Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Internet censorship circumvention

From Wikipedia, the free encyclopedia
Methods to bypass internet censorship

Internet censorship circumvention is the use of various methods and tools by technically skilled users to bypassInternet censorship—the legal control or suppression of access to, publication of, or viewing of content on theInternet. Commonly used software tools includeLantern andPsiphon, which can bypass multiple types of restriction. Some methods evade less sophisticated blocking tools by using alternateDomain Name System (DNS) servers, falseIP addresses, or address lookup systems.[1][2] However, such methods become ineffective if censors block not only the DNS but also the IP addresses of restricted domains, thereby rendering a potential bypass ineffective. Other tools can tunnel the network traffic to proxy servers in jurisdictions that don't have censorship. Through pluggable transports, traffic obscuration,website mirrors, orarchive sites, users can access copies of websites even in areas having Internet censorship.[3][4]

An "arms race" (or competition) has developed between censors and developers of circumvention software. This competition leads to two types of innovation: more sophisticated blocking techniques by censors, and less detectable tools by circumvention developers.[5] While estimates of user adoption for circumvention tools vary, it is widely accepted that tens of millions of people use them each month.[6][7][8][9] Barriers to adoption include usability issues; difficulty in finding reliable information on circumvention; limited motivation to access censored content; and risks from breaking the law.[10][11][12][4]

Circumvention methods

[edit]

Major circumvention methods include alternate names and addresses; mirrors, caches, and copies; alternative platforms; proxying; and traffic obfuscation.

Alternate names and addresses

[edit]

Censorship filters may block specific domain names, using eitherDNS hijacking or URL filtering. Websites can sometimes be accessed through alternate names and addresses that may not be blocked.[1]

Some websites offer the same content at multiple pages or domain names.[2] For example, the English Wikipedia is available at two locations: themain page and themobile version.

If a website's DNS resolution is disrupted, but the site is not blocked in other ways, it may be possible to access the site directly through its IP address or by modifying a computer'shosts file. It may be possible to bypass DNS-based blocking by using alternative DNS servers orpublic recursive name servers (especially via an encrypted DNS client).[1]

Censors may block specific IP addresses. Depending on how such filtering is implemented, it may be possible to use different forms of a blocked IP address, for example, by specifying the address in a differentnumeral system.[13] For example, the following URLs all access the same site, but only some browsers will recognize all forms of the URL:

Blockchain technology—a distributed data store for digital transactions—is an attempt to decentralize Internet namespaces beyond the control of any single entity.[14][15] Decentralized namespaces enable domains to resist censorship. Discussion of the BitDNS project began in 2010 with a desire to achieve names that are decentralized, secure, and human readable.[16]

Mirrors, caches, and copies

[edit]

Certain online services allow users to access content that is blocked on the Internet through cached or mirrored copies:

  • Cached pages: Some search engines retain copies of previously indexed webpages, orcached pages, which are often hosted by search engines; these may not be blocked.[4]
  • Mirror and archive sites: Copies of websites or pages may be available atmirror orarchive sites such asWayback Machine (by theInternet Archive) orArchive.today. TheDocker registry image repository is anHTTP public service that has centralized storage, is application stateless, and isnode scalable; the service has a performance bottleneck in the scenario of multinational uploading and downloading. The decentralized Docker registry (DDR) avoids this disadvantage of centralization. DDR uses anetwork-structuredP2P network to store and query mirrormanifest file and blob routing; each node serves as an independent mirror repository to provide mirror uploading and downloading for the entire network.[17][18][19]
  • RSS aggregators:RSS aggregators such asFeedly may be able to receive and then forward RSS feeds that are blocked if accessed directly.[4]

Alternative platforms

[edit]

Alternative types of Internet hosting platform can provide options for circumventing Internet censorship. Such alternatives include decentralized hosting, anonymity networks, federated platforms, providers with different policies, anddarknets:

  • Decentralized hosting: Content creators may publish to an alternative platform that is willing to host this content.Napster was the earliestpeer-to-peer (P2P) platform, but it was closed because of vulnerabilities with centralizedbootstrapping.Gnutella was the first sustainable P2P platform that featured hosting by decentralization. The motto of theFreenet P2P platform is that "true freedom requires true anonymity." Later, theBitTorrent P2P protocol was developed to allocate resources with high performance and fairness.[20]ZeroNet P2P web hosting was the firstdistributed hash table (DHT) system to support dynamic and updateable webpages. TheYaCy P2P search engine is the leading distributed search.GNUnet is rebuilding the internet framework from the ground up for resilience technologically idealized.
  • Anonymity networks: TheTor andInvisible Internet Project (I2P) networks result in increased willingness to host content that would otherwise be censored. However, hosting implementation and server location may cause challenges, and the content is still hosted by a single entity that can be controlled.
  • Main article:Fediverse
  • Federated: Semi-decentralized, federated platforms such asNextcloud andPeerTube make it easier for users to find an instance where they are welcome.
  • Providers with different policies: Some platforms that rely oncloud computing may have laxerterms of service (TOS). However, cloud computing does not in principle innovate fundamental laxness.

Proxying

[edit]

A variety of techniques support a user in leveraging technical proxies to circumvent Internet censorship:

  • Web proxy server: A Webproxy server (or web proxy) allow users to load external web pages through a server that makes and receives requests on behalf of the user, rather than directly from the blocked original server (or source).[4] Depending on how a proxy is configured, a censor may be able to determine if a user is accessing the proxy, and if so, which pages the user loads.[2]
    • Example: The mobileOpera Mini browser uses proxies that employ encryption and compression to accelerate downloads. This process has the side effect of circumventing several approaches to Internet censorship. In 2009, this situation led the Chinese government to ban all versions of the Opera Mini browser except for a special Chinese version.[21]
  • Domain fronting:Domain fronting hides the destination of a network connection by passing initial requests through acontent delivery network or other popular site that censors may be unwilling to block.[22] This technique was used by messaging applications such as Signal and Telegram. Similarly, Tor'smeek system uses Microsoft's Azure cloud. However, large cloud providers such asAmazon Web Services andGoogle Cloud no longer supportmeek.[23] As another option, a website owner can create a free account to use aCloudflare domain for fronting.[24][25]
  • Tunneling protocol: By employing atunneling protocol such asSecure Shell (SSH), a user can forward all of their traffic over an encrypted channel; as a result, both outgoing requests to blocked sites and incoming responses from those sites are hidden from censors, for whom it appears as unreadable SSH traffic.[26]
  • Virtual private network (VPN): Through avirtual private network (VPN), a user can create secure connections to more permissive countries, letting users browse as if they were located in one of those countries.[1] Some VPN services are offered for a monthly fee; others are supported by advertising. According toGWI, an audience research company, there were more than 400 million people using VPNs to circumvent censorship or obtain increased privacy in 2014 (although this number cannot be verified).[9]
  • Tor anonymity network: A more advanced tool such as theTor anonymity network routes encrypted traffic through multiple servers to make the source and destination of this traffic less traceable. In some cases, Tor can be used to avoid censorship, especially when it is configured to use traffic obfuscation techniques.[5]
Instructions for using Tor's pluggable transports, which employ traffic obfuscation techniques to increase censorship resistance

Traffic obfuscation

[edit]

A censor may be able to detect and block the use of circumvention tools throughdeep packet inspection.[27] Ongoing work aims to make circumvention tools less detectable in several ways: randomizing the traffic; attempting to mimic a whitelisted protocol; or tunnelling traffic through a whitelisted site by using domain fronting or Tor'smeek system.[5] Tor and other circumvention tools have adopted multiple obfuscation techniques that users can employ, depending on the nature of their network connection; these techniques are sometimes calledpluggable transports.[28]

Internet alternatives

[edit]

Functionality desired by users may overlap with that of services that are not based on the Internet, such as postalmail,Bluetooth-based data exchange, orwalkie-talkie devices. The following are some detailed examples:

  • Alternative data transport:Datacasting allows transmission of Web pages and other information via satellite broadcast channels, bypassing the Internet entirely. This process requires a satellite dish and suitable receiver hardware, but it provides a powerful means of avoiding censorship. Because the user only receives data through this process but transmits no data, a suitablyair-gapped computer can be impossible to detect.[29]
  • Sneakernets: Asneakernet is the transfer of electronic information, especially computer files, by physically carrying data on storage media from one place to another. A sneakernet can move data regardless of network restrictions, simply by avoiding the network entirely.[30] One example of a widely adopted sneakernet isEl Paquete Semanal, an underground content market in Cuba.[31]

Adoption of tools

[edit]

Circumvention tools have undergone spikes in adoption rates in response to high-profile attempts to block the Internet.[32][33][34] Nevertheless, mixed results have been reported by studies that measure the adoption of circumvention tools in countries with persistent and widespread censorship.[6] Knowledge of and comfort with using censorship circumvention tools varies widely and depends on factors such as the local censorship environment, public awareness of circumvention alternatives, language accessibility, usability, and legal risks.[35][36][37] Such tools can include VPNs, international SIM cards,Short Message Service (SMS), Bluetooth-based communication apps, and mesh networking applications.[38] In some contexts, individuals may be aware of circumvention tools but reluctant to use them due to the risk of severe legal penalties.[37]

In response to persistent censorship

[edit]

Measures and estimates of circumvention tool adoption have varied widely. A 2010 study by Harvard University estimated that few users employ tools for censorship circumvention—likely less than 3% of users, even in countries that consistently implement widespread censorship.[6] Other studies have reported substantially larger rates, but these have been disputed.[7][8]

In China, anecdotal reports suggest that adoption of circumvention tools is particularly high in certain communities, such as universities; a survey by the research instituteFreedom House found that users generally did not find circumvention tools to be difficult to use.[39][40][1] Market research firmGlobalWebIndex reported more than 35 million Twitter users and 63 million Facebook users in China (where both services are blocked).[7] However, these estimates have been disputed;[41] Facebook's advertising platform estimates 1 million users in China,[8] and other reports of Twitter adoption estimate 10 million users.[42] Other studies have found that efforts to block circumvention tools in China have reduced adoption of those tools; the Tor network previously had more than 30,000 users connecting from China, but as of 2014, the network had only about 3,000 Chinese users.[43]

An 2013 study of 1,175 Chinese Internet users found that participants primarily circumvented censorship to access search engines, social media platforms, and blocked news sources. The study reported that users tended to rely on services that were easy to use and economically costly for authorities to block. For example, the most widely used tool operated through Google’s cloud hosting infrastructure, which also supported a range of other services. A smaller subset of users, consisting mainly of journalists and activists, cited privacy as their primary motivation for using a tool.[44]

InThailand, Internet censorship has occurred since 2002, through sporadic and inconsistent filtering.[45] In a small-scale survey of 229 Thai Internet users, a research group at the University of Washington found that 63% of surveyed users attempted to use circumvention tools, and 90% were successful in using those tools. Users often made on-the-spot decisions about the use of circumvention tools on the basis of limited or unreliable information; these users had a variety of perceived threats, some more abstract and others based on personal experience.[11]

In response to blocking events

[edit]

In response to the blocking of Twitter inTurkey during 2014, information about alternateDNS servers was widely shared, since using another DNS server (such asGoogle Public DNS) allowed users to access Twitter.[46] The day after the block was imposed, the total number of posts made in Turkey had increased by 138%, according toBrandwatch, an Internet measurement firm.[32]

After ban on theTelegram messaging app in Iran during April 2018, web searches for VPN and other circumvention software increased by as much as 48 times for some search terms, but there was evidence that users were downloading unsafe software. As many as a third of Iranian Internet users used thePsiphon tool in the days immediately following the block; in June 2018, as many as 3.5 million Iranian users continued to use the tool.[33]

