Table of Contents Introduction
Total Page:16
File Type:pdf, Size:1020Kb
Table of Contents Introduction.........................................................................................................................................................1 More information in more places than ever imagined.............................................................................1 Not everyone wants to let the whole world in.........................................................................................1 Who is filtering or blocking the Internet?................................................................................................2 Filtering leads to monitoring....................................................................................................................2 When is it censorship?.............................................................................................................................2 Who exactly is blocking my access to the Internet?...............................................................................3 What methods exist to bypass filtering?..................................................................................................3 What are the risks of using circumvention tools?....................................................................................3 About This Manual.............................................................................................................................................4 What is Sesawe?......................................................................................................................................4 Authors.....................................................................................................................................................4 1. Register................................................................................................................................................4 2. Contribute!...........................................................................................................................................5 3. Chat......................................................................................................................................................5 4. Mailing List..........................................................................................................................................5 Bypassing Internet Filtering..............................................................................................................................6 Circumvention Providers.........................................................................................................................6 Circumvention Users..............................................................................................................................6 Am I Being Blocked or Filtered?.......................................................................................................................7 Detection and Anonymity...................................................................................................................................8 An important warning..............................................................................................................................8 How the Internet Works...................................................................................................................................10 Connecting to the Internet......................................................................................................................10 Visiting a Web site.................................................................................................................................10 Why This Matters..................................................................................................................................12 Who Controls the Net?.....................................................................................................................................13 Government involvement.......................................................................................................................13 Why This Matters..................................................................................................................................13 Filtering Techniques........................................................................................................................................14 URL Filtering.........................................................................................................................................14 DNS Filtering.........................................................................................................................................14 IP Filtering.............................................................................................................................................15 Port blocking..........................................................................................................................................15 Why This Matters..................................................................................................................................16 Simple Tricks.....................................................................................................................................................17 Using third-party sites............................................................................................................................17 Cached Pages..................................................................................................................................17 RSS Aggregators.............................................................................................................................17 Translators.......................................................................................................................................18 Low-Bandwidth Filters...................................................................................................................19 Using Alternative Domain Servers or Names........................................................................................19 Alternate Domain Names................................................................................................................20 Alternative DNS Servers.................................................................................................................20 Using e-mail services.............................................................................................................................20 Accessing web pages through e-mail..............................................................................................20 i Table of Contents Simple Tricks Using Web mail to share documents...............................................................................................21 Advantages and Risks...........................................................................................................................21 What is a Web Proxy?......................................................................................................................................22 Advantages and Risks............................................................................................................................23 Using PHProxy..................................................................................................................................................24 Where can I access PHProxy?...............................................................................................................24 How does it work?.................................................................................................................................24 Advanced options..................................................................................................................................25 Using psiphon....................................................................................................................................................27 Connecting to a psiphon Proxy..............................................................................................................27 Adding an SSL Exception......................................................................................................................27 If you're concerned about privacy...................................................................................................28 Logging in to the Proxy.........................................................................................................................29 Browsing via the Proxy..........................................................................................................................29 Using psiphon 2.................................................................................................................................................31 How to get a psiphon2 account........................................................................................................................32 Use an invitation link to register............................................................................................................32 Accept the SSL error message.........................................................................................................32 SSL-Error with Internet Explorer 6..........................................................................................32