more reliable

    New Gemini icon comes to Android and iPhone

    New Gemini icon comes to Android and iPhone

    Best Mac SSD and hard drive Prime Day deals 2025: Early discounts

    Best Mac SSD and hard drive Prime Day deals 2025: Early discounts

    This is the letter Donald Trump sent Apple to keep TikTok online

    This is the letter Donald Trump sent Apple to keep TikTok online

  • Retro Rewind
    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

  • Tech Deals
    ORICO 2TB NVMe SSD PCIe 4.0 – Up to 7000MB/s, M.2 2280 Internal Solid State Drive, Fast…

    ORICO 2TB NVMe SSD PCIe 4.0 – Up to 7000MB/s, M.2 2280 Internal Solid State Drive, Fast…

    StarTech.com 2.5″ to 3.5″ SATA HDD/SSD Adapter Enclosure – External Hard Drive Converter…

    StarTech.com 2.5″ to 3.5″ SATA HDD/SSD Adapter Enclosure – External Hard Drive Converter…

    Logitech G Pro X Wired Gaming Headset: Blue VO!CE Detachable Boom Mic, DTS 7.1, 50 mm…

    Logitech G Pro X Wired Gaming Headset: Blue VO!CE Detachable Boom Mic, DTS 7.1, 50 mm…

    Lenovo ThinkPad E16 G2 16″ FHD+ Business Laptop Computer, Intel 16-Core Ultra 7 155H…

    Lenovo ThinkPad E16 G2 16″ FHD+ Business Laptop Computer, Intel 16-Core Ultra 7 155H…

    HP Printer Paper | 8.5 x 11 Paper | Office 20 lb | 3 Ream Case – 1500 Sheets | 92 Bright…

    HP Printer Paper | 8.5 x 11 Paper | Office 20 lb | 3 Ream Case – 1500 Sheets | 92 Bright…

    JUANWE 32GB Micro SD Cards 10 Pack Memory Card, SDHC High-Speed U1 A1 SD Card, 32GB TF…

    JUANWE 32GB Micro SD Cards 10 Pack Memory Card, SDHC High-Speed U1 A1 SD Card, 32GB TF…

    EVGA GeForce GTX 1650 Super SC Ultra Gaming, 4GB GDDR6, Dual Fan, Metal Backplate,…

    EVGA GeForce GTX 1650 Super SC Ultra Gaming, 4GB GDDR6, Dual Fan, Metal Backplate,…

    CableCreation 6 Feet TRRS Headhpone Extension Cable Bundle with 1.5 Feet TRRS…

    CableCreation 6 Feet TRRS Headhpone Extension Cable Bundle with 1.5 Feet TRRS…

    ASRock Chanllenger AMD RX 6600 8G GDDR6 Graphics Card and Bronze 80+ 550W Power Supply

    ASRock Chanllenger AMD RX 6600 8G GDDR6 Graphics Card and Bronze 80+ 550W Power Supply

  • Tech Eats
    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

    Tiramisu Mug Cake: Coffee Lover’s Dream in 2 Minutes!

    Tiramisu Mug Cake: Coffee Lover’s Dream in 2 Minutes!

  • Tesla
    Vacuum Magnetic Suction Phone Holder, Foldable and Retractable Hands-Free Suction Cup…

    Vacuum Magnetic Suction Phone Holder, Foldable and Retractable Hands-Free Suction Cup…

    Tesla Phone Mount, [Strong Magnets & Super Stable ] Tesla Phone Holder Model 3/Y…

    Tesla Phone Mount, [Strong Magnets & Super Stable ] Tesla Phone Holder Model 3/Y…

    REEVAA 2025 Upgrade USB Charger Hub for Tesla Model 3 [GaN Tech, Ultra Safe], Center…

    REEVAA 2025 Upgrade USB Charger Hub for Tesla Model 3 [GaN Tech, Ultra Safe], Center…

    REEVAA 2025 Upgrade Tesla Model 3 Sunshade Roof [No Gaps, No-Sagging] Tesla 3…

    REEVAA 2025 Upgrade Tesla Model 3 Sunshade Roof [No Gaps, No-Sagging] Tesla 3…

    1PC Rear Bed Cooler Storage Box Compatible with Tesla Cybertruck 2024 Oxford Waterproof…

    1PC Rear Bed Cooler Storage Box Compatible with Tesla Cybertruck 2024 Oxford Waterproof…

    Seat Back Hooks for Tesla Model 3, Model Y, Model S & Model X 2021-2025 – Bag Purse Back…

    Seat Back Hooks for Tesla Model 3, Model Y, Model S & Model X 2021-2025 – Bag Purse Back…

