نتایج جستجو برای: censorship
تعداد نتایج: 4089 فیلتر نتایج به سال:
The book ('Slovenian Writers and Imperial Censorship in the Long Nineteenth Century') summarizes results of three years research which members project group from institutions (ZRC SAZU, UL UNG) collaborated with invited specialists on individual censorship topics. From perspective censorship, “long nineteenth century” was extremely dynamic. During this period, is symmetrically divided into two ...
Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...
News organizations are often the targets of Internet censorship. This paper will look at two technical considerations for the BBC, based on its distribution of non-English content into countries such as Iran and China, where the news services are permanently unavailable from the official BBC websites: blocking detection and circumvention. This study examines an internal BBC prototype system bui...
This position paper presents the following thought experiment: can we build communication protocols that (1) are sufficiently useful that they achieve widespread adoption as general-purpose communication mechanisms and (2) thwart censorship as a consequence of their design? We posit that a useful communication platform that is inherently resistant to traffic analysis, if widely adopted and used...
The fundamental requirement for censorship resistance is content discoverability — it should be easy for users to find and access documents, but not to discover what they store locally, to preserve plausible deniability. We describe a design for “one-way indexing” to provide plausibly-deniable content search and storage in a censorship resistant network without requiring outof-band communicatio...
Internet freedom advocacy sites [1] have studied and documented these censorship practices, enumerating the techniques employed by the censoring bodies. For example, censors block the IP addresses of controversial websites, inspect TCP packet exchanges for keywords and tamper with DNS records. These advocacy sites have already catalogued the types of sites that are censored and the means by whi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید