Back to Results
First PageMeta Content
Computing / Ultrasurf / Internet ethics / Internet privacy / Psiphon / Freegate / Tor / Anonymizer / Internet censorship circumvention / Internet censorship / Privacy / Internet


Ten things to look for in a circumvention tool Roger Dingledine The Tor Project Originally prepared for the March 2010 “Index on Censorship”, then adapted for the July 2010 “China Rights Forum”
Add to Reading List

Document Date: 2015-04-15 11:12:57


Open Document

File Size: 300,72 KB

Share Result on Facebook

Company

Youtube / Yahoo / Facebook / Creative Commons / /

Continent

America / /

Country

Turkey / United States / Saudi Arabia / Vietnam / Myanmar / China / Iran / /

Facility

Berkman Center / /

IndustryTerm

times systems / circumvention tool / network communications / normal web browser / sustainable network / Internet-based circumvention software / encrypted web browsing / secure tools / Internet use / huge media / client software / tool operator / given tool / backbone Internet providers / foreign law enforcement / software development strategy / web browser / safer tool / web request / crypto algorithms / social networks / tool / law enforcement / software updates / extra client software / software maintenance / A lot of tools / server-side software / circumvention tools / client-side software / privacy tool / /

OperatingSystem

Microsoft Windows / /

Organization

Berkman Center / Electronic Frontier Foundation / United States Navy / /

Person

Roger Dingledine / Hal Roberts / Tor / /

Position

project leader / author / /

PublishedMedium

Index on Censorship / /

Technology

encryption / cryptography / why crypto algorithms / Java / firewall / ISP / SSL / operating systems / Flash / /

URL

http /

SocialTag