Anonymity, risks, and trust

[edit]

Systems for circumvention andanonymity are different. Circumvention systems are designed to bypass Internet blocking, but they do not usually protect user identities. Anonymous systems protect a user's identity, but while they can contribute to censorship circumvention, this is not their primary function. Public proxy sites do not provide anonymity, since they can view and record the location of computers making requests, in addition to the websites accessed.[4]

In many jurisdictions, accessing blocked content is a seriouscrime, particularly for content that is considered to bechild pornography, a threat tonational security, or an incitement to violence. For this reason, it is important to understand circumvention technologies—and the protections that they do (or do not) provide—and to use only tools that are appropriate in a particular context. Significant care must be taken to install, configure, and use circumvention tools properly. People associated withdissident, protest, or reform groups, or high-profile rights organizations, should take extra precautions to protect their online identities.[4]

Circumvention sites and tools should be provided and operated by trusted third parties, located outside the censoring jurisdiction, who do not collect identities and other personal information. Trusted family and friends known personally by the circumventor are best; but when family and friends are unavailable, sites and tools provided by individuals or organizations that are known only by their reputations, or through recommendations and endorsements by other people, may need to be used. Commercial circumvention services may provide anonymity during Internet surfing, but these services could be legally compelled to make their records and users' personal information available to law enforcement authorities.[4]

Software

[edit]

There are five general types of software for circumventing Internet censorship:

  • CGI proxies: ACommon Gateway Interface (CGI) proxy server uses a script running on aweb server to provide proxying functionality. A CGI proxy client (typically the user's computer) sends a requested web address orURL, embedded within the data ofHTTP protocol requests, to the CGI proxy server. The CGI proxy server sends its own HTTP request to the ultimate destination server, and then the proxy server returns the result to the proxy client. A CGI proxy tool's security can be trusted to the extent that the operator of the proxy server is trustworthy. CGI proxy tools do not require a user to manually configure a web browser or install client software, but they do require the user to use an alternative, potentially confusing user interface within the existing web browser.
  • HTTP proxies: HTTP proxies send HTTP requests through an intermediate proxying server. When a client (typically the user's computer) is connecting through an HTTP proxy, this client sends exactly the same HTTP request to the proxy as it would send to the destination server if unproxied. The HTTP proxy parses the HTTP request; this proxy sends its own HTTP request to the ultimate destination server; and then the proxy server returns the response back to the proxy client. An HTTP proxy tool's security can be trusted to the extent that the operator of the proxy server is trustworthy. To employ an HTTP proxy tool, a user must either manually configure the web browser or install client-side software that performs this configuration. Once configured, an HTTP proxy tool allows the user to transparently use their browser's normal user interface.
  • Application proxies: Application proxies are similar to HTTP proxies but support a wider range of online applications.
  • Peer-to-peer systems: Peer-to-peer systems store content across a number of participating volunteer servers; this storage is combined with techniques such as rerouting, to reduce the level of reliance placed on volunteer servers or social networks to establish trust relationships between servers and clients. A peer-to-peer system can be trusted to the extent that the operators of participating servers are trustworthy, or that its architecture limits the information available to any single server—provided that server operators do not collude to combine their knowledge.
  • Rerouting systems: Rerouting systems send requests and responses through a series of proxying servers, re-encrypting the data at each proxy, so that a given proxy knows at most either the source or the destination of the data, but not both. This approach decreases the amount of trust required of the individual proxy hosts.

