Поддерживать
www.wikidata.ru-ru.nina.az
Obhod internet cenzury ispolzovanie razlichnyh metodov dlya togo chtoby obojti ogranicheniya internet cenzury Dlya obhoda cenzury ispolzuyutsya raznye metody Vse oni otlichayutsya razlichnoj prostotoj ispolzovaniya skorostyu bezopasnostyu i riskami Nekotorye metody takie kak ispolzovanie alternativnyh DNS serverov pozvolyayut izbezhat blokirovki ispolzuya libo alternativnyj adres libo neskolko adresov Metody ispolzuyushie zerkala veb sajtov ili sajty s arhivami Interneta osnovany na tom chto kopii sajta mogut byt dostupny na razlichnyh sajtah Krome togo sushestvuyut sposoby osnovannye na poluchenii dostupa k internet soedineniyu kotoroe ne cenzuriruetsya Chasto ono nahoditsya v drugoj yurisdikcii na kotoruyu ne rasprostranyayutsya zakony o cenzure Dlya etogo ispolzuyutsya proksi servera virtualnye chastnye seti ili anonimiziruyushie seti Mezhdu cenzorami i razrabotchikami programm dlya obhoda cenzury proizoshla gonka vooruzhenij chto privelo k sozdaniyu bolee slozhnyh metodov blokirovaniya sajtov cenzorami i razrabotke novyh metodov obhoda cenzury Obhod cenzury mozhet povlech problemy Tak eto problemy yuzabiliti trudnosti s poiskom nadezhnoj i dostovernoj informacii o tom kak obojti cenzuru otsutstvie zhelaniya poluchit dostup k cenzurirovannomu kontentu Obhod cenzury mozhet privesti k narusheniyu zakona i yavlyatsya krajne seryoznym prestupleniem Metody obhoda cenzurySushestvuet metody kotorye pozvolyayut obojti cenzuru Oni razlichayutsya po takim pokazatelyam kak slozhnost nastrojki effektivnost pri obhode cenzury sposobnost ostatsya nezamechennym pri obhodeAlternativnye adresa Cenzory mogut blokirovat opredelyonnye domennye imena ispolzuya perehvat DNS ili filtraciyu URL Poetomu sajty inogda mogut dostupny po alternativnym ssylkam kotorye ne mogut byt zablokirovany Nekotorye veb sajty mogut predlagat odin i tot zhe kontent na neskolkih stranicah ili na neskolkih domennyh imenah Naprimer russkaya Vikipediya dostupna po adresu https ru wikipedia org a mobilnaya versiya po adresu https ru m wikipedia org Takzhe inogda vozmozhno poluchit dostup k sajtu napryamuyu cherez ego IP adres Ispolzovanie alternativnyh DNS serverov mozhet pomoch obojti blokirovku na osnove DNS Cenzory mogut blokirovat opredelyonnye IP adresa V zavisimosti ot togo kak realizovana filtraciya mozhet byt vozmozhno ispolzovat tot zhe IP adres drugim sposobom Naprimer sleduyushie URL adresa vedut na odnu i tu zhe stranicu hotya ne vse brauzery ih raspoznayut desyatichnyj adres s tochkami desyatichnyj adres vosmerichnyj s tochkami shestnadcaterichnyj i shestnadcaterichnyj s tochkami Zerkala kesh i kopii Keshirovannye stranicy Nekotorye poiskovye sistemy hranyat kopii ranee proindeksirovannyh veb stranic v keshe Oni chasto hranyatsya poiskovikom i ne mogut byt zablokirovany Naprimer Google razreshaet izvlechenie keshirovannyh stranic dlya etogo vvodyat cache some url v kachestve poiskovogo zaprosa Zerkala i sajty arhivy Kopii veb sajtov ili stranic mogut byt dostupny na sajtah zerkalah ili na arhivnyh sajtah naprimer v arhive Interneta Agregatory RSS takie kak Feedly pozvolyayut chitat RSS kanaly kotorye zablokirovany iz za cenzury Proksi servery Veb proksi Sajty proksi nastroeny tak chtoby polzovateli mogli zagruzhat veb stranicy cherez proksi server Takim obrazom stranica postupaet iz proksi servera a ne iz zablokirovannogo istochnika Odnako v zavisimosti ot togo kak nastroen proksi server cenzor mozhet opredelit chto stranica byla zagruzhena i chto ispolzovalsya proksi Naprimer mobilnyj brauzer Opera Mini ispolzuet proksi server ispolzuyushij shifrovanie i szhatie dlya uskoreniya zagruzki Eto imeet pobochnyj effekt s pomoshyu takogo servera mozhno obhodit cenzuru V 2009 godu eto privelo k tomu chto pravitelstvo Kitaya zapretilo vse versii brauzera krome specialnyh kitajskih Frontirovanie domena Programmnoe obespechenie mozhet ispolzovat frontirovanie domena pri kotorom proishodit skrytie naznacheniya soedineniya putem peredachi nachalnyh zaprosov cherez set dostavki kontenta ili drugoj populyarnyj sajt Etot metod ispolzovalsya messendzherami vklyuchaya Signal i Telegram no krupnye oblachnye provajdery takie kak Amazon Web Services i Google Cloud zapretili ego ispolzovat Tunnelirovanie ustanoviv tunnel SSH polzovatel mozhet peresylat ves svoj trafik po zashifrovannomu kanalu poetomu kak ishodyashie zaprosy na zablokirovannye sajty tak i otvety ot etih sajtov skryty ot cenzorov viden lish nechitaemyj trafik SSH Virtualnaya chastnaya set Ispolzuya VPN virtualnuyu chastnuyu set polzovatel kotoryj hochet obojti cenzuru mozhet sozdat soedinenie s bolee liberalnoj stranoj i prosmatrivat Internet kak budto on nahoditsya v etoj strane Nekotorye VPN predlagayutsya za ezhemesyachnuyu platu drugie rabotayut za schyot reklamy Po dannym GlobalWebIndex bolee 400 millionov chelovek ispolzuyut virtualnye chastnye seti chtoby obojti cenzuru ili povysit uroven konfidencialnosti Tor Tor marshrutiziruet zashifrovannyj trafik cherez neskolko serverov chtoby uslozhnit otslezhivanie V nekotoryh sluchayah ego mozhno ispolzovat chtoby izbezhat cenzury Informaciya o tom kak obojti blokirovku Tor Obfuskaciya trafika Cenzor mozhet zablokirovat instrumenty kotorye prednaznacheny dlya obhoda cenzury Predprinimayutsya popytki sdelat instrumenty obhoda menee zametnymi dlya cenzorov s pomoshyu randomizirovaniya trafika popytki imitirovat neblokiruemoe soedinenie ili s pomoshyu tunnelirovaniya trafika cherez sluzhbu vklyuchennuyu v belyj spisok s ispolzovaniem frontirovaniya domenov Tor i drugie instrumenty obhoda ispolzuyut neskolko metodov shifrovaniya trafika kotorye polzovateli mogut ispolzovat v zavisimosti ot ih soedineniya Ih inogda nazyvayut pluggable transports Floppinet Floppinet eto peredacha kompyuternyh fajlov s pomoshyu peremesheniya nositelej informacii mezhdu kompyuterami Floppinet ne ispolzuet set poetomu na nego ne rasprostranyaetsya cenzura Odnim iz primerov shiroko rasprostranennoj floppinet seti yavlyaetsya na Kube Ispolzovanie instrumentov obhodaV otvet na popytki cenzury proishodit uvelichenie populyarnosti instrumentov obhoda Odnako issledovaniya sravnivayushie uroven ih ispolzovaniya v stranah gde cenzuriruetsya internet pokazyvayut smeshannye rezultaty Ispolzovanie v otvet na postoyannuyu cenzuru Rezultaty issledovanij razlichayutsya V 2010 godu Garvardskij universitet provel issledovanie kotoroe pokazalo chto ochen nemnogie polzovateli ispolzuyut instrumenty obhoda cenzury veroyatno menee 3 polzovatelej dazhe v teh stranah v kotoryh est cenzura Drugie issledovaniya soobshili o znachitelno bolshej populyarnosti instrumentov no byli osporeny V Kitae vozmozhno ispolzovanie instrumentov obhoda bolshe rasprostraneno v universitetah Odnako eti dannye ne podtverzhdeny Opros provedennyj Freedom House pokazal chto polzovateli kak pravilo mogut legko ispolzovat instrumenty dlya obhoda cenzury Issledovatelskaya firma GlobalWebIndex soobshila chto v Kitae bolee 35 millionov polzovatelej Twitter a i 63 milliona polzovatelej Facebook a hotya oba sajta zablokirovany Odnako eti ocenki byli osporeny reklamnaya platforma Facebook schitaet chto v Kitae 1 million polzovatelej Chto zhe kasaetsya Twitter a to po nekotorym ocenkam ego ispolzuyut 10 millionov chelovek Drugie issledovaniya ukazyvayut na to chto zaprety ispolzovaniya instrumentov dlya obhoda cenzury priveli k padeniyu ih ispolzovaniya Tak v set Tor ranee podklyuchalis 30 000 kitajcev no po sostoyaniyu na 2014 god v Tor e okolo 3 000 polzovatelej iz Kitaya V Tailande internet cenzura sushestvuet s 2002 goda filtraciya neposledovatelna Vo vremya oprosa 229 tajskih internet polzovatelej issledovatelskaya gruppa iz Universiteta Vashingtona obnaruzhila chto 63 oproshennyh polzovatelej pytalis ispolzovat instrumenty obhoda a 90 uspeshno ispolzovali eti instrumenty Polzovateli chasto prinimali resheniya ob ispolzovanii instrumentov obhoda osnovannye na ogranichennoj ili nenadezhnoj informacii Oni otmetili chto pri ispolzovanii instrumentov obhoda poyavlyayutsya ugrozy kak abstraktnye tak i te chto osnovany na lichnom opyte V otvet na blokirovku otdelnyh sajtov V otvet na blokirovku Twitter a v Turcii v 2014 godu rasprostranyalas informaciya o DNS serverah poskolku ispolzovanie drugogo DNS servera takogo kak Google Public DNS pozvolyalo ispolzovat Twitter Na sleduyushij den posle blokirovki obshee kolichestvo Twitter soobshenij napisannyh v Turcii vyroslo na 138 po dannym internet izmeritelnoj firmy Brandwatch Posle zapreta na ispolzovanie prilozheniya Telegram v Irane v aprele 2018 goda kolichestvo poiskovyh zaprosov v Internete svyazannyh s VPN i obhodom cenzury uvelichilos v 48 raz po nekotorym klyuchevym slovam Odnako inogda polzovateli zagruzhali nebezopasnye programmy Tret iranskih internet polzovatelej ispolzovala instrument Psiphon srazu posle blokirovki a v iyune 2018 goda ego prodolzhali ispolzovat do 3 5 mln chelovek Anonimnost riski i doverieObhod cenzury i anonimnost eto ne odno i to zhe Sistemy obhoda cenzury prednaznacheny dlya obhoda blokirovok no oni ne dayut anonimnosti Sistemy svyazannye s anonimnostyu zashishayut konfidencialnost polzovatelya I hotya oni mogut pomogat obhodit cenzuru eto ne yavlyaetsya ih osnovnoj funkciej Proksi sajty ne obespechivayut anonimnosti i mogut prosmatrivat i zapisyvat mestopolozhenie kompyuterov otpravlyayushih zaprosy a takzhe spisok poseshaemyh veb sajtov Naibolee nadezhnymi dlya obhoda cenzury yavlyayutsya sajty kotorye nahodyatsya u doverennyh tretih lic ne svyazany s cenzorami i ne sobirayut lichnye dannye Nailuchshimi yavlyayutsya sajty teh lyudej s kotorymi dannyj chelovek znakom lichno odnako chasto vybor mozhno sdelat tolko po otzyvam v Internete Zakon mozhet predusmatrivat obyazatelnoe raskrytie informacii vlastyam v sluchae podozrenij Obhod cenzury kotoryj mozhet privesti k narusheniyu zakona Vo mnogih stranah dostup k zablokirovannoj informacii yavlyaetsya sereznym prestupleniem v chastnosti mozhet nakazyvatsya zakonom dostup k detskoj pornografii informacii ugrozhayushej nacionalnoj bezopasnosti dostup k informacii svyazannoj s nasiliem Takim obrazom lyudi zhelayushie obojti cenzuru dolzhny ponimat kak imenno rabotaet tot ili inoj sposob zashity a takzhe ponimat chto za obhod cenzury gosudarstvo mozhet privlech k otvetstvennosti Pravozashitniki dissidenty protestnye ili reformatorskie gruppy pytayutsya prinyat mery dlya zashity konfidencialnosti v Internete odnako net nikakih garantij chto obhod cenzury ne budet yavlyatsya protivozakonnym Programmnoe obespechenieSushestvuet pyat osnovnyh tipov programmnogo