2012
DOI: 10.4018/jep.2012100102
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomy of Censors and Anti-Censors Part II

Abstract: This paper presents a conceptual study of Internet anti-censorship technologies. It begins with an overview of previous research on Internet anti-censorship systems and discusses their social, political and technological dimensions. Then for deployed Internet anti-censorship technologies, a taxonomy of their principles and techniques is presented, followed by a discussion of observed trends and implications. Based on the observations, the paper concludes with a discussion on the most critical design features t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…There is a growing literature that focuses on what is censored [Deibert et al 2008[Deibert et al , 2010, how it is censored [Zittrain and Edelman 2003;Xu et al 2011;Anonymous 2012;Dornseif 2004;Clayton 2006; ICANN Security and Stability Advisory Committee (SSAC) 2012; Weaver et al 2009;Wolfgarten 2006;Fallows 2008;Sfakianakis et al 2011;Verkamp and Gupta 2012], and how censorship can be circumvented [Leberknight et al 2012a[Leberknight et al , 2012bElahi and Goldberg 2012].…”
Section: Related Workmentioning
confidence: 99%
“…There is a growing literature that focuses on what is censored [Deibert et al 2008[Deibert et al , 2010, how it is censored [Zittrain and Edelman 2003;Xu et al 2011;Anonymous 2012;Dornseif 2004;Clayton 2006; ICANN Security and Stability Advisory Committee (SSAC) 2012; Weaver et al 2009;Wolfgarten 2006;Fallows 2008;Sfakianakis et al 2011;Verkamp and Gupta 2012], and how censorship can be circumvented [Leberknight et al 2012a[Leberknight et al , 2012bElahi and Goldberg 2012].…”
Section: Related Workmentioning
confidence: 99%
“…There have been significant efforts to develop strategies to detect and evade censorship. Most work, however, focuses on exploiting technological limitations with existing routing protocols (Leberknight et al, 2012;Katti et al, 2005;Levin et al, 2015;McPherson et al, 2016;Weinberg et al, 2012). Research that pays more attention to linguistic properties of online censorship in the context of censorship evasion include, for example, Safaka et al (2016) who apply linguistic steganography to circumvent censorship.…”
Section: Previous Workmentioning
confidence: 99%
“…Differently from veiling single terms, an entire domain might not be accessible, thus requiring different approaches to circumvent the block [29]. Work in [30,31,32] propose a survey on different topics related to censorship, either on detection or possible countermeasures. Also, monitoring tools exist, to trace the diffusion of the phenomenon [33,34].…”
Section: Related Workmentioning
confidence: 99%