Below is a list of software for circumventing Internet censorship:

Name
Type
Developer
Cost
Notes
alkasir[47]HTTP proxyYemeni journalist Walid al-SaqaffreeUsessplit tunneling to redirect to proxy servers only when blocking is encountered. Is not a general circumvention solution and only allows access to certain blocked websites. In particular, it does not allow access to blocked websites that contain pornography, nudity or similar adult content.
Anonymizer[48]HTTP proxyAnonymizer, Inc.paidTransparently tunnels traffic through Anonymizer.
CGIProxy[49]HTTP proxyJames MarshallfreeTurns a computer into a personal, encrypted proxy server capable of retrieving and displaying web pages to users of the server. CGIProxy is the engine used by many other circumvention systems.
Flash proxy[50]HTTP proxyStanford UniversityfreeUses ephemeral browser-based proxy relays to connect to the Tor network.
Freegate[51]HTTP proxyDynamic Internet Technology, Inc.freeUses a range ofopen proxies to access blocked websites via DIT's DynaWeb anti-censorship network.
Hyphanet[52] (originally Freenet)peer-to-peerIan ClarkefreeA decentralized, distributed data store using the contributed bandwidth and storage space of member computers to provide strong anonymity protection.
I2P[53]
(originally Invisible Internet Project)
re-routingI2P ProjectfreeUses a pseudonymous overlay network to allow anonymous web browsing, chatting, and file transfers, among other features.
Java Anon Proxy[54] (also known as JAP or JonDonym)re-routing (fixed)JonDos GmbHfree or paidUses the underlying anonymity service AN.ON to allow browsing with revocablepseudonymity. Originally developed in a project of theTechnische Universität Dresden, theUniversität Regensburg, and the Privacy Commissioner ofSchleswig-Holstein.
Psiphon[55][56]CGI proxyPsiphon, Inc.freeA simple-to-administer, open-source system for circumventing Internet censorship; in wide-scale use, with a cloud-based infrastructure serving millions of users.
Proxify[57]HTTP proxyUpsideOut, Inc.free or paidAn encrypted, public, web-based circumvention system. Because the site is public, it is blocked in many countries and by most filtering applications.
StupidCensorship[58]HTTP proxyPeacefirefreeAn encrypted, public, web-based circumvention system. Because the site is public, it is blocked in many countries and by most filtering applications.mousematrix.com is a similar site based on the same software.
Tor[59]re-routing (randomized)The Tor Projectfree Allows users to bypass Internet censorship, while providing strong anonymity.
Ultrasurf[60]HTTP proxyUltrareach Internet CorporationfreeAnti-censorship product that allows users in countries with heavy Internet censorship to protect their Internet privacy and security.

See also

[edit]