obespecheniya dlya obhoda cenzury v Internete CGI proksi ispolzuyut skript rabotayushij na veb servere dlya vypolneniya funkcij proksi servera Proksi klient CGI otpravlyaet zaproshennyj URL adres na proksi server CGI Proksi server CGI izvlekaet informaciyu o sajte otpravlyaet svoj sobstvennyj HTTP zapros konechnomu poluchatelyu a zatem vozvrashaet rezultat proksi klientu Dlya bezopasnosti neobhodimo doverie k operatoru proksi servera Proksi instrumenty CGI ne trebuyut nastrojki brauzera ili ustanovki programmnogo obespecheniya no nuzhno ispolzovat alternativnyj interfejs vnutri sushestvuyushego brauzera HTTP proksi otpravlyayut HTTP zaprosy cherez promezhutochnyj proksi server Klient podklyuchayushijsya cherez HTTP proksi otpravlyaet na nego tochno takoj zhe HTTP zapros kak i na celevoj server bez proksi HTTP proksi analiziruet zapros otpravlyaet svoj sobstvennyj HTTP zapros celevomu serveru i zatem vozvrashaet otvet proksi klientu Bezopasnost vozmozhna esli est doverie k vladelcu proksi Dlya HTTP proksi trebuetsya programmnoe obespechenie ili nastrojka brauzera Posle nastrojki proksi mozhno poseshat sajty ne menyaya interfejs brauzera Application proxies analogichny HTTP proksi no podderzhivayut bolee shirokij spektr onlajn prilozhenij kak imenno oni otlichayutsya Odnorangovye seti hranyat kontent na dobrovolnyh serverah Takzhe ispolzuetsya perenapravlenie re routing kotoroe povyshaet nadyozhnost seti Odnorangovoj sisteme mozhno doveryat poskolku ona zavisit ne ot odnogo servera a ot neskolkih obyom kontenta na kazhdom konkretnom servere ogranichen Sistemy perenapravleniya re routing ispolzuyut srazu neskolko proksi serverov dlya zashity poetomu kazhdyj otdelnyj proksi server ne znaet polnoj informacii o zaprose Nizhe priveden spisok programm dlya obhoda cenzury v Internete Etot razdel imeet chrezmernyj obyom ili soderzhit malovazhnye podrobnosti neenciklopedichnogo haraktera Esli vy ne soglasny s etim pozhalujsta pokazhite v tekste sushestvennost izlagaemogo materiala V protivnom sluchae razdel mozhet byt udalyon Podrobnosti mogut byt na stranice obsuzhdeniya Kratko Spisok potencialno bezrazmernyj ne osnovan na vtorichnyh istochnikah pochemu imenno eti sajty a ne drugie Avtory shablona Special History Shablon Znachimost razdela Nazvanie Tip Razrabotchik Cena Veb sajt Primechaniyaalkasir HTTP proksi Zhurnalist iz Jemena besplatno Ispolzuet tunnelirovanie Pozvolyaet poluchat dostup tolko k nekotorym sajtam Ne dopuskaet pornograficheskie eroticheskie materialy i prochie sajty dlya vzroslyh Anonymizer HTTP proksi Anonymizer Inc platno www anonymizer com Tunneliruet trafik cherez Anonymizer CGIProxy HTTP proksi Dzhejms Marshall besplatno www jmarshall com Prevrashaet kompyuter v proksi server i pozvolyaet polzovatelyam servera poluchat dostup k sajtam CGIProxy ispolzuetsya v nekotoryh drugih proksi serverah Flash proxy HTTP proksi Stenfordskij universitet besplatno crypto stanford edu flashproxy Ispolzuet soedinenie s Tor NetworkFreegate HTTP proksi Dynamic Internet Technology Inc besplatno www dit inc us Ispolzuet razlichnye otkrytye proksi dlya dostupa k zablokirovannym veb sajtam Ispolzuetsya set DIT s DynaWeb Freenet P2P set Yan Klark besplatno freenetproject org Decentralizovan ispolzuet zhestkij disk polzovatelej dlya zashity anonimnostiI2P ranee Invisible Internet Project vypolnyaet re routing I2P Project besplatno geti2p net Ispolzuet set pseudonymous pozvolyaet sdelat internet chastichno anonimnymJava Anon Proxy angl takzhe izvesten kak JAP ili JonDonym