    Tesla Supercharger to CCS1 Charger Adapter, Max 500A 1000V NACS to CCS EV Fast Charge…

    Tesla Supercharger to CCS1 Charger Adapter, Max 500A 1000V NACS to CCS EV Fast Charge…

    BestEvMod for Refreshed Model 3 Highland Cargo Liner Floor Liners Trunk and Frunk Mat…

    BestEvMod for Refreshed Model 3 Highland Cargo Liner Floor Liners Trunk and Frunk Mat…

    4 PCS Car Front and Rear Side Window Sunshade, 19.6″ x 31.4″ x 7.8″ + 19.6″ x 31.4″ Keep…

    4 PCS Car Front and Rear Side Window Sunshade, 19.6″ x 31.4″ x 7.8″ + 19.6″ x 31.4″ Keep…

  • UFO
    Idea Vest Birthday Decorations – Sign HERE Birthday Vest Gifts – Funny Party Decoration for Family, Friend

    Idea Vest Birthday Decorations – Sign HERE Birthday Vest Gifts – Funny Party Decoration for Family, Friend

    The Indigestible Truth About The UFO Phenomenon with Former CIA Officer Jim Semivan [Clip]

    The Indigestible Truth About The UFO Phenomenon with Former CIA Officer Jim Semivan [Clip]

    Drone with Camera, 2K HD FPV Drone with Brushless Motor, Altitude Hold, Gesture Selfie, 3D Flips, Waypoint Fly, One Key Take Off/Landing, Foldable Mini Drones for Adults and Beginners

    Drone with Camera, 2K HD FPV Drone with Brushless Motor, Altitude Hold, Gesture Selfie, 3D Flips, Waypoint Fly, One Key Take Off/Landing, Foldable Mini Drones for Adults and Beginners

    Top 6 Real UFO Sightings That Still Have No Explanation | Most Mysterious Cases Ever Documented

    Top 6 Real UFO Sightings That Still Have No Explanation | Most Mysterious Cases Ever Documented

    MR.GREEN Tweezers For Women Facial Hair, Professional Precision Eyebrow Tweezers for Women and Men, Stainless Steel Slanted Cute Hair Removal Plucker

    MR.GREEN Tweezers For Women Facial Hair, Professional Precision Eyebrow Tweezers for Women and Men, Stainless Steel Slanted Cute Hair Removal Plucker

    TOP 4 ALIEN ARTIFACTS UNEARTHED | Ancient Aliens | The UnXplained Zone

    TOP 4 ALIEN ARTIFACTS UNEARTHED | Ancient Aliens | The UnXplained Zone

    Mutant Aliens

    Mutant Aliens

    Ancient Carvings Point to Strange Information (Season 1) | Ancient Aliens: Origins

    Ancient Carvings Point to Strange Information (Season 1) | Ancient Aliens: Origins

    ERIN MONTGOMERY –  Dirty Little Secret: Confessions of an Alien Contactee

    ERIN MONTGOMERY – Dirty Little Secret: Confessions of an Alien Contactee

No Result
View All Result
  • TC
  • AI
    Artificial Intelligence

    Transforming network operations with AI: How Swisscom built a network assistant using Amazon Bedrock

    Artificial Intelligence

    EgoDex: Learning Dexterous Manipulation from Large-Scale Egocentric Video

    Artificial Intelligence

    Instruction-Following Pruning for Large Language Models

    Artificial Intelligence

    How to Combine Streamlit, Pandas, and Plotly for Interactive Data Apps

    Artificial Intelligence

    Tailor responsible AI with new safeguard tiers in Amazon Bedrock Guardrails

    Artificial Intelligence

    Automate Data Quality Reports with n8n: From CSV to Professional Analysis

    Artificial Intelligence

    NewDay builds A Generative AI based Customer service Agent Assist with over 90% accuracy