References

[edit]
  1. ^abcdeCallanan, Cormac; Dries-Ziekenheiner, Hein; Escudero-Pascual, Alberto; Guerra, Robert (11 April 2011)."Leaping Over the Firewall: A Review of Censorship Circumvention Tools"(PDF).freedomhouse.org.Archived(PDF) from the original on 3 May 2019. Retrieved11 December 2018.
  2. ^abc"How to: Circumvent Online Censorship".Surveillance Self-Defense. 5 August 2014. Archived fromthe original on 23 December 2018. Retrieved1 November 2018.
  3. ^New Technologies Battle and Defeat Internet CensorshipArchived 27 October 2011 at theWayback Machine, Global Internet Freedom Consortium, 20 September 2007
  4. ^abcdefghEveryone's Guide to By-passing Internet CensorshipArchived 15 September 2011 at theWayback Machine, The Citizen Lab, University of Toronto, September 2007
  5. ^abcDixon, Lucas; Ristenpart, Thomas; Shrimpton, Thomas (14 December 2016). "Network Traffic Obfuscation and Automated Internet Censorship".IEEE Security & Privacy.14 (6):43–53.arXiv:1605.04044.doi:10.1109/msp.2016.121.ISSN 1540-7993.S2CID 1338390.
  6. ^abc"2010 Circumvention Tool Usage Report".Berkman Klein Center. 19 June 2018.Archived from the original on 15 December 2018. Retrieved15 November 2018.
  7. ^abcHedencrona, Sebastian (27 September 2012)."China: The Home to Facebook and Twitter?".GlobalWebIndex Blog.Archived from the original on 15 December 2018. Retrieved13 December 2018.
  8. ^abcOng, Josh (26 September 2012)."Report: Twitter's Most Active Country Is China (Where It Is Blocked)".The Next Web.Archived from the original on 15 December 2018. Retrieved11 December 2018.
  9. ^abMarcello Mari.How Facebook's Tor service could encourage a more open webArchived 10 June 2016 at theWayback Machine.The Guardian. Friday 5 December 2014.
  10. ^Lee, Linda; Fifield, David; Malkin, Nathan; Iyer, Ganesh; Egelman, Serge; Wagner, David (1 July 2017)."A Usability Evaluation of Tor Launcher".Proceedings on Privacy Enhancing Technologies.2017 (3):90–109.doi:10.1515/popets-2017-0030.ISSN 2299-0984.
  11. ^abGebhart, Genevieve; Kohno, Tadayoshi (26 April 2017). "Internet Censorship in Thailand: User Practices and Potential Threats".2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE. pp. 417–432.doi:10.1109/eurosp.2017.50.ISBN 9781509057627.S2CID 11637736.
  12. ^Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the InternetArchived 28 September 2011 at theWayback Machine, Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp.,ISBN 978-92-3-104188-4
  13. ^"Circumventing Network Filters Or Internet Censorship Using Simple Methods, VPNs, And Proxies"Archived 14 November 2011 at theWayback Machine, Not As Cool As It Seems, 16 December 2009, accessed 16 September 2011
  14. ^Kalodner, Harry; Carlsten, Miles; Ellenbogen, Paul; Bonneau, Joseph; Narayanan, Arvind."An empirical study of Namecoin and lessons for decentralized namespace design"(PDF).Princeton University:1–4.
  15. ^"Squaring the Triangle: Secure, Decentralized, Human-Readable Names (Aaron Swartz's Raw Thought)".aaronsw.com.Archived from the original on 5 March 2016. Retrieved3 May 2020.
  16. ^"BitDNS and Generalizing Bitcoin | Satoshi Nakamoto Institute".satoshi.nakamotoinstitute.org. 15 November 2010. Retrieved3 May 2020.
  17. ^Xu, Quanqing; Jin, Chao; Rasid, Mohamed Faruq Bin Mohamed; Veeravalli, Bharadwaj; Aung, Khin Mi Mi (2018)."Blockchain-based decentralized content trust for docker images".Multimedia Tools and Applications.77 (14):18223–18248.doi:10.1007/s11042-017-5224-6.ISSN 1380-7501.S2CID 21160524.
  18. ^"Docker Registry".Docker Documentation. 12 July 2022. Retrieved12 July 2022.
  19. ^Ovando-Leon, Gabriel; Veas-Castillo, Luis; Gil-Costa, Veronica; Marin, Mauricio (9 March 2022)."Bot-Based Emergency Software Applications for Natural Disaster Situations".Future Internet.14 (3): 81.doi:10.3390/fi14030081.ISSN 1999-5903.
  20. ^Kent University:http://www.medianet.kent.edu/surveys/IAD06S-P2PArchitectures-chibuike/P2P%20App.%20Survey%20Paper.htm
  21. ^Steven Millward (22 November 2009)."Opera accused of censorship, betrayal by Chinese users".CNet Asia. Archived fromthe original on 3 November 2013.
  22. ^Fifield, David; Lan, Chang; Hynes, Rod; Wegmann, Percy; Paxson, Vern (1 June 2015)."Blocking-resistant communication through domain fronting".Proceedings on Privacy Enhancing Technologies.2015 (2):46–64.doi:10.1515/popets-2015-0009.ISSN 2299-0984.
  23. ^Bershidsky, Leonid (3 May 2018)."Russian Censor Gets Help From Amazon and Google". Bloomberg L.P.Archived from the original on 18 November 2018. Retrieved9 November 2018.
  24. ^"How to unblock websites in China for web owners | GreatFire Analyzer".en.greatfire.org.Archived from the original on 25 March 2020. Retrieved6 January 2020.
  25. ^"CloudFlare Domain Fronting: an easy way to reach (and hide) a malware C&C".Medium. 11 August 2017.Archived from the original on 19 November 2019. Retrieved6 January 2020.
  26. ^Hoffman, Chris (14 February 2017)."How to Use SSH Tunneling to Access Restricted Servers and Browse Securely".How-To Geek.Archived from the original on 15 December 2018. Retrieved11 December 2018.
  27. ^Bateyko, Dan (February 2022)."Censorship-Circumvention Tools and Pluggable Transports".Georgetown Law Technology Review. Retrieved2 December 2023.
  28. ^Shahbar, K.; Zincir-Heywood, A. N. (9 November 2015). "Traffic flow analysis of tor pluggable transports".2015 11th International Conference on Network and Service Management (CNSM). pp. 178–181.doi:10.1109/CNSM.2015.7367356.ISBN 978-3-9018-8277-7.S2CID 1199826.
  29. ^Tanase, Stefan (9 September 2015)."Satellite Turla: APT Command and Control in the Sky".Kaspersky. Retrieved17 August 2020.
  30. ^Sullivan, Bob (13 April 2006)Military Thumb Drives Expose Larger ProblemArchived 6 December 2010 at theWayback MachineMSNBC Retrieved on 25 January 2007.
  31. ^Kwong, Matt (12 April 2016)."When Cubans want internet content, black-market El Paquete delivers". Canadian Broadcasting Corporation.Archived from the original on 8 January 2019. Retrieved11 December 2018.
  32. ^abEdwards, John (21 March 2014)."From Pac-Man to Bird Droppings, Turkey Protests Twitter Ban".The Wall Street Journal.Archived from the original on 15 December 2018. Retrieved15 November 2018.
  33. ^abKargar, Simin; McManamen, Keith (2018). "Censorship and Collateral Damage: Analyzing the Telegram Ban in Iran".SSRN Working Paper Series.doi:10.2139/ssrn.3244046.ISSN 1556-5068.S2CID 159020053.SSRN 3244046.
  34. ^Al-Saqaf, Walid (2016)."Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime".Media and Communication.4 (1):39–50.doi:10.17645/mac.v4i1.357.
  35. ^"Internet Shutdowns in Senegal: A Needs and Capacity Assessment to Prepare, Prevent, Resist"(PDF).OPTIMA. December 2022. Retrieved10 November 2025.
  36. ^Sarkar, Torsha; Schwartz-Henderson, Laura (February 2023)."Internet Shutdown Advocacy in India: How to Prepare, Prevent Resist"(PDF).OPTIMA. Retrieved10 November 2025.
  37. ^abChristopher, Kalema (August 2022)."Investigating VPN Blocking and its Impact on Uganda's Preparations for the 2021 General Elections and Responses Afterward"(PDF).OPTIMA. Retrieved10 November 2025.
  38. ^Grinko, Margarita; Qalandar, Sarvin; Randall, Dave; Wulf, Volker (11 November 2022)."Nationalizing the Internet to Break a Protest Movement: Internet Shutdown and Counter-Appropriation in Iran of Late 2019".Proc. ACM Hum.-Comput. Interact.6 (CSCW2): 314:1–314:21.doi:10.1145/3555205.
  39. ^"VPN crackdown a trial by firewall for China's research world".South China Morning Post.Archived from the original on 18 December 2018. Retrieved15 November 2018.
  40. ^Branigan, Tania (18 February 2011)."China's Great Firewall not secure enough, says creator".The Guardian.ISSN 0261-3077.Archived from the original on 16 December 2018. Retrieved11 December 2018.