fiksirovannyj re routing Jondos GmbH platno ili besplatno anonymous proxy servers net Ispolzuet servis AN ON Razrabotan kak proekt Drezdenskogo tehnicheskogo universiteta Regensburgskogo universiteta i odnogo iz chinovnikov zashishayushih konfidencialnost Psiphon CGI proksi Psiphon Inc besplatno psiphon ca Odna iz sistem obhoda cenzury Open source Proxify HTTP proksi UpsideOut Inc platno ili besplatno proxify com Sistema obhoda cenzury Zablokirovana v razlichnyh stranahStupidCensorship HTTP proksi Peacefire besplatno Eta sistema obhoda cenzury takzhe blokiruetsya pohozhij sajt osnovannyj na tom zhe PO Tor re routing randomizirovano The Tor Project besplatno www torproject org Predostavlyaet anonimnost pozvolyaet obhodit cenzuru Ultrasurf HTTP proksi Ultrareach Internet Corporation besplatno www ultrasurf us Sistema pozvolyayushaya polzovatelyam v stranah kotoryh est cenzura obhodit eyo Sm takzheAnonimnyj P2P Kontent filtr Programma otslezhivaniya Shifropank Kriptoanarhizm Fond elektronnyh rubezhej Konfidencialnost v internete Yacheistaya topologiya TorPrimechaniyaCormac Callanan Leaping Over the Firewall A Review of Censorship Circumvention Tools angl freedomhouse org 11 aprelya 2011 Data obrasheniya 11 dekabrya 2018 3 maya 2019 goda More than 20 authors see Discussion page 2014 08 05 How to Circumvent Online Censorship Surveillance Self Defense angl 23 dekabrya 2018 Data obrasheniya 1 noyabrya 2018 a href wiki D0 A8 D0 B0 D0 B1 D0 BB D0 BE D0 BD Cite news title Shablon Cite news cite news a Vikipediya Obsluzhivanie CS1 chislovye imena authors list ssylka Vseobshee rukovodstvo po obhodnoj internet cenzure ot 15 sentyabrya 2011 na Wayback Machine 1 ot 15 sentyabrya 2011 na Wayback Machine Citizen Lab Universitet Toronto sentyabr 2007 g Novye tehnologii srazhayutsya i pobezhdayut internet cenzuru ot 27 oktyabrya 2011 na Wayback Machine 2 ot 27 oktyabrya 2011 na Wayback Machine Globalnyj internet konsorcium svobody 20 sentyabrya 2007 g Lucas Dixon Network Traffic Obfuscation and Automated Internet Censorship angl IEEE Security amp Privacy journal 2016 14 December vol 14 no 6 P 43 53 ISSN 1540 7993 doi 10 1109 msp 2016 121 8 yanvarya 2019 goda Rob Faris John Palfrey Ethan Zuckerman Hal Roberts Jillian York 2010 Circumvention Tool Usage Report angl Berkman Klein Center Data obrasheniya 15 noyabrya 2018 15 dekabrya 2018 goda China The Home to Facebook and Twitter angl GlobalWebIndex Blog 27 sentyabrya 2012 Data obrasheniya 13 dekabrya 2018 15 dekabrya 2018 goda Josh Ong Report Twitter s Most Active Country Is China Where It Is Blocked angl The Next Web 26 sentyabrya 2012 Data obrasheniya 11 dekabrya 2018 15 dekabrya 2018 goda Mari Marcello 2014 12 05 How Facebook s Tor service could encourage a more open web The Guardian 10 iyunya 2016 Data obrasheniya 26 avgusta 2019 Linda Lee A Usability Evaluation of Tor Launcher neopr Proceedings on Privacy Enhancing Technologies 2017 1 July t 2017 3 S 90 109 ISSN 2299 0984 doi 10 1515 popets 2017 0030 Genevieve Gebhart Internet Censorship in Thailand User Practices and Potential Threats angl 2017 IEEE European Symposium on Security and Privacy EuroS amp P journal IEEE 2017 26 April doi 10 1109 eurosp 2017 50 8 yanvarya 2019 goda Freedom of connection freedom of expression the changing legal and regulatory ecology shaping the Internet ot 28 sentyabrya 2011 na Wayback Machine Dutton William H Dopatka Anna Law Ginette Nash Victoria Division for Freedom of Expression Democracy and Peace United Nations Educational Scientific and Cultural Organization