Table of Contents Introduction

Table of Contents Introduction

Table of Contents Introduction.........................................................................................................................................................1 More information in more places than ever imagined.............................................................................1 Not everyone wants to let the whole world in.........................................................................................1 Who is filtering or blocking the Internet?................................................................................................2 Filtering leads to monitoring....................................................................................................................2 When is it censorship?.............................................................................................................................2 Who exactly is blocking my access to the Internet?...............................................................................3 What methods exist to bypass filtering?..................................................................................................3 What are the risks of using circumvention tools?....................................................................................3 About This Manual.............................................................................................................................................4 What is Sesawe?......................................................................................................................................4 Authors.....................................................................................................................................................4 1. Register................................................................................................................................................4 2. Contribute!...........................................................................................................................................5 3. Chat......................................................................................................................................................5 4. Mailing List..........................................................................................................................................5 Bypassing Internet Filtering..............................................................................................................................6 Circumvention Providers.........................................................................................................................6 Circumvention Users..............................................................................................................................6 Am I Being Blocked or Filtered?.......................................................................................................................7 Detection and Anonymity...................................................................................................................................8 An important warning..............................................................................................................................8 How the Internet Works...................................................................................................................................10 Connecting to the Internet......................................................................................................................10 Visiting a Web site.................................................................................................................................10 Why This Matters..................................................................................................................................12 Who Controls the Net?.....................................................................................................................................13 Government involvement.......................................................................................................................13 Why This Matters..................................................................................................................................13 Filtering Techniques........................................................................................................................................14 URL Filtering.........................................................................................................................................14 DNS Filtering.........................................................................................................................................14 IP Filtering.............................................................................................................................................15 Port blocking..........................................................................................................................................15 Why This Matters..................................................................................................................................16 Simple Tricks.....................................................................................................................................................17 Using third-party sites............................................................................................................................17 Cached Pages..................................................................................................................................17 RSS Aggregators.............................................................................................................................17 Translators.......................................................................................................................................18 Low-Bandwidth Filters...................................................................................................................19 Using Alternative Domain Servers or Names........................................................................................19 Alternate Domain Names................................................................................................................20 Alternative DNS Servers.................................................................................................................20 Using e-mail services.............................................................................................................................20 Accessing web pages through e-mail..............................................................................................20 i Table of Contents Simple Tricks Using Web mail to share documents...............................................................................................21 Advantages and Risks...........................................................................................................................21 What is a Web Proxy?......................................................................................................................................22 Advantages and Risks............................................................................................................................23 Using PHProxy..................................................................................................................................................24 Where can I access PHProxy?...............................................................................................................24 How does it work?.................................................................................................................................24 Advanced options..................................................................................................................................25 Using psiphon....................................................................................................................................................27 Connecting to a psiphon Proxy..............................................................................................................27 Adding an SSL Exception......................................................................................................................27 If you're concerned about privacy...................................................................................................28 Logging in to the Proxy.........................................................................................................................29 Browsing via the Proxy..........................................................................................................................29 Using psiphon 2.................................................................................................................................................31 How to get a psiphon2 account........................................................................................................................32 Use an invitation link to register............................................................................................................32 Accept the SSL error message.........................................................................................................32 SSL-Error with Internet Explorer 6..........................................................................................32

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    160 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us