    Artificial Intelligence

    5 Things You Need to Know About Agentic AI

    Artificial Intelligence

    Normalizing Flows are Capable Generative Models

  • App Zone

    Top 3 Dev Tool Apps of 2025: Features, Pros, and Cons

    Top 3 Launcher Apps for Apple: Features, Pros, and Cons

    Top 3 Launcher Apps for Apple: Features, Pros, and Cons

    Top 3 Launcher Apps for Android: Features, Pros, and Cons

    Top 3 Launcher Apps for Android: Features, Pros, and Cons

    Top 3 Card Game Apps of 2025: Features, Pros, and Cons

    Top 3 Card Game Apps of 2025: Features, Pros, and Cons

    Top 3 Medical Apps of 2025: Features, Pros, and Cons

    Top 3 Medical Apps of 2025: Features, Pros, and Cons

    Top 3 Travel Apps of 2025: Features, Pros, and Cons

    Top 3 Travel Apps of 2025: Features, Pros, and Cons

    Top 3 Casual Game Apps for 2025: Features, Pros, and Cons

    Top 3 Casual Game Apps for 2025: Features, Pros, and Cons

    Top 3 Food Apps for 2025: Features, Pros, and Cons

    Top 3 Food Apps for 2025: Features, Pros, and Cons

    Top 3 Sport Apps for 2025: Features, Pros, and Cons

    Top 3 Sport Apps for 2025: Features, Pros, and Cons

  • Apple
    Here’s how iPhone 17 Pro will differentiate itself from previous iPhone models

    New iPhone 17 Pro renders highlight aluminum design, repositioned Apple logo

    Yes, you can run Windows 11 on your Mac — and it’s only $15

    Run Windows apps on your Mac with Windows 11 Pro — now just $9.97

    How to stop LG & Samsung smart TV tracking, screen captures

    How to stop LG & Samsung smart TV tracking, screen captures

    Apple’s F1 expected to hit $300M at the box office this weekend

    Apple’s F1 expected to hit $300M at the box office this weekend

    Apple is reportedly working on a cheaper MacBook, but will it stick the landing?

    Apple is reportedly working on a cheaper MacBook, but will it stick the landing?

    Apple @ Work: Macs have never been more expensive to repair, but never been more reliable

    Apple @ Work: Macs have never been more expensive to repair, but never been more reliable

    New Gemini icon comes to Android and iPhone

    New Gemini icon comes to Android and iPhone

    Best Mac SSD and hard drive Prime Day deals 2025: Early discounts

    Best Mac SSD and hard drive Prime Day deals 2025: Early discounts

    This is the letter Donald Trump sent Apple to keep TikTok online

    This is the letter Donald Trump sent Apple to keep TikTok online

  • Retro Rewind
    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

    Retro Rewind: Computer Gaming World Magazine Issue 73 December 1998

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

  • Tech Deals
    ORICO 2TB NVMe SSD PCIe 4.0 – Up to 7000MB/s, M.2 2280 Internal Solid State Drive, Fast…

    ORICO 2TB NVMe SSD PCIe 4.0 – Up to 7000MB/s, M.2 2280 Internal Solid State Drive, Fast…

    StarTech.com 2.5″ to 3.5″ SATA HDD/SSD Adapter Enclosure – External Hard Drive Converter…

    StarTech.com 2.5″ to 3.5″ SATA HDD/SSD Adapter Enclosure – External Hard Drive Converter…

    Logitech G Pro X Wired Gaming Headset: Blue VO!CE Detachable Boom Mic, DTS 7.1, 50 mm…

    Logitech G Pro X Wired Gaming Headset: Blue VO!CE Detachable Boom Mic, DTS 7.1, 50 mm…

    Lenovo ThinkPad E16 G2 16″ FHD+ Business Laptop Computer, Intel 16-Core Ultra 7 155H…

    Lenovo ThinkPad E16 G2 16″ FHD+ Business Laptop Computer, Intel 16-Core Ultra 7 155H…

    HP Printer Paper | 8.5 x 11 Paper | Office 20 lb | 3 Ream Case – 1500 Sheets | 92 Bright…

    HP Printer Paper | 8.5 x 11 Paper | Office 20 lb | 3 Ream Case – 1500 Sheets | 92 Bright…

    JUANWE 32GB Micro SD Cards 10 Pack Memory Card, SDHC High-Speed U1 A1 SD Card, 32GB TF…

    JUANWE 32GB Micro SD Cards 10 Pack Memory Card, SDHC High-Speed U1 A1 SD Card, 32GB TF…

    EVGA GeForce GTX 1650 Super SC Ultra Gaming, 4GB GDDR6, Dual Fan, Metal Backplate,…

    EVGA GeForce GTX 1650 Super SC Ultra Gaming, 4GB GDDR6, Dual Fan, Metal Backplate,…

    CableCreation 6 Feet TRRS Headhpone Extension Cable Bundle with 1.5 Feet TRRS…

    CableCreation 6 Feet TRRS Headhpone Extension Cable Bundle with 1.5 Feet TRRS…

    ASRock Chanllenger AMD RX 6600 8G GDDR6 Graphics Card and Bronze 80+ 550W Power Supply

    ASRock Chanllenger AMD RX 6600 8G GDDR6 Graphics Card and Bronze 80+ 550W Power Supply

  • Tech Eats
    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

    Oreo Mug Cake: 2-Minute Cookie & Cake Combo!