UNESCO Paris 2011 103 pp ISBN 978 92 3 104188 4 Circumventing Network Filters Or Internet Censorship Using Simple Methods VPNs And Proxies 14 noyabrya 2011 goda Not As Cool As It Seems 16 December 2009 accessed 16 September 2011 View web pages cached in Google Search Results Google Search Help neopr support google com Data obrasheniya 11 dekabrya 2018 14 dekabrya 2018 goda Steven Millward Opera accused of censorship betrayal by Chinese users neopr CNet Asia 22 noyabrya 2009 3 noyabrya 2013 goda David Fifield Blocking resistant communication through domain fronting angl Proceedings on Privacy Enhancing Technologies journal 2015 1 June vol 2015 no 2 P 46 64 ISSN 2299 0984 doi 10 1515 popets 2015 0009 23 marta 2019 goda Leonid Bershidsky Russian Censor Gets Help From Amazon and Google neopr Bloomberg 3 maya 2018 Data obrasheniya 9 noyabrya 2018 18 noyabrya 2018 goda Chris Hoffman How to Use SSH Tunneling to Access Restricted Servers and Browse Securely angl How To Geek Data obrasheniya 11 dekabrya 2018 15 dekabrya 2018 goda K Shahbar Traffic flow analysis of tor pluggable transports neopr 2015 11th International Conference on Network and Service Management CNSM 2015 9 November S 178 181 doi 10 1109 CNSM 2015 7367356 8 yanvarya 2019 goda Sullivan Bob 13 April 2006 Military Thumb Drives Expose Larger Problem 6 dekabrya 2010 goda MSNBC Retrieved on 25 January 2007 Matt Kwong CBC News Posted Apr 12 When Cubans want internet content black market El Paquete delivers CBC News angl CBC Data obrasheniya 11 dekabrya 2018 8 yanvarya 2019 goda John Edwards From Pac Man to Bird Droppings Turkey Protests Twitter Ban angl WSJ 21 marta 2014 Data obrasheniya 15 noyabrya 2018 15 dekabrya 2018 goda Simin Kargar Censorship and Collateral Damage Analyzing the Telegram Ban in Iran angl SSRN Electronic Journal journal 2018 ISSN 1556 5068 doi 10 2139 ssrn 3244046 8 yanvarya 2019 goda Walid Al Saqaf Internet Censorship Circumvention Tools Escaping the Control of the Syrian Regime angl Media and Communication journal Vol 4 no 1 doi 10 17645 mac v4i1 357 8 yanvarya 2019 goda Sarah Zheng VPN crackdown a trial by firewall for China s research world South China Morning Post angl 18 dekabrya 2018 Data obrasheniya 15 noyabrya 2018 Tania Branigan 2011 02 18 China s Great Firewall not secure enough says creator The Guardian angl 16 dekabrya 2018 Data obrasheniya 11 dekabrya 2018 Marcello Mari 2014 12 05 How Facebook s Tor service could encourage a more open web The Guardian angl 16 dekabrya 2018 Data obrasheniya 13 dekabrya 2018 Jon Russell Twitter estimates that it has 10 million users in China angl TechCrunch Data obrasheniya 11 dekabrya 2018 Jedidiah R Crandall Analyzing the Great Firewall of China Over Space and Time angl Proceedings on Privacy Enhancing Technologies journal 2015 1 April vol 2015 no 1 P 61 76 doi 10 1515 popets 2015 0005 8 yanvarya 2019 goda Ronald Deibert Access contested security identity and resistance in Asian cyberspace information revolution and global politics Cambridge MA MIT Press 2012 ISBN 9780262298919 26 avgusta 2019 goda Aaron Souppouris Turkish citizens use Google to fight Twitter ban The Verge 8 yanvarya 2019 Data obrasheniya 15 noyabrya 2018 About alkasir 10 sentyabrya 2011 goda alkasir com accessed 16 September 2011 www anonymizer com ot 23 sentyabrya 2011 na Wayback Machine Anonymizer Inc accessed 16 September 2011 CGIProxy ot 21 sentyabrya 2011 na Wayback Machine James Marshall accessed 17 September 2011 Flash proxies ot 10 marta 2013 na Wayback Machine Applied