Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Other security for Windows, Mac, Linux
A Review of Censorship Circumvention Tools in Iran
Message
<blockquote data-quote="Prorootect" data-source="post: 706557" data-attributes="member: 905"><p>So copy/paste here another parts of the article above:</p><p><img src="http://payvand.com/blog/files/2011/04/Censorship-Circumvention-Tools-in-Iran-filter-software.jpg" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p><a href="http://freenetproject.org/" target="_blank"><strong>Freenet</strong></a></p><p>Freenet is free software which lets you anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and chat on forums, without fear of censorship.</p><p></p><p></p><p><a href="http://www.google.com/" target="_blank"><strong>Google</strong></a> (Translate, Reader, Cache etc.)</p><p></p><p>Google Cache:</p><p>A user can access Googles cache servers to gather blocked content. To see the pointer to the cached content, the user needs to reach the Google search engine (so Google must not be blocked or this method to work).</p><p></p><p>Google Reader:</p><p>Google offers users the possibilityto subscribe to news feeds through Google Reader, which gathers data on the user behalf (it acts like a proxy), and lets the user read it through the Gmail web interface.</p><p></p><p>Google Translate:</p><p>Google’s translation service can be used to gather blocked content. By setting the source language to something diferent from what it is, and setting the target language to the actual source language.</p><p></p><p>Pro: No software needed to access block sites – Con: No security provided</p><p></p><p><strong>GPass</strong></p><p>- Support for streaming audio/video, email, instant messaging, download managers, as well as web surfing</p><p>- Encrypted socks tunnels and backup tunnels using Skype and Tor</p><p>- Integrated application firewall</p><p>- Green and free software: copy and run without installation</p><p>- English, Chinese, Farsi interface, Burmese manual</p><p></p><p>Pro: Latest tool and easy to use – Con: Unaudited software – download site is often blocked</p><p></p><p><strong><a href="https://anon.inf.tu-dresden.de/index_en.html" target="_blank">JAP -- ANONYMITY & PRIVACY</a></strong></p><p>Makes it possible to surf the internet anonymously and unobservably</p><p></p><p>Pro: Portable application, servers can be added manually – Con: A research project</p><p></p><p><a href="http://proxy.org/" target="_blank"><strong>Proxy</strong></a></p><p>Proxy.org is the pragmatic Web surfer’s guide to online privacy and anonymous web surfing. We give you the information and tools you need to be confident and in command of your Web surfing experience.</p><p></p><p><a href="http://psiphon.ca/" target="_blank"><strong>Psiphon</strong></a></p><p>Psiphon is a web-based proxy system that enables you to view Internet content that might be inaccessible in your region.</p><p></p><p>Pro: No software download, just clear the browser history – Cons: Not everyone in a blocked country knows someone that can provide access to a Psiphon node, use self-signed certifcate</p><p></p><p><a href="http://www.torproject.org/download/download.html.en" target="_blank"><strong>Tor</strong></a></p><p>Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.</p><p></p><p>Pro: Advanceded project, highly distributed infrastructure Con: Slow, users need to finetune</p><p></p><p><strong><a href="https://ultrasurf.us/" target="_blank">About Ultrasurf and Ultrareach - Internet Freedom, Privacy, and Security</a></strong></p><p>Dear Ultrasurf users:</p><p>Due to greatly increased demand in Iran, our servers with limited capacities have been overloaded and start crashing. As a result, you may experience slow response or disconnections, for which we apologize. We are working to deal with the problems and will keep you advised of the situation. In the meantime we thank our users for your patience and support. Making it possible for you to access to the internet and to bypass internet firewalls during hard times is why we have created Ultrasurf and why we are working so hard to expand, improve and protect its service.</p><p>Ultrasurf Team</p><p></p><p>Ultrasurf is a product of Ultrareach Internet Corporation. Originally created to help internet users in China find security and freedom online, Ultrasurf has now become one of the world’s most popular anti-censorship, pro-privacy software, with millions of people using it to bypass internet censorship and protect their online privacy.</p><p></p><p><a href="http://www.your-freedom.net/" target="_blank"><strong>Your Freedom</strong></a></p><p>The Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don’t need to know.