Essays /

Internet Circumvention Essay

Essay preview

Internet censorship circumvention
From Wikipedia, the free encyclopedia
Part of a series on |
Censorship |
Media regulation |
* Books  * Films  * Internet  * Music  * Press  * Radio * Thought  * Speech and expression * Video games | Methods |
* Bleeping  * Book burning  * Broadcast delay * Burying of scholars  * Chilling effect * Internet police  * Censor bars  * Concision * Conspiracy of silence * Content-control software * Euphemism (Minced oath)  * Expurgation * Fogging  * Gag order  * Heckling * Internet censorship circumvention * Memory hole  * National intranet * Newspaper theft  * Pixelization  * Postal * Prior restraint  * Propaganda model  * Purge * Revisionism  * Sanitization/Redaction * Self-censorship  * Speech code * Strategic lawsuit  * Verbal offence * Whitewashing  * Word filtering | Contexts |

* Blasphemy  * Criminal  * Corporate * Hate speech  * Ideological  * Media bias * Moralistic fallacy  * Naturalistic fallacy  * Political * Religious  * Suppression of dissent * Systemic bias | By country |

* Censorship  * Freedom of speech * Internet censorship | * v  * t  * e |
Main article: Internet censorship
Internet censorship circumvention is the process used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet, because filtering and blocking do not remove content from the Internet and as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to otherwise censored material. However, circumvention may not be very useful to non tech-savvy users and so blocking and filtering remain effective means of censoring the Internet for many users.[1] Different techniques and resources are used to bypass Internet censorship, including cached web pages, mirror and archive sites, alternate DNS servers, proxy websites, virtual private networks, sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws.[2] There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries individuals that gain access to otherwise restricted content may be violating the law, and if caught can be expelled from school, fired from jobs, jailed, or subject to other punishments and loss of access.[3] Contents  [hide]  * 1 Circumvention, anonymity, risks, and trust * 2 Methods * 2.1 Cached Pages * 2.2 Mirror and archive sites * 2.3 Web to E-mail services * 2.4 RSS aggregators * 2.5 IP addresses and domain names * 2.6 Alternative DNS Servers * 2.7 Proxy websites * 2.8 Reverse Proxy * 2.9 Virtual Private Networks (VPNs) * 2.10 Sneakernets * 2.11 Software * 3 Shadow Internet and cell phone networks * 4 Summary * 5 See also * 6 References * 7 External links | -------------------------------------------------

[edit]Circumvention, anonymity, risks, and trust
Circumvention and anonymity are different. Circumvention systems are designed to bypass blocking, but they do not usually protect identities. Anonymous systems protect a user's identity. And while they can contribute to circumvention, that is not their primary function. It is important to understand that open public proxy sites do not provide anonymity and can view and record the location of computers making requests as well as the websites accessed.[4] In many jurisdictions accessing blocked content is a serious crime, particularly content that is considered child pornography, a threat to national security, or an incitement of violence. Thus it is important to understand the circumvention technologies and the protections they do or do not provide and to use only tools that are appropriate in a particular context. Great care must be taken to install, configure, and use circumvention tools properly. Individuals associated with high profile rights organizations, dissident, protest, or reform groups should take extra precautions to protect their online identities.[4] Circumvention sites and tools should be provided and operated by trusted third parties located outside the censoring jurisdiction that do not collect identities and other personal information. Best are trusted family and friends personally known to the circumventor, but when family and friends are not available, sites and tools provided by individuals or organizations that are only known by their reputations or through the recommendations and endorsement of others may need to be used. Commercial circumvention services may provide anonymity while surfing the Internet, but could be compelled by law to make their records and users' personal information available to law enforcement.[4] -------------------------------------------------

There are many m...