Crypto Group in the Computer Science Department at Stanford University accessed 21 March 2013 About D I T 26 sentyabrya 2011 goda Dynamic Internet Technology accessed 16 September 2011 What is Freenet 16 sentyabrya 2011 goda The Freenet Project accessed 16 September 2011 I2P Anonymous Network ot 10 sentyabrya 2013 na Wayback Machine I2P Project accessed 16 September 2011 Revocable Anonymity ot 25 sentyabrya 2011 na Wayback Machine Stefan Kopsell Rolf Wendolsky Hannes Federrath in Proc Emerging Trends in Information and Communication Security International Conference Gunter Muller Ed ETRICS 2006 Freiburg Germany 6 9 June 2006 LNCS 3995 Springer Verlag Heidelberg 2006 pp 206 220 About Psiphon ot 16 marta 2016 na Wayback Machine Psiphon Inc 4 April 2011 Psiphon Content Delivery Software ot 4 marta 2016 na Wayback Machine Launchpad accessed 16 September 2011 About Proxify UpsideOut Inc accessed 17 September 2011 About StupidCensorship com Peacefire accessed 17 September 2011 Tor Overview ot 6 iyunya 2015 na Wayback Machine The Tor Project Inc accessed 16 September 2011 About UltraReach ot 25 sentyabrya 2011 na Wayback Machine Ultrareach Internet Corp accessed 16 September 2011Ssylki uoft me casting Casting a Wider Net uoft me casting Ronald Dejbert 11 oktyabrya 2011 goda Censorship Wikia sajt protiv cenzury Circumvention Tool Evaluation 2011 Hel Roberts Itan Cukerman i Dzhon Palfri 18 avgusta 2011 g Circumvention Tool Usage Report 2010 Hel Roberts Etan Cukerman Dzhillian Jork Robert Faris i Dzhon Palfri Centr Berkmana po Internetu i obshestvu 14 oktyabrya 2010 g Cifrovaya bezopasnost i konfidencialnost dlya pravozashitnikov nedostupnaya ssylka Dmitrij Vitalev Opublikovano Mezhdunarodnym fondom po zashite pravozashitnikov Front Line Cifrovye instrumenty dlya sderzhivaniya slezhki New York Times 17 iyulya 2013 g metody i scenarii poleznye dlya obhoda cenzury s pomoshyu filtracii DNS Kak obojti internet cenzuru 3 Rukovodstvo FLOSS 10 marta 2011 g 240 s Perevody byli opublikovany na i Internet cenzura viki ot 28 avgusta 2011 na Wayback Machine predostavlyaet informaciyu o razlichnyh metodah filtracii dostupa i sposobah ih obhoda Pryzhok cherez mezhsetevoj ekran obzor instrumentov obhoda cenzury Kormak Kallanan Irlandiya Hajn Dris Cikenhejner Niderlandy Alberto Eskudero Paskual Shveciya i Robert Guerra Kanada Freedom House aprel 2011 g Povarennaya kniga cookbook o svobode SMI v Internete sozdana predstavitelem OBSE po voprosam svobody SMI Vena 2004 Proekt Dokumenty ob anonimnosti proekt Svobodnoe ubezhishe dostup 16 sentyabrya 2011 g Desyat veshej kotorye nuzhno iskat v instrumente obhoda cenzury Rodzher Dingledin The Tor Project sentyabr 2010Nekotorye vneshnie ssylki v etoj state vedut na sajty zanesyonnye v spam listEti sajty mogut narushat avtorskie prava byt priznany neavtoritetnymi istochnikami ili po drugim prichinam byt zapresheny v Vikipedii Redaktoram sleduet zamenit takie ssylki ssylkami na sootvetstvuyushie pravilam sajty ili bibliograficheskimi ssylkami na pechatnye istochniki libo udalit ih vozmozhno vmeste s podtverzhdaemym imi soderzhimym Spisok problemnyh ssylokuoft me casting, Википедия, чтение, книга, библиотека, поиск, нажмите, истории, книги, статьи, wikipedia, учить, информация, история, скачать, скачать бесплатно, mp3, видео, mp4, 3gp, jpg, jpeg, gif, png, картинка, музыка, песня, фильм, игра, игры, мобильный, телефон, Android, iOS, apple, мобильный телефон, Samsung, iphone, xiomi, xiaomi, redmi, honor, oppo, nokia, sonya, mi, ПК, web, Сеть, компьютер
Вершина