</p><p></p><p>Pro: Simple, extensive manual – Con: Focused on bypassing firewall not security of the user</p><p></p><p><a href="http://en.wikipedia.org/wiki/Virtual_private_network" target="_blank"><strong>VPN</strong></a></p><p>A virtual private network (VPN) is a computer network that is constructed by using public networks or wires such as Internet to provide remote offices or individual users to get secure access to their organization’s network.</p><p></p><p>Source (Home link): <strong><a href="https://freedomhouse.org/" target="_blank">Freedom House</a></strong></p><p><strong></strong></p><p><strong>Concluding recommendations</strong></p><p></p><p>In closing, we draw your attention to the following recommendations from the Freedom House report:</p><p></p><p>- Many users prefer to have tools that perform at fast speeds. These are, however, not always the most secure options. It is important to understand the risks you potentially face when you attempt to circumvent your country’s blocking infrastructure.</p><p>- Many users seem to think that when they do things quickly, the government may not notice. This is not true most of the time, however. If the government is able to intercept your internet connection, they will be able to see what you were doing afterwards.</p><p>- While these tools may be able to hide what you are doing online, they cannot hide that a circumvention tool is being used. If your government can intercept your internet traffic, they will also be able to detect that you were circumventing their blocking infrastructure.</p><p>We wish you safe surfing and hope your government will consider providing free and unfiltered internet access to your country in the near future. For the full report and a discussion of all the tools mentioned here, please visit the Freedom House website."</p><p></p><p>_________________________________________________________________</p><p><span style="font-size: 18px">Some interesting links for you:</span></p><p><span style="font-size: 18px"></span></p><p><span style="font-size: 18px">Freedom of Speech - Human Rigts Freedom of Speech</span>: on <a href="http://bestoflearn.blogspot.fr" target="_blank">Best Of Learn</a>: <a href="http://bestoflearn.blogspot.fr/2017/10/freedom-of-speech-human-rights-freedom.html" target="_blank">Freedom Of Speech - Human Rights Freedom Of Speech</a></p><p>"Give me the liberty to know, to utter, and to argue freely according to conscience, above all liberties."</p><p>- but this article cannot be copied...</p><p></p><p><span style="font-size: 18px"><strong>To Achieve Freedom for Iran and the Arab Nations, the Region Must Unite</strong><span style="font-size: 15px">: on globalvoices.org: <a href="https://globalvoices.org/2018/01/21/to-achieve-freedom-for-iran-and-the-arab-nations-the-region-must-unite/" target="_blank">To Achieve Freedom for Iran and the Arab Nations, the Region Must Unite · Global Voices</a> - Posted <a href="https://globalvoices.org/2018/01/21/" target="_blank">21 January 2018</a></span></span></p><p><span style="font-size: 18px"><span style="font-size: 15px">- so the home page of globalvoices.org: <a href="https://globalvoices.org/" target="_blank">Global Voices · Citizen media stories from around the world</a></span></span></p></blockquote><p></p>
[QUOTE="Prorootect, post: 706557, member: 905"] So copy/paste here another parts of the article above: [IMG]http://payvand.com/blog/files/2011/04/Censorship-Circumvention-Tools-in-Iran-filter-software.jpg[/IMG] [URL='http://freenetproject.org/'][B]Freenet[/B][/URL] Freenet is free software which lets you anonymously share files, browse and publish “freesites” (web sites accessible only through Freenet) and chat on forums, without fear of censorship. [URL='http://www.google.com/'][B]Google[/B][/URL] (Translate, Reader, Cache etc.) Google Cache: A user can access Googles cache servers to gather blocked content. To see the pointer to the cached content, the user needs to reach the Google search engine (so Google must not be blocked or this method to work). Google Reader: Google offers users the possibilityto subscribe to news feeds through Google Reader, which gathers data on the user behalf (it acts like a proxy), and lets the user read it through the Gmail web interface. Google Translate: Google’s translation service can be used to gather blocked content. By setting the source language to something diferent from what it is, and setting the target language to the actual source language. Pro: No software needed to access block sites – Con: No security provided [B]GPass[/B] - Support for streaming audio/video, email, instant messaging, download managers, as well as web surfing - Encrypted socks tunnels and backup tunnels using Skype and Tor - Integrated application firewall - Green and free software: copy and run without installation - English, Chinese, Farsi interface, Burmese manual Pro: Latest tool and easy to use – Con: Unaudited software – download site is often blocked [B][URL='https://anon.inf.tu-dresden.de/index_en.html']JAP -- ANONYMITY & PRIVACY[/URL][/B] Makes it possible to surf the internet anonymously and unobservably Pro: Portable application, servers can be added manually – Con: A research project [URL='http://proxy.org/'][B]Proxy[/B][/URL] Proxy.org is the pragmatic Web surfer’s guide to online privacy and anonymous web surfing. We give you the information and tools you need to be confident and in command of your Web surfing experience. [URL='http://psiphon.ca/'][B]Psiphon[/B][/URL] Psiphon is a web-based proxy system that enables you to view Internet content that might be inaccessible in your region. Pro: No software download, just clear the browser history – Cons: Not everyone in a blocked country knows someone that can provide access to a Psiphon node, use self-signed certifcate [URL='http://www.torproject.org/download/download.html.en'][B]Tor[/B][/URL] Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. Pro: Advanceded project, highly distributed infrastructure Con: Slow, users need to finetune [B][URL='https://ultrasurf.us/']About Ultrasurf and Ultrareach - Internet Freedom, Privacy, and Security[/URL][/B] Dear Ultrasurf users: Due to greatly increased demand in Iran, our servers with limited capacities have been overloaded and start crashing. As a result, you may experience slow response or disconnections, for which we apologize. We are working to deal with the problems and will keep you advised of the situation. In the meantime we thank our users for your patience and support. Making it possible for you to access to the internet and to bypass internet firewalls during hard times is why we have created Ultrasurf and why we are working so hard to expand, improve and protect its service. Ultrasurf Team Ultrasurf is a product of Ultrareach Internet Corporation. Originally created to help internet users in China find security and freedom online, Ultrasurf has now become one of the world’s most popular anti-censorship, pro-privacy software, with millions of people using it to bypass internet censorship and protect their online privacy. [URL='http://www.your-freedom.net/'][B]Your Freedom[/B][/URL] The Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don’t need to know. Pro: Simple, extensive manual – Con: Focused on bypassing firewall not security of the user [URL='http://en.wikipedia.org/wiki/Virtual_private_network'][B]VPN[/B][/URL] A virtual private network (VPN) is a computer network that is constructed by using public networks or wires such as Internet to provide remote offices or individual users to get secure access to their organization’s network. Source (Home link): [B][URL='https://freedomhouse.org/']Freedom House[/URL] Concluding recommendations[/B] In closing, we draw your attention to the following recommendations from the Freedom House report: - Many users prefer to have tools that perform at fast speeds. These are, however, not always the most secure options. It is important to understand the risks you potentially face when you attempt to circumvent your country’s blocking infrastructure. - Many users seem to think that when they do things quickly, the government may not notice. This is not true most of the time, however. If the government is able to intercept your internet connection, they will be able to see what you were doing afterwards. - While these tools may be able to hide what you are doing online, they cannot hide that a circumvention tool is being used. If your government can intercept your internet traffic, they will also be able to detect that you were circumventing their blocking infrastructure. We wish you safe surfing and hope your government will consider providing free and unfiltered internet access to your country in the near future. For the full report and a discussion of all the tools mentioned here, please visit the Freedom House website." _________________________________________________________________ [SIZE=5]Some interesting links for you: Freedom of Speech - Human Rigts Freedom of Speech[/SIZE]: on [URL='http://bestoflearn.blogspot.fr']Best Of Learn[/URL]: [URL='http://bestoflearn.blogspot.fr/2017/10/freedom-of-speech-human-rights-freedom.html']Freedom Of Speech - Human Rights Freedom Of Speech[/URL] "Give me the liberty to know, to utter, and to argue freely according to conscience, above all liberties." - but this article cannot be copied... [SIZE=5][B]To Achieve Freedom for Iran and the Arab Nations, the Region Must Unite[/B][SIZE=4]: on globalvoices.org: [URL='https://globalvoices.org/2018/01/21/to-achieve-freedom-for-iran-and-the-arab-nations-the-region-must-unite/']To Achieve Freedom for Iran and the Arab Nations, the Region Must Unite · Global Voices[/URL] - Posted [URL='https://globalvoices.org/2018/01/21/']21 January 2018[/URL][/SIZE][/SIZE] [SIZE=5][SIZE=4]- so the home page of globalvoices.org: [URL='https://globalvoices.org/']Global Voices · Citizen media stories from around the world[/URL][/SIZE][/SIZE] [/QUOTE]
Insert quotes…
Verification
Post reply
Top