    Tiramisu Mug Cake: Coffee Lover’s Dream in 2 Minutes!

    Tiramisu Mug Cake: Coffee Lover’s Dream in 2 Minutes!

  • Tesla
    Vacuum Magnetic Suction Phone Holder, Foldable and Retractable Hands-Free Suction Cup…

    Vacuum Magnetic Suction Phone Holder, Foldable and Retractable Hands-Free Suction Cup…

    Tesla Phone Mount, [Strong Magnets & Super Stable ] Tesla Phone Holder Model 3/Y…

    Tesla Phone Mount, [Strong Magnets & Super Stable ] Tesla Phone Holder Model 3/Y…

    REEVAA 2025 Upgrade USB Charger Hub for Tesla Model 3 [GaN Tech, Ultra Safe], Center…

    REEVAA 2025 Upgrade USB Charger Hub for Tesla Model 3 [GaN Tech, Ultra Safe], Center…

    REEVAA 2025 Upgrade Tesla Model 3 Sunshade Roof [No Gaps, No-Sagging] Tesla 3…

    REEVAA 2025 Upgrade Tesla Model 3 Sunshade Roof [No Gaps, No-Sagging] Tesla 3…

    1PC Rear Bed Cooler Storage Box Compatible with Tesla Cybertruck 2024 Oxford Waterproof…

    1PC Rear Bed Cooler Storage Box Compatible with Tesla Cybertruck 2024 Oxford Waterproof…

    Seat Back Hooks for Tesla Model 3, Model Y, Model S & Model X 2021-2025 – Bag Purse Back…

    Seat Back Hooks for Tesla Model 3, Model Y, Model S & Model X 2021-2025 – Bag Purse Back…

    Tesla Supercharger to CCS1 Charger Adapter, Max 500A 1000V NACS to CCS EV Fast Charge…

    Tesla Supercharger to CCS1 Charger Adapter, Max 500A 1000V NACS to CCS EV Fast Charge…

    BestEvMod for Refreshed Model 3 Highland Cargo Liner Floor Liners Trunk and Frunk Mat…

    BestEvMod for Refreshed Model 3 Highland Cargo Liner Floor Liners Trunk and Frunk Mat…

    4 PCS Car Front and Rear Side Window Sunshade, 19.6″ x 31.4″ x 7.8″ + 19.6″ x 31.4″ Keep…

    4 PCS Car Front and Rear Side Window Sunshade, 19.6″ x 31.4″ x 7.8″ + 19.6″ x 31.4″ Keep…

  • UFO
    Idea Vest Birthday Decorations – Sign HERE Birthday Vest Gifts – Funny Party Decoration for Family, Friend

    Idea Vest Birthday Decorations – Sign HERE Birthday Vest Gifts – Funny Party Decoration for Family, Friend

    The Indigestible Truth About The UFO Phenomenon with Former CIA Officer Jim Semivan [Clip]

    The Indigestible Truth About The UFO Phenomenon with Former CIA Officer Jim Semivan [Clip]

    Drone with Camera, 2K HD FPV Drone with Brushless Motor, Altitude Hold, Gesture Selfie, 3D Flips, Waypoint Fly, One Key Take Off/Landing, Foldable Mini Drones for Adults and Beginners

    Drone with Camera, 2K HD FPV Drone with Brushless Motor, Altitude Hold, Gesture Selfie, 3D Flips, Waypoint Fly, One Key Take Off/Landing, Foldable Mini Drones for Adults and Beginners

    Top 6 Real UFO Sightings That Still Have No Explanation | Most Mysterious Cases Ever Documented

    Top 6 Real UFO Sightings That Still Have No Explanation | Most Mysterious Cases Ever Documented

    MR.GREEN Tweezers For Women Facial Hair, Professional Precision Eyebrow Tweezers for Women and Men, Stainless Steel Slanted Cute Hair Removal Plucker

    MR.GREEN Tweezers For Women Facial Hair, Professional Precision Eyebrow Tweezers for Women and Men, Stainless Steel Slanted Cute Hair Removal Plucker

    TOP 4 ALIEN ARTIFACTS UNEARTHED | Ancient Aliens | The UnXplained Zone

    TOP 4 ALIEN ARTIFACTS UNEARTHED | Ancient Aliens | The UnXplained Zone

    Mutant Aliens

    Mutant Aliens

    Ancient Carvings Point to Strange Information (Season 1) | Ancient Aliens: Origins

    Ancient Carvings Point to Strange Information (Season 1) | Ancient Aliens: Origins

    ERIN MONTGOMERY –  Dirty Little Secret: Confessions of an Alien Contactee

    ERIN MONTGOMERY – Dirty Little Secret: Confessions of an Alien Contactee

No Result
View All Result
Techcratic
No Result
View All Result
Home Hacker News

Censors Ignore Unencrypted HTTP/2 Traffic

Hacker News by Hacker News
April 14, 2025
in Hacker News
Reading Time: 12 mins read
124
A A
0

2025-04-14 14:23:00
upb-syssec.github.io

Contents

*Authors in alphabetical order – all contributed equally

Abstract

Censors worldwide have long censored unencrypted HTTP traffic. In this blog post, we show that a specific HTTP version—unencrypted HTTP/2—is unaffected by censorship in China and Iran. We access otherwise censored websites in both countries over unencrypted HTTP/2. Despite no web browser implementing unencrypted HTTP/2, we detect that up to 6.28% of websites support unencrypted HTTP/2 traffic. To aid the community and ease future research, we provide a tool that evaluates the unencrypted HTTP support of a website. Finally, we discuss the limitations and potential of unencrypted HTTP/2 for censorship circumvention. We consider our finding an interesting addition to current censorship circumvention techniques.

Note: Do not send sensitive data over unencrypted HTTP/2, it can be eavesdropped!

Introduction and Background

In this section, we provide background information on HTTP and its censorship. We place special emphasis on HTTP/2 and its comparison to previous HTTP versions.

HTTP (Censorship)

HTTP can be considered the protocol for accessing websites on the Internet. While HTTP is usually used in conjunction with TLS, censorship of the plain HTTP protocol is still present and prior research analyzed the most common version HTTP/1.1  extensively . These works discovered that censors such as the ones in China and Iran use information in the Host header and request path to determine whether an HTTP request should be censored. The HTTP/1.1 GET request below shows that the requested path and domain name can be easily extracted by a censor:

To censor a request, censors inject TCP RST packets, HTTP block pages, or null-route the whole connection .

HTTP/2

As outlined above, HTTP/1.1 censorship has been widely analyzed. Nevertheless, there is a lack of research for the newer version: HTTP/2 . HTTP/2 maintains the same semantics as its predecessor: it uses the same port numbers, runs over TCP, and most importantly it conveys the request path and accessed domain name unencrypted as depicted in the exemplary HTTP/2 request below.

:method              GET
:scheme              HTTP
:host                
:path                

Despite its similarities to HTTP/1.1, HTTP/2 introduced a major change by switching from a text-based format to a binary format. While HTTP/2 is still easily censorable due to missing encryption, HTTP/2’s binary format complicates censors’ efforts as it requires different parsing mechanisms.

To facilitate the upgrade from HTTP/1.1 to HTTP/2, clients can use either of two mechanisms: connect with HTTP/2 (Prior Knowledge) or upgrade an existing HTTP/1.1 connection (Upgrade Mechanism). Below, we describe both mechanisms.

Prior Knowledge

Using prior knowledge, the client directly attempts to speak HTTP/2 with the server. As the initial step, the client establishes a TCP connection with the server. Then, the client sends the so-called connection preface, followed by a SETTINGS frame. This connection preface was specifically defined to trigger errors on HTTP servers without HTTP/2 support. The SETTINGS frame contains additional configuration parameters for the connection. After sending the connection preface and SETTINGS frame, the client sends its HTTP/2 request. If the server supports HTTP/2, it responds with its own connection preface, containing a SETTINGS frame, and answers the client’s HTTP/2 request with an HTTP/2 response.

Upgrade Mechanism

During the upgrade mechanism, the client establishes a TCP connection with the server and then sends an HTTP/1.1 request, including the Upgrade and HTTP2-Settings headers. An example HTTP/1.1 Upgrade request can look like this:

GET / HTTP/1.1
Host: server.example.com
Connection: Upgrade, HTTP2-Settings
Upgrade: h2c
HTTP2-Settings: 

If the server supports the upgrade mechanism, it responds with a 101 status code, indicating Switching Protocols, and then transitions to an HTTP/2 connection. An example of a successful server answer can look like this:

HTTP/1.1 101 Switching Protocols
Connection: Upgrade
Upgrade: h2c
[ HTTP/2 answer for "GET /" ... ]

Initially defined by RFC 7540 , the upgrade mechanism has been deprecated since RFC 9113  as it was not widely adopted. It is also less fit for censorship circumvention than prior knowledge as it involves an HTTP/1.1 request that is caught by HTTP censors that do not support HTTP/2.

Research Gap

In the context of censorship, HTTP/2 has not been analyzed extensively. In this blogpost, we analyze HTTP/2’s viability as a censorship circumvention technique and show the following.

  1. HTTP/2 is uncensored in China and Iran, two countries that widely employ HTTP/1.1 censorship.
  2. Up to 6.28% of servers support unencrypted HTTP/2, with smaller servers and censored domains showing higher support than large websites.
  3. Unencrypted HTTP/1.1 is still supported by around 20% of servers.
  4. To easily analyze a server for its unencrypted HTTP support, we provide the tool Does-It-Support-Unencrypted-Http.

Results

In the following, we show that unencrypted HTTP/2 is not censored in China and Iran. Then, we outline existing server support for unencrypted HTTP/2.

Censorship

In China, HTTP/1.1 is censored with a combination of different TCP RST packets with the ACK flag set or not, depending on the specific domain. In Iran, HTTP/1.1 requests are censored with a block page, a TCP RST, or null routing, depending on the specific domain. HTTP/1.1 censorship in China and Iran can be triggered with the curl command curl http://nsfwyoutube.com --resolve nsfwyoutube.com:80:208.78.226.162. The --resolve flag prevents possible DNS censorship from interfering.

While HTTP/1.1 is censored in China and Iran, we detected that HTTP/2 with prior knowledge is not censored at all in both countries. For any domain censored over HTTP/1.1, the equivalent HTTP/2 requests were not censored in our evaluations. For instance, curl --http2-prior-knowledge http://nsfwyoutube.com --resolve nsfwyoutube.com:80:208.78.226.162 accesses a website censored over HTTP/1.1 in both countries. In China and Iran, any server that supports unencrypted HTTP/2 can be accessed without interference from existing HTTP censorship.

Server Support

To determine servers’ support for unencrypted HTTP, we tested domains from three lists: We selected domains from Tranco top one million, the CitizenLab test list for China, and the CitizenLab test list for Iran. The Tranco top one million list contains domains popular worldwide; the Citizenlab lists contain domains censored in the respective country. Some domains were unresolvable or did not open a TCP socket; we excluded them from our evaluations.

To each reachable website, we sent a GET request on the path / with either HTTP/1.1, HTTP/2 prior knowledge, or the HTTP/2 upgrade mechanism. We followed all redirects to other HTTP websites and considered a server to support the used HTTP version if it responded with a 200 OK using the desired HTTP version. The following table shows the number of domains that support HTTP/1.1, HTTP/2 prior knowledge, and the HTTP/2 upgrade mechanism.

Tranco Top 1M156 316 (18.62%)20 973 (2.50%)5227 (0.62%)839 393
CitizenLab China96 (19.35%)24 (4.84%)3 (0.60%)496
CitizenLab Iran161 (21.52%)47 (6.28%)13 (1.74%)749

Below, we detail our test vectors and servers’ support for each HTTP version we evaluated.

Unencrypted HTTP/1.1 Support

During the unencrypted HTTP/1.1 support scan, we sent the following test vector for all domains:

GET / HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (...) Gecko/20100101 Firefox/127.0
Connection: close

Across the three used lists, the HTTP/1.1 support varies between 18.62% and 21.52%. These results show that – surprisingly – unencrypted HTTP/1.1 is still supported by many domains.

Unencrypted HTTP/2 with Prior Knowledge Support

During the unencrypted HTTP/2 with prior knowledge scan, we sent the connection preface first and then the following test vector for all domains:

GET / HTTP/2
Host: 
User-Agent: Mozilla/5.0 (...) Gecko/20100101 Firefox/127.0

The HTTP/2 with prior knowledge support varies between 2.5% and 6.28%, depending on the domain list. Importantly, censored domains from the CitizenLab lists show higher support for HTTP/2 prior knowledge than popular domains from the Tranco top one million list. This shows that while servers’ support for HTTP/2 prior knowledge is lower than for HTTP/1.1 across all lists, a considerable number of censored domains support unencrypted HTTP/2.

Unencrypted HTTP/2 with Upgrade Mechanism Support

During the unencrypted HTTP/2 with upgrade mechanism scan, we sent the following HTTP/1.1 request as a test vector for all domains:

GET / HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (...) Gecko/20100101 Firefox/127.0
Connection: Upgrade, HTTP2-Settings
Upgrade: h2c
HTTP2-Settings: AAEAABAAAAIAAAABAAQAAP__AAUAAEAAAAgAAAA...

The upgrade mechanism has the lowest support ranging from 0.6% to 1.74%, depending on the used domain list. This is unsurprising as RFC 9113  deprecated this method due to its low adoption rate.

Tranco Relation

Across all scanned HTTP versions, support for unencrypted HTTP varied widely across the Tranco top one million list. Below, we depict servers’s support for the different HTTP versions across the Tranco top 1 million list.

Unencrypted HTTP support by servers from the Tranco Top 1 Million list.

Unencrypted HTTP support by servers from the Tranco Top 1 Million list. Unencrypted HTTP/2 support increases for less accessed websites, contrasting unencrypted HTTP/1.

Interestingly, unencrypted HTTP/2 support increases for lower Tranco ranks while unencrypted HTTP/1 support increases until about 400,000 and then decreases again. This aligns with support by websites from Citizenlab list which are usually smaller than Tranco websites. While overall support for HTTP/2 is low, we argue that it can still be used to access certain blocked websites successfully and adds to the arsenal of censorship circumvention techniques.

Tool for Detecting HTTP Support

During our analyses, we developed a tool that evaluates a website’s support for unencrypted HTTP support. Below, we provide an exemplary output for lgbtchinatour.com

lgbtchinatour.com analysis started.
Server online. Scanning!

#####################

HTTP/1.0: REDIRECT(www.lgbtchinatour.com/) -> SUCCESS
HTTP/1.1: SUCCESS
HTTP/2 (Prior Knowledge): FAILURE
HTTP/2 (Upgrade): FAILURE

This indicates that lgbtchinatour.com supports unencrypted HTTP/1.0 after a redirect and unencrypted HTTP/1.1 but no unencrypted HTTP/2. We refer to the GitHub project for a detailed overview of the tool’s functionality. We hope that our tool aids the community and fellow researchers in their evaluation of HTTP censorship and its circumvention.

Discussion

We have successfully circumvented the HTTP censors in China and Iran and showed that up to 6.28% of censored websites are accessible via unencrypted HTTP/2. This still leaves over 93% of censored websites inaccessible with unencrypted HTTP/2 as a circumvention method. Despite this, we consider unencrypted HTTP/2 a valuable addition to current censorship circumvention techniques in the cat-and-mouse game between censors and affected people. Below, we discuss the limitations and potential of unencrypted HTTP/2 as a circumvention technique.

What makes unencrypted HTTP/2 special?

HTTP/2 differs vastly from previous HTTP versions such as HTTP/1.1. While all HTTP versions up to and including HTTP/1.1 consist of human-readable ASCII letters, HTTP/2 is a byte-based protocol. This makes HTTP/2 parsers incompatible with previous HTTP parsers. Furthermore, HTTP/2 has been designed for encrypted usage in HTTPS. Unencrypted usage is allowed but not advertised. Accordingly, browsers do not implement unencrypted HTTP/2. We suspect that this is the reason censors do not analyze it and why the censorship circumvention community has ignored unencrypted HTTP/2.

Difficulty of blocking unencrypted HTTP/2

Censors can block HTTP/2 but face additional challenges compared to previous HTTP versions. For previous HTTP versions, censors could analyze the first message sent by the client to extract the connection’s destination from human-readable ASCII bytes. In HTTP/2 the first message must not necessarily contain the connection destination forcing the censor to hold additional state and parse additional messages. HTTP/2 also utilizes a new form of header compression which censors would have to accommodate. We suspect that the complexity added in HTTP/2 contributed to the censors’ decision not to analyze it. We emphasize that censors could still implement HTTP/2 censorship despite its complexity.

Circumventing Censors with unencrypted HTTP/2

Practically applying unencrypted HTTP/2 as a censorship circumvention technique is possible but comes with challenges. In this blog post, we accessed otherwise blocked resources with unencrypted HTTP/2 using curl. Curl’s built-in support for unencrypted HTTP/2 can be used to access specific HTML sites but its usability is limited in comparison to a full-fletched web browser. Unfortunately, we are not aware of any web browser that supports unencrypted HTTP/2. To utilize unencrypted HTTP/2 as a censorship circumvention technique from a browser, we propose an HTTP update proxy that translates unencrypted HTTP/1.1 spoken by the browser into unencrypted HTTP/2 and vice-versa. A similar proxy could be installed on the other side of the firewall, downgrading unencrypted HTTP/2 to unencrypted HTTP/1.1, allowing unencrypted HTTP/2 traffic to pass the censor and connect to a server that only supports unencrypted HTTP/1.1. Overall, we consider the practical deployment of HTTP/2 as a censorship circumvention method difficult and are interested in possible approaches.

