Mandalari, Anna MaríaBagnulo Braun, Marcelo GabrielLutu, Andra Elena2022-04-292022-04-292015-08-17C2B(I)D 2015: Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, Part of SIGCOMM'15, August 17, 2015, London, United Kingdom. New York: Association For Computing Machinery, pp.: 33-38.978-1-4503-3539-3https://hdl.handle.net/10016/34658Proceeding of: C2B(1)D '15: 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, August 17, 2015, London, United KingdomMiddleboxes, such as proxies, firewalls and NATs play an important role in the modern Internet ecosystem. On one hand, they perform advanced functions, e.g. traffic shaping, security or enhancing application performance. On the other hand, they turn the Internet into a hostile ecosystem for innovation, as they limit the deviation from deployed protocols. It is therefore essential, when designing a new protocol, to first understand its interaction with the elements of the path. The emerging area of crowdsourcing solutions can help to shed light on this issue. Such approach allows us to reach large and different sets of users and also different types of devices and networks to perform Internet measurements. In this paper, we show how to make informed protocol design choices by using a crowdsourcing platform. We consider a specific use case, namely the case of pervasive encryption in the modern Internet. Given the latest public disclosures of the NSA global surveillance operations, the issue of privacy in the Internet became of paramount importance. Internet community efforts are thus underway to increase the adoption of encryption. Using a crowdsourcing approach, we perform large-scale TLS measurements to advance our understanding on whether wide adoption of encryption is possible in today’s Internet.5eng© 2015 ACM. Permission to make digital or hard copies of portions of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyright for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permission to republish from: permissions@acm.org.CrowdsourcingTLSInternet measurementsMiddleboxesInforming protocol design through crowdsourcing: The case of pervasive encryptionconference proceedingsTelecomunicacioneshttps://doi.org/10.1145/2787394.2787397open access3338C2B(I)D 2015: Proceedings of the 2015 ACM SIGCOMM Workshop on Crowdsourcing and Crowdsharing of Big (Internet) Data, Part of SIGCOMM'15, August 17, 2015, London, United KingdomCC/0000033311