We collect anonymized TLS client hello messages from our campus network, in order to measure the popularity of various implementations actually used in practice.
Why collect fingerprints?
TLS fingerprints allow us to identify problems in common TLS applications. For example, we can investigate Weak cipher suites still in widespread use. We can also investigate the ability of censorship circumvention tools to mimic and blend in with other popular TLS implementations, and track the progress of those implementations as user upgrade and migrate away from the mimicked versions.