Conclusion

In summary, we introduced unencrypted HTTP/2 as a censorship circumvention method by accessing blocked resources in China and Iran. While server support for unencrypted HTTP/2 is low, we showed that a non-negligible number of censored websites supports it. To aid future evaluations of servers’ support for unencrypted HTTP/2, we developed a tool and made it accessible on GitHub. Feel free to use it or contact us for further discussion and future work. We hope that our contributions aid affected people and the censorship circumvention community. Note that unencrypted HTTP/2 does not protect your traffic; do not use it as a censorship circumvention technique when transmitting sensitive data.

Source Link


Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.

Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!


Start your free Amazon Prime trial
today and unlock unlimited streaming and more!

Help Power Techcratic’s Future – Scan To Support

If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.

As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!

BITCOIN

Bitcoin Logo

Bitcoin QR Code

bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge

Scan the QR code with your crypto wallet app

DOGECOIN

Dogecoin Logo

Dogecoin QR Code

D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA

Scan the QR code with your crypto wallet app

ETHEREUM

Ethereum Logo

Ethereum QR Code

0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a

Scan the QR code with your crypto wallet app

Please read the Privacy and Security Disclaimer on how Techcratic handles your support.

Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.

Tags: Hacker News
Share162Share28ShareShare4ShareTweet101
Previous Post

Razer built a game-streaming app on top of Moonlight, and it’s not too bad

Next Post

App promising a universal shopping experience automated with AI actually used a small army of human workers in the Philippines and Romania instead

Hacker News

Hacker News

Stay updated with Hacker News, where technology meets entrepreneurial spirit. Get the latest on tech trends, startup news, and discussions from the tech community. Read the latest updates here at Techcratic.

Related Posts

The Era of Full-Stack Chip Designers
Hacker News

The Era of Full-Stack Chip Designers

July 7, 2025
1.3k
jackjackbits/bitchat: bluetooth mesh chat, IRC vibes
Hacker News

jackjackbits/bitchat: bluetooth mesh chat, IRC vibes

July 6, 2025
1.3k
paper-design/shaders: Zero-dependency canvas shaders that can be installed from npm or designed in Paper
Hacker News

paper-design/shaders: Zero-dependency canvas shaders that can be installed from npm or designed in Paper

July 6, 2025
1.3k
sst/opencode: AI coding agent, built for the terminal.
Hacker News

sst/opencode: AI coding agent, built for the terminal.

July 6, 2025
1.3k
Yutarop/ga-pixel-art: Generates an animated GIF using a genetic algorithm.
Hacker News

Yutarop/ga-pixel-art: Generates an animated GIF using a genetic algorithm.

July 6, 2025
1.3k
News Alert Immediately – Instant News Alerts & Global Monitoring
Hacker News

News Alert Immediately – Instant News Alerts & Global Monitoring

July 6, 2025
1.3k
hackArcana
Hacker News

hackArcana

July 6, 2025
1.3k
Differentiable Programming with PyTorch and DSPy
Hacker News

Differentiable Programming with PyTorch and DSPy

July 5, 2025
1.3k
Load More
Next Post
App promising a universal shopping experience automated with AI actually used a small army of human workers in the Philippines and Romania instead

App promising a universal shopping experience automated with AI actually used a small army of human workers in the Philippines and Romania instead

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Tech Resources

  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Forbes
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo
  • Google News
  • Hacker News
  • Harvard Tech
  • I Like Cats ™
  • I Like Dogs ™
  • LifeHacker
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • PC World
  • Photofocus
  • Physics
  • Random Tech
  • Retro Rewind ™
  • Robot Report
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Art
  • Tech Careers
  • Tech Deals
  • Techcratic ™
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Tech News

  • 30 Second Tech ™
  • AI
  • Apple Insider
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo

Tech News

  • Harvard Tech
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • Physics
  • PC World
  • Random Tech
  • Retro Rewind ™
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Careers

Tech News​

  • Tech Art
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Site Links

  • About Techcratic
  • Affiliate Disclaimer
  • Affiliate Link Policy
  • Contact Techcratic
  • Dealors Discount Store
  • Privacy and Security Disclaimer
  • Privacy Policy
  • RSS Feed
  • Site Map
  • Support Techcratic
  • Techcratic
  • Tech Deals
  • TOS
  • 𝕏
Click For A Secret Deal

Techcratic – Your All In One Tech Hub © 2020 – 2025
All Rights Reserved
∞

No Result
View All Result
  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Gaming
  • I Like Cats ™
  • I Like Dogs ™
  • MacRumors
  • Macworld
  • Tech Deals
  • Techcratic ™
  • Techs Got To Eat ™
  • Tesla
  • UFO
  • Wired