2010 Circumvention Tool Usage Report (October, 2010), by Hal Roberts, Ethan Zuckerman, Jillian. Berkman Center for Internet and society.
"All circumvention tools use the same basic method to bypass this sort of network filtering: they proxy connections through third party sites that are not filtered themselves. By using this method, a user in China who cannot reach http://falundafa.org directly can instead access a proxy machine like
http://superproxy.com/, which can fetch http://falundafa.org for the user. The network filter only sees a connection to the proxy machine (superproxy.com), and so as long as the proxy itself remains unfiltered, the user can visit sites through the proxy that are otherwise blocked by the network filter. Some, but not all, tools also encrypt traffic between the user and proxy, both so that the traffic between the user and proxy is much more difficult to surveille and so, that filtering triggered by the content of the traffic (instead of merely the destination of the traffic) will not work. Despite this core similarity, circumvention tools differ significantly in many implementation details. We break circumvention tools into four large categories based on their proxy implementations. Each category of tool is distinguished from one another also by virtue of each being closely associated with a single model of financial support. The four categories of tools are:
• blocking-resistant tools
• simple web proxies
• VPN services
• HTTP/SOCKS proxies
Monday, October 18, 2010
2010 Circumvention Tool Usage Report, by Hal Roberts, Ethan Zuckerman, Jillian
Labels:
cybersociety,
cyberspace,
internet filtering,
tools
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2010
(403)
-
▼
October
(45)
- Web science: a new frontier presentations
- SL Languages 2010 (videos of presentations)
- The IGS Online Library (Institute of General Seman...
- Avatars as Editors
- Virtual communities - exchanging ideas through com...
- Information Technology, Globalization and Social D...
- The Virtual Community: Chapter Ten: Disinformocrac...
- Manuel Castells, "The Network Society and Organiza...
- Postmodern Virtualities, by Mark Poster
- The Economy of Ideas Selling Wine Without Bottles ...
- Free Culture By Lawrence Lessig
- Learning and Relationships in the Cyberspace
- The Effect of Interactivity on Learning Physical A...
- Global Internet Freedom Consortium
- The Shaping of Power, Rights, and Rule in Cyberspace
- opennet innitiative
- Acces Denied:The Practice and Policy of Global Int...
- 2010 Circumvention Tool Usage Report, by Hal Rober...
- "Be cunning and full of tricks. Innovative Learnin...
- Improving three elements involved in the learning ...
- Outcomes obtained after brainstorming at ISTE by u...
- Brainstorming with Brainflowing at ISTE (strengths...
- Un análisis del análisis económico del derecho
- Web 3.0 and beyond: the next 20 years of the internet
- The Web Wide World -- The Web Spreads Into the Phy...
- Internet of things
- Digital Life
- Streams of Content, Limited Attention: The Flow of...
- How Handwriting Trains the Brain
- Internet 2009 in numbers
- 2010 Rankings: Doctoral Programs in America
- The Democratization of Online Social Networks
- Tracking online life: How women use the Internet t...
- The Online Male Takes a Licking and Keeps on Clicking
- Top Countries according to their Internet speed
- Users Over 50 Double Social Networking Use in a Year
- Strong Growth for Twitter's Mobile Audience, Jack ...
- Internet Traffic Report
- BlogPulse
- Email Statistics Report, 2009-2013”
- Internet world stats
- Domain Name Industry Brief, by VeriSign
- September 2010, web server survey, by Metcraft
- The Mobile Communication Society.
- Mathematical Theory of Communication,by Klaus Krip...
-
▼
October
(45)
No comments:
Post a Comment