نتایج جستجو برای: strict censorship

تعداد نتایج: 35344  

Journal: :Physical Review Letters 1993

Journal: :Nature 1978

2015
David Fifield Linda N. Lee Serge Egelman David Wagner

Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...

2011
Karl Kathuria

News organizations are often the targets of Internet censorship. This paper will look at two technical considerations for the BBC, based on its distribution of non-English content into countries such as Iran and China, where the news services are permanently unavailable from the official BBC websites: blocking detection and circumvention. This study examines an internal BBC prototype system bui...

2014
Henry Tan Micah Sherr

This position paper presents the following thought experiment: can we build communication protocols that (1) are sufficiently useful that they achieve widespread adoption as general-purpose communication mechanisms and (2) thwart censorship as a consequence of their design? We posit that a useful communication platform that is inherently resistant to traffic analysis, if widely adopted and used...

2012
Eugene Y. Vasserman Victor Heorhiadi Nicholas Hopper Yongdae Kim

The fundamental requirement for censorship resistance is content discoverability — it should be easy for users to find and access documents, but not to discover what they store locally, to preserve plausible deniability. We describe a design for “one-way indexing” to provide plausibly-deniable content search and storage in a censorship resistant network without requiring outof-band communicatio...

2007
Graham Lowe Patrick Winters Michael L. Marcus

Internet freedom advocacy sites [1] have studied and documented these censorship practices, enumerating the techniques employed by the censoring bodies. For example, censors block the IP addresses of controversial websites, inspect TCP packet exchanges for keywords and tamper with DNS records. These advocacy sites have already catalogued the types of sites that are censored and the means by whi...

Journal: :Journal of Information, Law and Technology 2004
Ida Azmi

When Malaysia embarked into its gigantic multimedia super-corridor project in 1995, the equivalent to the US Silicon Valley, one of her promises to her foreign counterparts is that there will be no censorship on the Internet. This assurance was embodied in section 3 (3) of the Communication and Multimedia Act 1998 that states “nothing in this Act shall be construed as permitting the censorship ...

2015
Bridger Hahn Rishab Nithyanand Phillipa Gill Rob Johnson

Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید