<<

KEYWORD INDEX 2FA. See Two-factor algorithm, 50 Heteronomy, 79 L 3GPP. See 3rd Generation Partnership Project Key, 50 Hostname, 42 LACNIC. See Regional registry 3rd Generation Partnership Project, 98 Passphrase, 51 HTTP. See Hypertext Transfer Protocol LAN. See Local network 5G, 98 Private key, 51 HTTP header, 46 LIR. See Local internet registry Public key, 51 HTTPS. See Secure HTTP Local Internet registry, 23 A Signing data, 50 HTTP status code, 46 Local network, 20 Address tag, 13 Symmetric , 51 Hypertext, 46 Logical layer, 82, 90 AFRINIC. See Regional internet registry Cybernetics, 74 Algorithm, 74 I M Cybernetic systems, 74 Algorithmic journalism, 76 IAB. See Internet Architecture Board MAC address. See Media Access Control address Anonymity, 66 D IANA. See Internet Assigned Numbers Authority Machine-in-the-middle, 55 APNIC. See Regional internet registry , 69 ICANN. See Internet Corporation for Assigned Names and Machine-learning techniques, 78 Application Layer, 82 Datagram, 35 Numbers Man-in-the-middle. See Machine-in-the-middle ARIN. See Regional internet registry DDoS. See Denial of service IEEE. See Institute of Electrical and Electronics Engineers Media Access Control address, 8 AS. See Autonomous system , 59 IETF. See Internet Engineering Task Force MITM. See Machine-in-the-middle Automation, 78 Denial of service, 25, 96 IGF. See Internet Governance Forum Mobile Transaction Number, 55 Autonomous system, 30 Device ID. See Media Access Control address Infrastructural layer, 82, 88 mTAN. See Mobile Transaction Number DHCP. See Dynamic Host Configuration Protocol Institute of Electrical and Electronics Engineers, 19, 89, 90, Multistakeholder model, 102 B DNS. See 104 Backdoor, 54 N DNS blocking, 59, 67 International Organization for Standardization, 19, 83, 89 BGP. See Name server, 44 DNS over HTTPS, 45, 48 International Telecommunication Union, 19, 90, 98, 104 BGP , 31 NAT. See Network Address Translation DNS proxy, 67 International Telecommunication Union Standardization Big Five, 96 NCUC. See NonCommercial Users Constituency DNSSEC. See DNS Security Extensions Sector, 19 Binary data, 14 Neighbor, 31 DNS Security Extensions, 45 Internet Architecture Board, 88 Binary digit (bit), 21 Network Address Translation, 21 DOH. See DNS over HTTPS Internet Assigned Numbers Authority, 23, 89, 97 Blocking, 58 Network card, 8 Domain name, 42 Internet Corporation for Assigned Names and Numbers, 43, Border Gateway Protocol, 31 Network neutrality, 58 Domain Name System, 42 89, 90, 97, 103, 105 Byte, 21 Network shutdowns, 60 Domain zone, 43 Internet Engineering Task Force, 19, 88, 97, 104 Network types, 7 C DoS. See Denial of service Internet exchange point, 33 Centralized network, 7 CA. See Certificate authority , 53 Internet governance, 86, 87, 102 Decentralized network, 7 Cache, 44 DPI. See Deep Packet Inspection Internet Governance Forum, 91, 105 Distributed network, 7 ccTLD. See Country code top-level domain Dynamic Coalitions, 105 Internet Protocol, 20 Noncommercial Users Constituency, 105 CDN. See Content delivery network Dynamic Host Configuration Protocol, 9 Dynamic address, 23 Censorship, 58 IPv4 Address, 21 O E Censorship circumvention, 67 IPv6 Address, 22 Octet, 21 End-to-end encryption, 53 Censorship monitoring, 64 Public and private IP address, 20 Off-The-Record, 53 Centralization, 97 F Static address, 23 .onion, 70 Certificate, 48 FAANG, 96 Internet Protocol Security, 25 The Onion Router. See Certificate authority, 48, 52 Filter bubble, 77 Internet Research Task Force, 88 On-path attacker, 55 Client, 7 Filtering, 58 Internet service provider, 23 OpenPGP, 53 Cloud, 5, 53, 97 Fingerprinting, 66 Internet Society, 89 OSI model, 83 Connection ID, 38 First level of automation, 78 IP. See Internet Protocol OTR. See Off-the-Record Content delivery network, 95 Forward secrecy, 53 IP blocking, 58 P Content filter, 76 Frequency modulation, 15 IP routing, 24 Packet, 13, 14 Content filtering, 58 IPSec. See Internet Protocol Security G Packet Filter, 59 Content layer, 82, 91 IP spoofing, 25 Generic top-level domain, 43 Packet header, 13 Country code top-level domain, 43 IRTF. See Internet Research Task Force Golden key, 54 Peering, 32 Cryptography, 50 ISO. See International Organization for Standardization GPG, 53 Pipe, 36 Asymmetric cryptography, 51 ISOC. See Internet Society Great of China, 60 Port, 35 Authentication, 50 ISP. See Internet service provider gTLD. See Generic top-level domain Port number, 35 Cipher, 50 ITU. See International Telecommunication Union Predictive policing, 76 Decryption, 50 H ITU-T. See International Telecommunication Union Protocol, 19 Encryption, 50 Handshake, 37 Standardization Sector Proxy, 67 Hardware address, 8 IXP. See Internet exchange point

104 Keyword Index Keyword Index 105 2FA. See Two-factor authentication Encryption algorithm, 50 Heteronomy, 79 L 3GPP. See 3rd Generation Partnership Project Key, 50 Hostname, 42 LACNIC. See Regional internet registry 3rd Generation Partnership Project, 98 Passphrase, 51 HTTP. See Hypertext Transfer Protocol LAN. See Local network 5G, 98 Private key, 51 HTTP header, 46 LIR. See Local internet registry Public key, 51 HTTPS. See Secure HTTP Local Internet registry, 23 A Signing data, 50 HTTP status code, 46 Local network, 20 Address tag, 13 Symmetric cryptography, 51 Hypertext, 46 Logical layer, 82, 90 AFRINIC. See Regional internet registry Cybernetics, 74 Algorithm, 74 I M Cybernetic systems, 74 Algorithmic journalism, 76 IAB. See Internet Architecture Board MAC address. See Media Access Control address Anonymity, 66 D IANA. See Internet Assigned Numbers Authority Machine-in-the-middle, 55 APNIC. See Regional internet registry Darknet, 69 ICANN. See Internet Corporation for Assigned Names and Machine-learning techniques, 78 Application Layer, 82 Datagram, 35 Numbers Man-in-the-middle. See Machine-in-the-middle ARIN. See Regional internet registry DDoS. See Denial of service IEEE. See Institute of Electrical and Electronics Engineers Media Access Control address, 8 AS. See Autonomous system Deep Packet Inspection, 59 IETF. See Internet Engineering Task Force MITM. See Machine-in-the-middle Automation, 78 Denial of service, 25, 96 IGF. See Internet Governance Forum Mobile Transaction Number, 55 Autonomous system, 30 Device ID. See Media Access Control address Infrastructural layer, 82, 88 mTAN. See Mobile Transaction Number DHCP. See Dynamic Host Configuration Protocol Institute of Electrical and Electronics Engineers, 19, 89, 90, Multistakeholder model, 102 B DNS. See Domain Name System 104 Backdoor, 54 N DNS blocking, 59, 67 International Organization for Standardization, 19, 83, 89 BGP. See Border Gateway Protocol Name server, 44 DNS over HTTPS, 45, 48 International Telecommunication Union, 19, 90, 98, 104 BGP router, 31 NAT. See Network Address Translation DNS proxy, 67 International Telecommunication Union Standardization Big Five, 96 NCUC. See NonCommercial Users Constituency DNSSEC. See DNS Security Extensions Sector, 19 Binary data, 14 Neighbor, 31 DNS Security Extensions, 45 Internet Architecture Board, 88 Binary digit (bit), 21 Network Address Translation, 21 DOH. See DNS over HTTPS Internet Assigned Numbers Authority, 23, 89, 97 Blocking, 58 Network card, 8 Domain name, 42 Internet Corporation for Assigned Names and Numbers, 43, Border Gateway Protocol, 31 Network neutrality, 58 Domain Name System, 42 89, 90, 97, 103, 105 Byte, 21 Network shutdowns, 60 Domain zone, 43 Internet Engineering Task Force, 19, 88, 97, 104 Network types, 7 C DoS. See Denial of service Internet exchange point, 33 Centralized network, 7 CA. See Certificate authority Double Ratchet Algorithm, 53 Internet governance, 86, 87, 102 Decentralized network, 7 Cache, 44 DPI. See Deep Packet Inspection Internet Governance Forum, 91, 105 Distributed network, 7 ccTLD. See Country code top-level domain Dynamic Coalitions, 105 Internet Protocol, 20 Noncommercial Users Constituency, 105 CDN. See Content delivery network Dynamic Host Configuration Protocol, 9 Dynamic address, 23 Censorship, 58 IPv4 Address, 21 O E Censorship circumvention, 67 IPv6 Address, 22 Octet, 21 End-to-end encryption, 53 Censorship monitoring, 64 Public and private IP address, 20 Off-The-Record, 53 Centralization, 97 F Static address, 23 .onion, 70 Certificate, 48 FAANG, 96 Internet Protocol Security, 25 The Onion Router. See Tor Certificate authority, 48, 52 Filter bubble, 77 Internet Research Task Force, 88 On-path attacker, 55 Client, 7 Filtering, 58 Internet service provider, 23 OpenPGP, 53 Cloud, 5, 53, 97 Fingerprinting, 66 Internet Society, 89 OSI model, 83 Connection ID, 38 First level of automation, 78 IP. See Internet Protocol OTR. See Off-the-Record Content delivery network, 95 Forward secrecy, 53 IP blocking, 58 P Content filter, 76 Frequency modulation, 15 IP routing, 24 Packet, 13, 14 Content filtering, 58 IPSec. See Internet Protocol Security G Packet Filter, 59 Content layer, 82, 91 IP spoofing, 25 Generic top-level domain, 43 Packet header, 13 Country code top-level domain, 43 IRTF. See Internet Research Task Force Golden key, 54 Peering, 32 Cryptography, 50 ISO. See International Organization for Standardization GPG, 53 Pipe, 36 Asymmetric cryptography, 51 ISOC. See Internet Society of China, 60 Port, 35 Authentication, 50 ISP. See Internet service provider gTLD. See Generic top-level domain Port number, 35 Cipher, 50 ITU. See International Telecommunication Union Predictive policing, 76 Decryption, 50 H ITU-T. See International Telecommunication Union Protocol, 19 Encryption, 50 Handshake, 37 Standardization Sector Proxy, 67 Hardware address, 8 IXP. See Internet exchange point

104 Keyword Index Keyword Index 105 Pseudonymity, 67 TLS Certificate. See Certificate Top-level domain, 42, 43 Q Tor, 68, 69, 70, 71 QUIC. See Quick UDP Internet Connections Bridge, 69 Quick UDP Internet Connections, 19, 38, 48 Descriptor message, 68 R Entry node, 69 Random MAC Address, 8 Exit node, 68, 69, 71 Regional internet registry, 23 Hops, 68 Registrant, 42 Introduction message, 70 Registrar, 42 Introduction point, 70 Registry, 42, 43, 89, 90 Onion Service, 70 Requests for Comments (RFC), 88 OnionShare, 71 Resolve, 44 Packet tag, 68 RIPE NCC. See Regional internet registry Relays, 68 RIR. See Regional internet registry Rendezvous point, 70 Root zone, 43 , 71 Router, 6 TorBrowser, 71 Tor circuit, 68, 69 S Tor nodes, 68 Scoring system, 76 Tor network, 68 Second-level name, 42 Traffic analysis, 71 Second level of automation, 78 Transit, 32 Secure HTTP, 47 Transmission Control Protocol, 19, 36, 46 Server, 7 Transparency report, 65 Server Name Indication, 49 Transport encryption, 52 SNI. See Server Name Indication , 48, 52 Social layer, 82, 91 Two-factor authentication, 55 Software algorithm, 74 SSL. See Transport Layer Security U Stream, 36 UDP. See Subdomain zone, 43 Unique local address (ULA), 22 Surveillance, 76 URL filtering, 58 User Datagram Protocol, 19, 35 T Targeted advertising, 76 V Targeted traffic analysis, 71 Virtual , 67 TCP. See Transmission Control Protocol Voice over IP, 35 Telco CDN, 95 VoIP. See Voice over IP Throttling, 58 VPN. See Virtual private network TLD. See Top-level domain Z TLD zone, 43, 45 Zone, 43 TLS. See Transport Layer Security

106 Keyword Index