Preference for censorship

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Censorship and Two Types of Self-Censorship∗†

We propose and defend a distinction between two types of self-censorship: public and private. In public self-censorship, individuals restrain their expressive attitudes in response to public censors. In private self-censorship, individuals do so in the absence of public censorship. We argue for this distinction by introducing a general model which allows us to identify, describe, and compare a ...

متن کامل

Tor’s Usability for Censorship Circumvention

Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...

متن کامل

Scrambling for Lightweight Censorship Resistance

In this paper we propose scrambling as a lightweight method of censorship resistance, in place of the traditional use of encryption. We consider a censor which can only block banned content by scanning it while in transit (for example using deep-packet inspection), instead of attacking the communication endpoints (for example using address filtering or taking servers offline). Our goal is to gr...

متن کامل

Cosmic Censorship for Gowdy Spacetimes

Due to the complexity of Einstein's equations, it is often natural to study a question of interest in the framework of a restricted class of solutions. One way to impose a restriction is to consider solutions satisfying a given symmetry condition. There are many possible choices, but the present article is concerned with one particular choice, which we shall refer to as Gowdy symmetry. We begin...

متن کامل

Proof-of-Censorship: Enabling centralized censorship-resistant content providers

Content providers often face legal or economic pressures to censor or remove objectionable or infringing content they host. While decentralized providers can enable censorship-resistant storage, centralized content providers remain popular for performance and usability reasons. But centralized content providers can always choose not to respond to requests for a specific file, making it difficul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Terrain

سال: 2019

ISSN: 0760-5668,1777-5450

DOI: 10.4000/terrain.19314