Other components
Component | Translated | Unfinished | Unfinished words | Unfinished characters | Untranslated | Checks | Suggestions | Comments | |
---|---|---|---|---|---|---|---|---|---|
Glossary (ssd.eff.org/en/glossary)
|
0% | 89 | 21,910 | 194,300 | 0 | 0 | 0 | 0 | |
|
|||||||||
Seven Steps To Digital Security
|
0% | 30 | 790 | 6,113 | 0 | 0 | 0 | 0 | |
|
|||||||||
Choosing Your Tools
|
0% | 52 | 2,032 | 16,646 | 0 | 0 | 0 | 0 | |
|
|||||||||
Animated Overview: Using Password Managers to Stay Safe Online
|
0% | 19 | 596 | 5,905 | 0 | 0 | 0 | 0 | |
|
|||||||||
How to: Use KeePassXC
|
0% | 85 | 2,645 | 22,362 | 0 | 0 | 0 | 0 | |
|
|||||||||
How to: Enable Two-factor Authentication
|
0% | 36 | 1,555 | 12,789 | 0 | 0 | 0 | 0 | |
|
Overview
Project website | ssd.eff.org |
---|---|
Instructions for translators | Please see Localized Guides by Localization Lab available in PDF files. Some of the guides are already localized and may just need to be updated. Do not translate the values inside HTML elements except for: - data-title - data-content - data-original-title |
Translation license | Creative Commons Zero v1.0 Universal |
Translation process |
|
Source code repository |
[email protected]:eml10n/ssd.eff.org.git
|
Repository branch | main |
Last remote commit |
Translated using Weblate (Indonesian)
8d2aaa8
![]() |
Last commit in Weblate |
Translated using Weblate (Indonesian)
04b6572
![]() |
Weblate repository |
https://l10n.space/git/ssd/understanding-and-circumventing-network-censorship/
|
File mask | */module/understanding-and-circumventing-network-censorship/index.html |
Monolingual base language file | en/module/understanding-and-circumventing-network-censorship/index.html |
Translation file |
Download
fil/module/understanding-and-circumventing-network-censorship/index.html
|
Last change | None |
Last author | None |
String statistics
Strings percent | Hosted strings | Words percent | Hosted words | Characters percent | Hosted characters | |
---|---|---|---|---|---|---|
Total | 9 | 5,418 | 48,148 | |||
Approved | 0% | 0 | 0% | 0 | 0% | 0 |
Waiting for review | 55% | 5 | 99% | 5,398 | 99% | 47,885 |
Translated | 100% | 9 | 100% | 5,418 | 100% | 48,148 |
Needs editing | 0% | 0 | 0% | 0 | 0% | 0 |
Read-only | 44% | 4 | 1% | 20 | 1% | 263 |
Failing checks | 0% | 0 | 0% | 0 | 0% | 0 |
Strings with suggestions | 0% | 0 | 0% | 0 | 0% | 0 |
Untranslated strings | 0% | 0 | 0% | 0 | 0% | 0 |
![]() New strings to translate Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
4 new strings to translate appeared to the translation.
3 months ago
|
![]() Resource update Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
Parsing of the "
fil/module/understanding-and-circumventing-network-censorship/index.html " file was enforced.
3 months ago
|
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
</div>
</div> |
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
</section>
|
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Last reviewed: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>This is an overview of network censorship, but it is not comprehensive.</em></p> <p>Governments, companies, schools, and Internet providers sometimes use software to prevent their users from accessing certain websites and services that are otherwise available on the open web. This is called <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and it is a form of censorship. Filtering comes in different forms. Even with <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, censors can block entire websites, hosting providers, or Internet technologies. Sometimes, content is blocked based on the keywords it contains. When sites aren’t encrypted, censors can also block individual web pages.</p> <p>There are different ways of beating Internet censorship. Some protect you from surveillance, but many do not. When someone who controls your net connection filters or blocks a site, you can almost always use a circumvention tool to get to the information you need.</p> <p class="warning">Note: Circumvention tools that promise privacy or security are not always private or secure. And tools that use terms like “anonymizer” do not always keep your identity completely secret.</p> <p>The circumvention tool that is best for you depends on your security plan. If you’re not sure how to create a security plan, start <a href="https://ssd.eff.org/en/node/39">here</a>. While creating a security plan, be aware that someone who controls your Internet connection may notice that you are using a particular circumvention tool or technique, and take action against you or others.<br><br> In this article, we’ll talk about understanding Internet censorship, who can perform it, and how it happens.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Understanding Internet censorship and surveillance </a> <ul><li>Censorship and surveillance: two sides of the same coin</li> <li>The Cost of Surveillance</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Where and how network censorship and surveillance happen</a> <ul><li>Where is the blocking happening?</li> <li>How is it happening?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Circumvention techniques</a> <ul><li>Changing your DNS provider to access blocked websites or services</li> <li>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) or encrypted web proxy to access blocked websites or services.</li> <li>Using the Tor Browser to access a blocked website or to protect your identity.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Understanding Internet censorship and surveillance <a class="anchor-link-icon" href="#1">Anchor link</a></h2> <p>The Internet has a lot of processes that all have to work together properly in order to get your communications from one place to another. If someone is trying to block parts of the Internet, or particular activities, they may target many different parts of the system. The methods they use may depend on what technology and devices they have control over, their knowledge, their resources, and whether they are in a position of power to tell others what to do.</p> <h3>Surveillance and Censorship: Two Sides of the Same Coin</h3> <p>Internet surveillance and censorship go hand-in-hand. Internet censorship is a two-step process:</p> <ol><li>Spot “unacceptable” activity</li> <li>Block “unacceptable” activity</li> </ol><p>Spotting “unacceptable” activity is the same as Internet surveillance. If network administrators can see where you’re going on the Internet, they can decide whether to block it. By advocating for Internet and <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> privacy tools and technologies, we can also make <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> more difficult.</p> <p>Many circumvention techniques likewise have the additional benefit of protecting your information from network eavesdroppers when you go online.</p> <h3>The Cost of Surveillance</h3> <p>Blocking Internet traffic comes at a cost, and over-blocking can come at an even greater cost. A popular example is that the Chinese government does not censor GitHub’s website, even though many anti-government newsletters are hosted on the website. Software developers need access to GitHub to perform work that is beneficial to the Chinese economy. Right now, these censors have decided that it will cost them more to block Github than they would gain by blocking it.</p> <p>Not all censors would make the same decision. For example, temporary Internet blackouts are becoming increasingly common, even though these measures can seriously harm local economies.</p> <a class="anchor-link-target" name="2"> </a> <h2>Where and how censorship and surveillance happen <a class="anchor-link-icon" href="#2">Anchor link</a></h2> <h3>Where is the <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> happening?</h3> <p><img alt="Your computer tries to connect to https://eff.org, which is at a listed IP address (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of https://eff.org. The website successfully loads for your computer." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Your computer tries to connect to <a href="https://eff.org">https://eff.org</a>, which is at a listed <a href="/en/glossary/ip-address" class="glossify-link" data-title="IP address" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. " data-original-title="IP address">IP address<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of <a href="http://eff.org">https://eff.org</a>. The website successfully loads for your computer.</em></small></p> <p><img alt="An eye, watching a computer trying to connect to eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Blocking or filtering on your devices.</strong> This is especially common in schools and workplaces. Someone who sets up or manages your computers and phones can put software on them that limits how they can be used. The software changes how the device works and can make it unable to access certain sites, or to communicate online in certain ways. Spyware can work in a very similar way.</p> <p><img alt="An eye, watching traffic going in and out of a home network router." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Local network filtering.</strong> This is especially common in schools and workplaces. Someone who manages your local network (like a WiFi network) enforces some limits on your Internet activity, like monitoring or controlling where you go online or when searching for certain keywords.</p> <p><img alt="An eye, watching traffic coming in and out of an ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Blocking or filtering by Internet Service Providers (ISPs).</strong> Your ISP can generally perform the same type of filtering as the administrator of your local network. ISPs in many countries are compelled by their government to perform regular <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and censorship. Commercial ISPs can perform filtering as a service for households or employers. Particular residential Internet service providers may market filtered connections directly to customers as an option, and automatically apply specific censorship methods (like those described below) to all connections on their ISPs. They may do this even if it isn’t required by a government, because some of their customers want it.</p> <h3>How is the blocking happening?</h3> <p><strong>IP address blocking.</strong> “IP addresses” are the locations of computers on the Internet. Every piece of information that is sent over the Internet has a “To” address and a “From” address. Internet Service Providers or network administrators can create lists of locations that correspond with services they want to block. They can then block any pieces of information on the network that are being delivered to or from those locations.</p> <p>This can lead to overblocking, since many services can be hosted at the same location, or IP address. Similarly, many people wind up sharing any given IP address for their Internet access.</p> <p dir="ltr"><img alt="In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p> <p> </p> <p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node --> |
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
<div class="content">
<div class="container">
<div class="content">
<div class="container"> |
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
<div id="node-229" class="node node-article view-mode-full clearfix">
<div id="node-229" class="node node-article view-mode-full clearfix">
|
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
<h1 class="page-header">Understanding and Circumventing Network Censorship</h1>
<h1 class="page-header">Pag-Unawa at Pag-iwas sa Network Censorship</h1>
|
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
<div class="breadcrumb">
<a href="/en/module-categories/further-learning">Further Learning</a> </div>
<div class="breadcrumb">
<a href="/en/module-categories/further-learning">Iba Pang Kaalaman</a> </div> |
![]() String updated in the repository Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Filipino |
<section class="main-section">
<a id="main-content"></a>
<section class="main-section">
<a id="main-content"></a> |
9 | File in original format as translated in the repository | Plain text file | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
9 | All strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |