Censorship Resistance Revisited
نویسندگان
چکیده
“Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation of censorship resistance (CR) that is resistant to selective filtering even by a censor who is able to inspect (but not alter) the internal contents and computations of each data server, excluding only the server’s private signature key. This models a service provided by operators who do not hide their identities from censors. Even with such a strong adversarial model, our definition states that CR is only achieved if the censor must disable the entire system to filter selected content. We show that existing censorship resistant systems fail to meet this definition; that Private Information Retrieval (PIR) is necessary, though not sufficient, to achieve our definition of CR; and that CR is achieved through a modification of PIR for which known implementations exist.
منابع مشابه
CORDON—A Taxonomy of Internet Censorship Resistance Strategies
We present a taxonomy of Internet censorship resistance strategies and techniques extracted from analyzing proposed and implemented systems. We categorize the strategies into the following six types to form the CORDON taxonomy: Collateral damage, where the damage caused by censorship would outweigh its benefits; Outside scope of influence, where the censor is powerless to act due to it having n...
متن کاملSoK: Making Sense of Censorship Resistance Systems
An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of CRSs. The inherent complexity of CRSs and the breadth of work in this area makes ...
متن کاملCosmic Censorship: As Strong As Ever
Spacetimes which have been considered counterexamples to strong cosmic censorship are revisited. We demonstrate the classical instability of the Cauchy horizon inside charged black holes embedded in de Sitter spacetime for all values of the physical parameters. The relevant modes that maintain the instability, in the regime which was previously considered stable, originate as outgoing modes nea...
متن کاملResisting the Censorship Infrastructure in China
China’s censorship infrastructure is widely recognized as sophisticated, strict, and comprehensive. We conducted a qualitative study to understand Chinese citizens’ practices to navigate the censored Chinese Internet. We found that participants’ practices were closely related to their understanding of and resistance to the censorship infrastructure. Participants switched between public and priv...
متن کاملCommunications Disruption & Censorship under International Law: History Lessons
With Internet censorship on the rise around the world, a variety of tools have proliferated to assist Internet users to circumvent such censorship. However, there are few studies examining the implications of censorship circumvention under international law, and its related politics. This paper aims to help fill some of that void, with an examination of case studies wherein global communication...
متن کامل