A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies

نویسندگان

  • Christopher S. Leberknight
  • Mung Chiang
  • Felix Ming Fai Wong
چکیده

This paper presents a conceptual study of Internet anti-censorship technologies. It begins with an overview of previous research on Internet anti-censorship systems and discusses their social, political and technological dimensions. Then for deployed Internet anti-censorship technologies, a taxonomy of their principles and techniques is presented, followed by a discussion of observed trends and implications. Based on the observations, the paper concludes with a discussion on the most critical design features to enable a successful and effective system.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Taxonomy of Censors and Anti-Censors: Part I-Impacts of Internet Censorship

The tug-of-war on the Internet between censor and anti-censor technologies is intensifying. With an aim to raise awareness on Internet censorship and its circumvention, this paper and its companion Part II present a conceptual study of Internet censorship and anti-censorship. This first paper focuses on Internet censorship. It outlines an historical account of censorship through the lens of new...

متن کامل

Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel

Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...

متن کامل

Thanks to Platinum Supporters Silver Supporters Bronze Supporters

Exploiting recent advances in monitoring technology and the drop of its costs, authoritarian and oppressive regimes are tightening the grip around the virtual lives of their citizens. Meanwhile, the dissidents, oppressed by these regimes, are organizing online, cloaking their activity with anti-censorship systems that typically consist of a network of anonymizing proxies. The censors have becom...

متن کامل

Censorship and Two Types of Self-Censorship∗†

We propose and defend a distinction between two types of self-censorship: public and private. In public self-censorship, individuals restrain their expressive attitudes in response to public censors. In private self-censorship, individuals do so in the absence of public censorship. We argue for this distinction by introducing a general model which allows us to identify, describe, and compare a ...

متن کامل

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking

Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recognize and block, and once the censors identify network servers (e.g., Tor bridges) assisting in circumvention, they can locate all of their users. CloudTransport is a new censorship-resistant comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJEP

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012