Is filtering censorship?
نویسندگان
چکیده
منابع مشابه
Censorship is Futile
The Internet has become the new battle ground between authoritarian regimes and ordinary individuals who want unimpeded access to information. The immense popularity of online activism and citizen journalism enabled by social media has instigated state level players to partially or completely block access to the Internet. In return, individuals and organizations have been employing various anti...
متن کاملCensorship in the Wild: Analyzing Web Filtering in Syria
Over the past few years, the Internet has become a powerful means for the masses to interact, coordinate activities, and gather and disseminate information. As such, it is increasingly relevant for many governments worldwide to surveil and censor it, and many censorship programs have been put in place in the last years. Due to lack of publicly available information, as well as the inherent risk...
متن کاملInternet Censorship in China: Where Does the Filtering Occur?
China filters Internet traffic in and out of the country. In order to circumvent the firewall, it is helpful to know where the filtering occurs. In this work, we explore the AS-level topology of China’s network, and probe the firewall to find the locations of filtering devices. We find that even though most filtering occurs in border ASes, choke points also exist in many provincial networks. Th...
متن کاملCensorship and Two Types of Self-Censorship∗†
We propose and defend a distinction between two types of self-censorship: public and private. In public self-censorship, individuals restrain their expressive attitudes in response to public censors. In private self-censorship, individuals do so in the absence of public censorship. We argue for this distinction by introducing a general model which allows us to identify, describe, and compare a ...
متن کاملProof-of-Censorship: Enabling centralized censorship-resistant content providers
Content providers often face legal or economic pressures to censor or remove objectionable or infringing content they host. While decentralized providers can enable censorship-resistant storage, centralized content providers remain popular for performance and usability reasons. But centralized content providers can always choose not to respond to requests for a specific file, making it difficul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Learned Publishing
سال: 2020
ISSN: 0953-1513,1741-4857
DOI: 10.1002/leap.1293