|
- CloudTransport: Using Cloud Storage for Censorship-Resistant Networking
Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recognize and block, and once the censors identify network servers (e g , Tor bridges) assisting in circumvention, they can locate all of their users CloudTransport is a new censorship-resistant
- How Proxies Are Bridging Global Internet Access: From Mars to Earth
Conclusion Inspired by universal internet access, many companies have emerged as indispensable providers of proxies, tools for bridging the digital divide They help one overcome geo-restrictions and bypass government censorship Individuals and businesses will be able to connect with others and explore new opportunities
- bitnost. re - bridging decentralized AI into censorship resistant social . . .
bitnost re - bridging decentralized AI into censorship resistant social networking bitnost re is bridging bittensor’s neutral, open, permissionless, and decentralized AI into Nostr’s censorship resistant social media protocol, building an access backbone for a neutral AI interaction bitnost re also refers to the term “glasnost” which stands for openness and transparency in the public
- Tor’s new WebTunnel bridges mimic HTTPS traffic to evade censorship
The Tor Project officially introduced WebTunnel, a new bridge type specifically designed to help bypass censorship targeting the Tor network by hiding connections in plain sight
- Collateral Freedom, a solution for media outlets to bypass censorship . . .
Expanding the toolkit It is in the power of journalists and media outlets to make their content accessible in the face of censorship They can also use Tor onion services to mirror their website (s): Tor services provide the most censorship-resistant network, because no government can detect the connection or block access to it
- About - Layerswap
The protocol should embody the principles of being permissionless, trustless, and censorship-resistant without compromise We are committed to building a protocol that will serve as the cornerstone for free and open inter-network asset transactions
- USENIX24 Talks - diwenx. com
Bridging Barriers: A Survey of Challenges and Priorities in the Censorship Circumvention Landscape Diwen Xue*, Anna Ablove*, Reethika Ramesh Grace Kwak Danciu, Roya Ensafi University of Michigan
- A toolkit for our fragmented future - apc. org
Tor routes traffic through a network of volunteer-run servers, obfuscating user locations and enabling censorship-resistant browsing Outline VPN, developed by Jigsaw, is an open-source tool that allows users to create and manage their own VPN servers
|
|
|