Censorship

Results: 6182



#Item
11Internet privacy / Internet censorship / Computing / Digital rights / Information and communications technology / Internet security / Firewall software / Great Firewall / Proxy server / Deep packet inspection / Censorship / DNS hijacking

Proceedings on Privacy Enhancing Technologies ; ):37–61 Sheharbano Khattak*, Tariq Elahi*, Laurent Simon, Colleen M. Swanson, Steven J. Murdoch, and Ian Goldberg SoK: Making Sense of Censorship Resistance Syst

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:22
12Computing / Internet privacy / Software / Technology / Internet censorship / Text messaging / Email / Internet censorship circumvention / Freenet / Deep packet inspection / Steganography / SMS

Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-06-03 17:05:03
13

A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1 University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

Add to Reading List

Source URL: sheharbano.com

Language: English - Date: 2017-02-16 07:58:15
    14Computing / Information and communications technology / Internet architecture / Information Age / Firewall software / Internet censorship / Computer network security / Great Firewall / Content-control software / Localhost / Firewall / Router

    Inferring Mechanics of Web Censorship Around the World John-Paul Verkamp Minaxi Gupta School of Informatics and Computing, Indiana University

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    15Computing / Internet / Internet protocols / Network architecture / Internet privacy / Internet security / Internet Standards / Network protocols / Hypertext Transfer Protocol / SOCKS / HTTP cookie / World Wide Web

    Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak

    Add to Reading List

    Source URL: www.usenix.org

    Language: English - Date: 2016-02-20 04:48:06
    16Computing / Software / Video game publishers / Economy of China / Entertainment Software Association / Online marketplaces / E-commerce / ITunes / App Store / Google Play / WeChat / Nintendo

    Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Jeffrey Knockel1,2 , Lotus Ruan1 , and Masashi Crete-Nishihata1 1 Citizen Lab, Munk School of Global Affairs, University of Toronto

    Add to Reading List

    Source URL: www.usenix.org

    Language: English
    17Computing / Internet privacy / Digital rights / Proxy servers / Internet censorship / Internet / Secure communication / Great Firewall / Internet censorship circumvention / Telex / Tor / Flash proxy

    1 SoK: Towards Grounding Censorship Circumvention in Empiricism Michael Carl Tschantz∗ , Sadia Afroz∗ , Anonymous‡ , and Vern Paxson∗† ∗ International Computer Science Institute

    Add to Reading List

    Source URL: internet-freedom-science.org

    Language: English - Date: 2016-04-13 13:52:54
    18Internet in Egypt / Internet censorship / Deep packet inspection / Telecom Egypt / Ministry of Communications and Information Technology / Economy of Africa / Information and communications technology / Economy of Egypt / Internet censorship and surveillance by country / Internet censorship in Tunisia

    The State of Internet Censorship in Egypt A research study by: Open Observatory of Network Interference (OONI) Association for Freedom of Thought and Expression (AFTE)

    Add to Reading List

    Source URL: ooni.torproject.org

    Language: English - Date: 2018-10-19 07:05:34
    19

    CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content John Holowczak and Amir Houmansadr College of Information and Computer Sciences University of Massachusetts Amherst

    Add to Reading List

    Source URL: people.cs.umass.edu

    Language: English - Date: 2015-10-13 19:56:51
      20Computing / Transmission Control Protocol / Network architecture / Information and communications technology / Handshaking / Computer architecture / Computer network security / Computer security

      Towards  illumina.ng  a  Censorship   Monitor’s  Model  to  Facilitate   Evasion   Sheharbano  Kha>ak*,  Mobin  Javed,  Philip  D.  Anderson*  and     Vern  P

      Add to Reading List

      Source URL: sheharbano.com

      Language: English - Date: 2017-02-16 07:58:43
      UPDATE