Read more


-104188 -3 -4 -92 /, /index.htm, /index.html. 01 0320.0120.0230.02 0xd0.0x50.0x98.0x2 0xd0509802 1 10 103 11 12 13 14 15 16 17 18 19 2 2.1 2.10 2.11 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 20 2006 2007 2009 2010 2011 2012 21 22 23 24 240 25 26 27 28 3 3494942722 3995 4 5 53 6 7 8 9 978 ab abl absolut accept access accomplish account across ad ad-support address administ adult advocaci affair againstddo aggreg ahead al al-saqaf alberto alkasir allow alon also altern although alway american amongst amount an.on anna anon anonym anoth anti anti-censorship appear applic appropri april arab architectur archiv arm around articl ask aspect associ assumpt attack august authent author avail avoid b back balanc ban bandwidth bar base battl bbc beckman believ bennett berkman best bias blasphemi bleep block, bloglin bob book bottom box broadcast brows browser bullet buri burmes burn by-pass bypass c cach callanan came canada capabl care carri cast catalog categori caught cell censor censorship center centr certain cgi cgiproxi chang chat child chill china chines circumv circumvent circumventor citizen clark client cloud cloud-bas code collect combin commerci commission common communic communiti compel complet complex comput concis confer confid configur confus connect consid consortium conspiraci constant contact contain content content-control context continu contribut control conven cool cooper copi cormac corp corpor cost could countri cours creat crime crimin cultur current d d.i.t data decemb decentr decim decreas decrypt default defeat defend defens degre deibert delay deliv deliveri democraci deploy design destin detour develop differ difficult digit dingledin direct discov discuss display dissent dissid distribut dit divis dmitri dns doesn domain domest donat dopatka dot download dresden dri dries-ziekenhein drive dutton dynam dynaweb e e-mail eas ecensorship ecolog ed edit educ effect effort einternet either electron email embed emerg enabl encount encrypt encyclopedia end endors enforc engag engin ensur enter escudero escudero-pascu especi establish estim ethan etric euphem evad evalu even event everyon evid exact exampl exist expel experi expos express expurg extent extern extra extrem face fairground fallaci fals famili faq far fari farsi fastest featur federrath fee feed fetch file film filter find fire firewal five fix floss fog follow foresaw form forum foundat free freedom freegat freenet freiburg friend front front-end frontier function gag gain game gate gateway general german germani get ghost gifc ginett give given glanz global gmbh go googl govern government gpass great greater group guerra guess guid günter h hal hann harder harvard haselton hate haven heavi heckl heidelberg hein help hexadecim hide high histori hold hole holstein home host hous howev http http-tunnel https human hundr i2p ian ident identifi ideolog imag implement import in inc incit includ index individu inform infrastructur inher instal instant intend interact interfac intermedi intern internet internet-fac intranet invis ip ireland isbn isp jail jame januari jap java jillian job john jondo jondonym journalist june jurisdict keep know knowledg known köpsell lab label landscap languag larger last latina launchpad law lawsuit leap learn least legal less lesson like limit line link list ll lncs load load-balanc local locat log long look loss low lund machin mail main make manag mani manual march margin markoff marshal materi may mean media member memori menu messag messeng method militari million minc mirror mobil model modern modifi mole monitor month moralist move msnbcretriev multimedia multipl munk music must müller name nameserv nash nation naturalist navig need net netherland network new news newspap ngo ngo-in-a-box non non-government non-profit none normal note noth novemb novic nuditi number oath object observ octal octob offenc offer often old one ongo onlin open opendn opensourc oper option order organ origin other otherwis outsid overlay overview page palfrey paper pari pars part parti particip particular pascual pass past patch peac peacefir peer peer-to-p peopl percent perform permiss person phone physic pixel place player plug plug-in polic polit pornographi portal portion possibl postal potenti pp pp.206-220 precaut prefer present press previous primari print print/export prior privaci privat problem proc process produc product profil profit program project promot propaganda proper proport protect protest protocol provid proxi proxifi pseudonym psiphon public publish pull punish purg quick quit race radio random rang rate rather re re-rout read reader reassur receiv recent recogn recommend record redirect reduc refer reform regardless regensburg regul regular regulatori relakk relat relationship reli religi remain remov report repres repress reput request requir rerout resourc respons restraint restrict result retriev return revers review revision revoc right risk robert roger rolf ronald rout rsa rss run russian sanitization/redaction saqaf savvi scale schleswig schleswig-holstein scholar school scientif scotti script search secur see seek seem seiz select self self-censorship send septemb seri serious serv server servic shadow shape short show shut side silenc silver similar simpl simple-to-administ simplest simpli sinc singl site situat slow small sneakernet social societi sock softwar solut solv some-blocked-url sometim sophist sourc space spanish specif specifi speech speed split split-tunnel spoke springer springer-verlag stefan step storag store strateg strategi strong studi stupidcensorship subject submit sullivan summari suppli support suppress surf surveil swap sweden system tactic take taken talk target task tech tech-savvi technic techniqu technisch technolog telecommun ten tenebril term text theft thing think third thought thousand threat thrill thumb thus time titl tool toolbox top topic tor toronto total traffic transfer translat transmiss transpar transport trend trivial troubl trust trustworthi trygghetsbolaget tunnel turn two type u.s ultim ultrareach ultrasurf un un-block uncensor under undermin understand underwrit unesco unit univers universität unobtrus unproxi upsideout url usag use user usual v various verbal verifi verlag via victoria video vietnam vietnames view violat violenc virtual vitaliev volunt vpn vpns vs walid way web web-bas web-block websit well well-written wendolski whack whitewash wider wiki wikia wikimedia wikinew wikipedia william wish within without word work world worldwid worth would written,,, yemeni york ziekenhein zuckerman 中文 粵語