Tool and Techniques to Bypass Internet Filtration
Keywords:
Censorship, Network, Technique.Abstract
A key component for any censorship resistant system or circumvention technology is to ensure privacy by enabling users to communicate undetected in a censorship network. This is often accomplished by incorporating certain techniques such as pseudonymity and anonymity into the system. However, previous research suggests that current techniques to ensure privacy still reveal a significant amount of identifying information [1]. In addition to addressing the limitations for ensuring privacy using tools other research has introduces four properties: anonymity ,unlink ability, unobserved ability and pseudonymity, and a set of anonymity metrics, which can be used to improve the design and evaluation of censorship resistant systems [2].
References
- J. R.Rao and P.Rohatgi.Can pseudonymity really guarantee privacy? In Proceedings of the Ninth USENIX Security Symposium, pages 85–96.USENIX, Aug.2000.<http://www.usenix.org/publications/library/proceedings/sec2000/full_ papers/rao/rao.pdf>.
- George Danezis and Claudia Diaz.A survey of anonymous communication channels.Technical Report MSRTR-2008-35, Microsoft Research, January 2008.
- George Danezis and Ross Anderson.The economics of censorship resistance.In The Third Annual Workshop on Economics and Information Security (WEIS04),2004.
- Roberts et al,"2007 Circumvention Landscape Report: Methods, Uses, and Tools," The Berkman Center for Internet & Society at Harvard University, March 2009
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.