  41. ^Mari, Marcello (5 December 2014)."How Facebook's Tor service could encourage a more open web".The Guardian.ISSN 0261-3077.Archived from the original on 10 June 2016. Retrieved13 December 2018.
  42. ^Russell, Jon (5 July 2016)."Twitter estimates that it has 10 million users in China".TechCrunch.Archived from the original on 28 January 2019. Retrieved11 December 2018.
  43. ^Crandall, Jedidiah R.; Mueen, Abdullah; Winter, Philipp; Ensafi, Roya (1 April 2015)."Analyzing the Great Firewall of China Over Space and Time".Proceedings on Privacy Enhancing Technologies.2015 (1):61–76.doi:10.1515/popets-2015-0005.Archived from the original on 3 December 2023.
  44. ^Robinson, David; Yu, Harlan; An, Anne (April 2013)."Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship"(PDF).OpenITP. Archived fromthe original(PDF) on 18 July 2013. Retrieved7 November 2025.
  45. ^Deibert, Ronald, ed. (2012).Access contested : security, identity, and resistance in Asian cyberspace information revolution and global politics. Cambridge, MA: MIT Press. p. 85.ISBN 9780262298919.OCLC 773034864.
  46. ^Souppouris, Aaron (21 March 2014)."Turkish citizens use Google to fight Twitter ban".The Verge.Archived from the original on 8 January 2019. Retrieved15 November 2018.
  47. ^"About alkasir".alkasir. Archived fromthe original on 10 September 2011. Retrieved16 September 2011.
  48. ^"Hide IP and Anonymous Web Browsing Software — Anonymizer".anonymizer.com. Archived fromthe original on 23 September 2011. Retrieved16 September 2011.
  49. ^"CGIProxy", James Marshall, accessed 17 September 2011.Archived 21 September 2011 at theWayback Machine.
  50. ^"Flash proxies", Applied Crypto Group in the Computer Science Department at Stanford University, accessed 21 March 2013.Archived 10 March 2013 at theWayback Machine.
  51. ^"About D.I.T."Dynamic Internet Technology. Archived fromthe original on 26 September 2011. Retrieved16 September 2011.
  52. ^"What is Freenet?".The Freenet Project. Archived fromthe original on 16 September 2011. Retrieved16 September 2011.
  53. ^"I2P Anonymous Network", I2P Project, accessed 16 September 2011
  54. ^"Revocable Anonymity"Archived 25 September 2011 at theWayback Machine, Stefan Köpsell, Rolf Wendolsky, Hannes Federrath, inProc. Emerging Trends in Information and Communication Security: International Conference, Günter Müller (Ed.), ETRICS 2006, Freiburg, Germany, 6–9 June 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, pp.206-220
  55. ^"About Psiphon"Archived 16 March 2016 at theWayback Machine, Psiphon, Inc., 4 April 2011
  56. ^"Psiphon Content Delivery Software"Archived 4 March 2016 at theWayback Machine, Launchpad, accessed 16 September 2011
  57. ^"About Proxify", UpsideOut, Inc., accessed 17 September 2011
  58. ^About StupidCensorship.com, Peacefire, accessed 17 September 2011
  59. ^"Tor: Overview"Archived 6 June 2015 at theWayback Machine, The Tor Project, Inc., accessed 16 September 2011
  60. ^"About UltraReach"Archived 25 September 2011 at theWayback Machine, Ultrareach Internet Corp., accessed 16 September 2011

External links

[edit]
Wikimedia Commons has media related toInternet censorship.
Media regulation
Methods
Contexts
By location
Censorship of
Censorship by
Forms
Websites blocked in
Laws
Africa
Americas
Asia
Europe
Oceania
Background
Principles
With aproxy server
Without a proxy server
Anti-censorship software
Free software
Proprietary software
Browser extensions
Anonymity
Anonymous software
Anonymous P2P network
Physical circumvention methods
Relevant organizations
Reference
Italics indicates that maintenance of the tool has been discontinued.CategoryCommons
Retrieved from "https://en.wikipedia.org/w/index.php?title=Internet_censorship_circumvention&oldid=1322621141"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp