Researchers have identified different signatures related to connection tampering.
Collecting measurement data is only part of the process of characterizing censorship and making it useful.