Other components
Component | Translated | Unfinished | Unfinished words | Unfinished characters | Untranslated | Checks | Suggestions | Comments | |
---|---|---|---|---|---|---|---|---|---|
How to: Enable Two-factor Authentication
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
Seven Steps To Digital Security
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
Choosing Your Tools
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
How to: Use KeePassXC
|
0 | 0 | 0 | 0 | 22 | 0 | 0 | ||
|
|||||||||
Animated Overview: Using Password Managers to Stay Safe Online
|
0 | 0 | 0 | 0 | 0 | 0 | 0 | ||
|
|||||||||
Glossary (ssd.eff.org/en/glossary)
|
0 | 0 | 0 | 0 | 8 | 0 | 0 | ||
|
Overview
Project website | ssd.eff.org |
---|---|
Instructions for translators | Please see Localized Guides by Localization Lab available in PDF files. Some of the guides are already localized and may just need to be updated. Do not translate the values inside HTML elements except for: - data-title - data-content - data-original-title |
Translation license | Creative Commons Zero v1.0 Universal |
Translation process |
|
Source code repository |
[email protected]:eml10n/ssd.eff.org.git
|
Repository branch | main |
Last remote commit |
Translated using Weblate (Indonesian)
46781fb
![]() |
Last commit in Weblate |
Translated using Weblate (Indonesian)
46781fb
![]() |
Weblate repository |
https://l10n.space/git/ssd/understanding-and-circumventing-network-censorship/
|
File mask | */module/understanding-and-circumventing-network-censorship/index.html |
Monolingual base language file | en/module/understanding-and-circumventing-network-censorship/index.html |
Translation file |
Download
id/module/understanding-and-circumventing-network-censorship/index.html
|
Last change | March 29, 2023, 8:09 p.m. |
Last author | ian156 |
String statistics
Strings percent | Hosted strings | Words percent | Hosted words | Characters percent | Hosted characters | |
---|---|---|---|---|---|---|
Total | 9 | 5,418 | 48,148 | |||
Approved | 0% | 0 | 0% | 0 | 0% | 0 |
Waiting for review | 55% | 5 | 99% | 5,398 | 99% | 47,885 |
Translated | 100% | 9 | 100% | 5,418 | 100% | 48,148 |
Needs editing | 0% | 0 | 0% | 0 | 0% | 0 |
Read-only | 44% | 4 | 1% | 20 | 1% | 263 |
Failing checks | 0% | 0 | 0% | 0 | 0% | 0 |
Strings with suggestions | 0% | 0 | 0% | 0 | 0% | 0 |
Untranslated strings | 0% | 0 | 0% | 0 | 0% | 0 |
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
|
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Last reviewed: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>This is an overview of network censorship, but it is not comprehensive.</em></p> <p>Governments, companies, schools, and Internet providers sometimes use software to prevent their users from accessing certain websites and services that are otherwise available on the open web. This is called <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and it is a form of censorship. Filtering comes in different forms. Even with <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, censors can block entire websites, hosting providers, or Internet technologies. Sometimes, content is blocked based on the keywords it contains. When sites aren’t encrypted, censors can also block individual web pages.</p> <p>There are different ways of beating Internet censorship. Some protect you from surveillance, but many do not. When someone who controls your net connection filters or blocks a site, you can almost always use a circumvention tool to get to the information you need.</p> <p class="warning">Note: Circumvention tools that promise privacy or security are not always private or secure. And tools that use terms like “anonymizer” do not always keep your identity completely secret.</p> <p>The circumvention tool that is best for you depends on your security plan. If you’re not sure how to create a security plan, start <a href="https://ssd.eff.org/en/node/39">here</a>. While creating a security plan, be aware that someone who controls your Internet connection may notice that you are using a particular circumvention tool or technique, and take action against you or others.<br><br> In this article, we’ll talk about understanding Internet censorship, who can perform it, and how it happens.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Understanding Internet censorship and surveillance </a> <ul><li>Censorship and surveillance: two sides of the same coin</li> <li>The Cost of Surveillance</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Where and how network censorship and surveillance happen</a> <ul><li>Where is the blocking happening?</li> <li>How is it happening?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Circumvention techniques</a> <ul><li>Changing your DNS provider to access blocked websites or services</li> <li>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) or encrypted web proxy to access blocked websites or services.</li> <li>Using the Tor Browser to access a blocked website or to protect your identity.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Understanding Internet censorship and surveillance <a class="anchor-link-icon" href="#1">Anchor link</a></h2> <p>The Internet has a lot of processes that all have to work together properly in order to get your communications from one place to another. If someone is trying to block parts of the Internet, or particular activities, they may target many different parts of the system. The methods they use may depend on what technology and devices they have control over, their knowledge, their resources, and whether they are in a position of power to tell others what to do.</p> <h3>Surveillance and Censorship: Two Sides of the Same Coin</h3> <p>Internet surveillance and censorship go hand-in-hand. Internet censorship is a two-step process:</p> <ol><li>Spot “unacceptable” activity</li> <li>Block “unacceptable” activity</li> </ol><p>Spotting “unacceptable” activity is the same as Internet surveillance. If network administrators can see where you’re going on the Internet, they can decide whether to block it. By advocating for Internet and <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> privacy tools and technologies, we can also make <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> more difficult.</p> <p>Many circumvention techniques likewise have the additional benefit of protecting your information from network eavesdroppers when you go online.</p> <h3>The Cost of Surveillance</h3> <p>Blocking Internet traffic comes at a cost, and over-blocking can come at an even greater cost. A popular example is that the Chinese government does not censor GitHub’s website, even though many anti-government newsletters are hosted on the website. Software developers need access to GitHub to perform work that is beneficial to the Chinese economy. Right now, these censors have decided that it will cost them more to block Github than they would gain by blocking it.</p> <p>Not all censors would make the same decision. For example, temporary Internet blackouts are becoming increasingly common, even though these measures can seriously harm local economies.</p> <a class="anchor-link-target" name="2"> </a> <h2>Where and how censorship and surveillance happen <a class="anchor-link-icon" href="#2">Anchor link</a></h2> <h3>Where is the <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> happening?</h3> <p><img alt="Your computer tries to connect to https://eff.org, which is at a listed IP address (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of https://eff.org. The website successfully loads for your computer." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Your computer tries to connect to <a href="https://eff.org">https://eff.org</a>, which is at a listed <a href="/en/glossary/ip-address" class="glossify-link" data-title="IP address" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. " data-original-title="IP address">IP address<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of <a href="http://eff.org">https://eff.org</a>. The website successfully loads for your computer.</em></small></p> <p><img alt="An eye, watching a computer trying to connect to eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Blocking or filtering on your devices.</strong> This is especially common in schools and workplaces. Someone who sets up or manages your computers and phones can put software on them that limits how they can be used. The software changes how the device works and can make it unable to access certain sites, or to communicate online in certain ways. Spyware can work in a very similar way.</p> <p><img alt="An eye, watching traffic going in and out of a home network router." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Local network filtering.</strong> This is especially common in schools and workplaces. Someone who manages your local network (like a WiFi network) enforces some limits on your Internet activity, like monitoring or controlling where you go online or when searching for certain keywords.</p> <p><img alt="An eye, watching traffic coming in and out of an ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Blocking or filtering by Internet Service Providers (ISPs).</strong> Your ISP can generally perform the same type of filtering as the administrator of your local network. ISPs in many countries are compelled by their government to perform regular <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and censorship. Commercial ISPs can perform filtering as a service for households or employers. Particular residential Internet service providers may market filtered connections directly to customers as an option, and automatically apply specific censorship methods (like those described below) to all connections on their ISPs. They may do this even if it isn’t required by a government, because some of their customers want it.</p> <h3>How is the blocking happening?</h3> <p><strong>IP address blocking.</strong> “IP addresses” are the locations of computers on the Internet. Every piece of information that is sent over the Internet has a “To” address and a “From” address. Internet Service Providers or network administrators can create lists of locations that correspond with services they want to block. They can then block any pieces of information on the network that are being delivered to or from those locations.</p> <p>This can lead to overblocking, since many services can be hosted at the same location, or IP address. Similarly, many people wind up sharing any given IP address for their Internet access.</p> <p dir="ltr"><img alt="In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p> <p> </p> <p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node -->
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Terakhir ditinjau: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>Ini adalah gambaran umum sensor jaringan, tetapi tidak komprehensif.</em></p> <p>Pemerintah, perusahaan, sekolah, dan penyedia internet terkadang menggunakan perangkat lunak untuk mencegah penggunanya mengakses situs web dan layanan tertentu yang tersedia di web terbuka. Ini disebut <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, dan ini merupakan bentuk penyensoran. Pemfilteran hadir dalam berbagai bentuk. Bahkan dengan <a href="/en/glossary/encryption" class="glossify-link" data-title="enkripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sebuah proses yang mengambil pesan dan membuatnya tidak dapat dibaca, kecuali oleh orang yang mengetahui cara "mendekripsinya" kembali ke bentuk yang dapat dibaca. " data-original-title="encryption">enkripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, sensor dapat memblokir seluruh situs web, penyedia hosting, atau teknologi internet. Terkadang, konten diblokir berdasarkan kata kunci yang terdapat di dalamnya. Jika situs tidak dienkripsi, sensor juga dapat memblokir halaman web individual.</p> <p>Ada berbagai cara untuk mengatasi sensor internet. Beberapa cara dapat melindungi Anda dari pengawasan, tetapi banyak yang tidak. Jika seseorang yang mengontrol koneksi internet Anda memfilter atau memblokir sebuah situs, Anda hampir selalu dapat menggunakan alat pengelakan untuk mendapatkan informasi yang Anda perlukan.</p> <p class="warning">Catatan: Alat pengelakan yang menjanjikan privasi atau keamanan tidak selalu bersifat pribadi atau aman. Dan alat yang menggunakan istilah seperti "penganonim" (anonymizer) tidak selalu merahasiakan identitas Anda sepenuhnya.</p> <p>Alat pengelakan yang terbaik untuk Anda bergantung pada rencana keamanan Anda. Jika Anda tidak mengetahui pasti cara membuat rencana keamanan, mulailah <a href="https://ssd.eff.org/en/node/39">di sini</a>. Saat membuat rencana keamanan, ketahuilah bahwa seseorang yang mengontrol koneksi internet Anda mungkin mengetahui bahwa Anda menggunakan alat atau teknik pengelakan tertentu, dan mengambil tindakan terhadap Anda atau orang lain.<br><br> Di dalam artikel ini, kita akan membahas tentang pengertian sensor internet, siapa yang dapat melakukannya, dan bagaimana hal ini terjadi.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Memahami penyensoran dan pengawasan internet </a> <ul><li>Penyensoran dan pengawasan: dua sisi mata uang yang sama</li> <li>Harga sebuah Pengawasan</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Di mana dan bagaimana penyensoran dan pengawasan jaringan terjadi</a> <ul><li>Di mana pemblokiran terjadi?</li> <li>Bagaimana ini terjadi?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Berbagai teknik pengelakan</a> <ul><li>Mengganti penyedia DNS Anda untuk mengakses situs web atau layanan yang diblokir</li> <li>Menggunakan <a href="/en/glossary/vpn" class="glossify-link" data-title="Jaringan Pribadi Virtual" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="Virtual Private Network">Jaringan Pribadi Virtual<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) atau proksi web terenkripsi untuk mengakses situs web atau layanan yang diblokir.</li> <li>Menggunakan Tor Browser untuk mengakses situs web yang diblokir atau untuk melindungi identitas Anda.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Memahami penyensoran dan pengawasan internet <a class="anchor-link-icon" href="#1">Tautan jangkar</a></h2> <p>Internet memiliki banyak proses, dan semua proses ini harus bekerja sama dengan baik untuk menyampaikan komunikasi Anda dari satu tempat ke tempat lain. Jika seseorang mencoba memblokir suatu bagian internet, atau aktivitas tertentu, dia mungkin menyasar banyak bagian sistem yang berbeda. Metode yang digunakannya mungkin bergantung pada teknologi dan perangkat apa yang dikendalikannya, pengetahuannya, sumber dayanya, dan apakah dia dalam posisi yang memiliki kuasa untuk memerintahkan orang lain.</p> <h3>Pengawasan dan Penyensoran: Dua Sisi Mata Uang yang Sama</h3> <p>Pengawasan dan penyensoran internet berjalan beriringan. Penyensoran internet adalah proses dua langkah:</p> <ol><li>Menemukan aktivitas yang “tidak dapat diterima”</li> <li>Memblokir aktivitas yang “tidak dapat diterima”</li> </ol><p>Menemukan aktivitas yang “tidak dapat diterima” sama dengan pengawasan internet. Jika administrator jaringan dapat melihat tujuan Anda di internet, mereka dapat memutuskan apakah akan memblokirnya atau tidak. Dengan mengadvokasi internet dan <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jenis informasi apa pun, biasanya disimpan dalam bentuk digital. Data dapat mencakup dokumen, gambar, kunci, program, pesan, dan informasi, atau berkas digital lainnya. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> berbagai alat dan teknologi privasi, kita juga dapat membuat <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> lebih sulit.</p> <p>Banyak teknik pengelakan juga memiliki manfaat tambahan untuk melindungi informasi Anda dari penyadap jaringan saat Anda online.</p> <h3>Harga sebuah Pengawasan</h3> <p>Memblokir lalu lintas internet memerlukan biaya, dan pemblokiran yang berlebihan dapat menimbulkan biaya yang lebih besar. Contoh yang populer adalah bahwa pemerintah Tiongkok tidak menyensor situs web GitHub, meskipun banyak buletin anti-pemerintah dimuat di situs web tersebut. Para pengembang perangkat lunak memerlukan akses ke GitHub untuk melakukan pekerjaan yang menguntungkan perekonomian Tiongkok. Saat ini, sensor-sensor ini telah memutuskan bahwa akan lebih mahal bagi mereka jika memblokir Github dibanding apa yang akan mereka peroleh dengan memblokirnya.</p> <p>Tidak semua sensor akan membuat keputusan yang sama. Misalnya, pemadaman internet sementara menjadi semakin umum, meskipun langkah-langkah ini dapat sangat merugikan ekonomi lokal.</p> <a class="anchor-link-target" name="2"> </a> <h2>Di mana dan bagaimana penyensoran dan pengawasan terjadi <a class="anchor-link-icon" href="#2">Tautan jangkar</a></h2> <h3>Di mana <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> terjadi?</h3> <p><img alt="Komputer Anda mencoba terhubung ke https://eff.org, yang ada di alamat IP yang terdaftar (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di https://eff.org. Situs web tersebut berhasil dimuat untuk komputer Anda." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Komputer Anda mencoba terhubung ke <a href="https://eff.org">https://eff.org</a>, yang ada di <a href="/en/glossary/ip-address" class="glossify-link" data-title="alamat IP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Perangkat di internet memerlukan alamatnya sendiri untuk menerima data, seperti halnya rumah atau bisnis memerlukan alamat jalan untuk menerima surat fisik. Alamat ini adalah alamat IP-nya (Protokol Internet). Saat Anda terhubung ke situs web atau server lain secara online, Anda biasanya mengungkapkan alamat IP Anda sendiri. Ini tidak selalu mengungkapkan identitas Anda (sulit untuk memetakan alamat IP pada alamat asli atau komputer tertentu). Namun, alamat IP dapat mengungkapkan beberapa informasi tentang Anda, seperti lokasi kasar Anda atau nama Penyedia Layanan Internet Anda. Layanan seperti Tor memungkinkan Anda untuk menyembunyikan alamat IP Anda, dan ini membantu memberi Anda anonimitas di internet. " data-original-title="IP address">Alamat IP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di <a href="http://eff.org">https://eff.org</a>. Situs web tersebut berhasil dimuat untuk komputer Anda.</em></small></p> <p><img alt="Mata, yang mengawasi komputer saat mencoba untuk terkoneksi ke eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Memblokir atau memfilter di perangkat Anda.</strong>Ini sangat umum di sekolah dan tempat kerja. Seseorang yang menyiapkan atau mengelola komputer dan ponsel Anda dapat menggunakan perangkat lunak yang membatasi penggunaannya. Perangkat lunak mengubah cara kerja perangkat dan membuatnya tidak dapat mengakses situs tertentu, atau berkomunikasi online dengan cara tertentu. Spyware dapat bekerja dengan cara yang sangat mirip.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar di router jaringan rumah." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Pemfilteran jaringan lokal.</strong> Ini sangat umum di sekolah dan tempat kerja. Seseorang yang mengelola jaringan lokal Anda (seperti jaringan Wi-Fi) memberlakukan beberapa batasan pada aktivitas internet Anda, seperti memantau atau mengontrol tempat Anda online atau saat mencari kata kunci tertentu.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Pemblokiran dan pemfilteran oleh Penyedia Layanan Internet (ISP).</strong> ISP Anda umumnya dapat melakukan jenis pemfilteran yang sama dengan administrator jaringan lokal Anda. ISP di banyak negara dipaksa oleh pemerintah mereka untuk melakukan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan penyensoran secara teratur. ISP Komersial dapat melakukan pemfilteran atau penyaringan sebagai layanan untuk rumah tangga atau pemberi kerja. Penyedia layanan internet perumahan tertentu mungkin memasarkan koneksi yang difilter langsung kepada pelanggan sebagai opsi, dan secara otomatis menerapkan metode penyensoran khusus (seperti yang dijelaskan di bawah ini) pada semua koneksi di ISP mereka. Mereka mungkin melakukan ini, meskipun tidak diwajibkan oleh pemerintah, karena ada pelanggan mereka yang menginginkannya.</p> <h3>Bagaimana pemblokiran terjadi?</h3> <p><strong>Pemblokiran alamat IP.</strong> “Alamat IP” adalah lokasi komputer di internet. Setiap informasi yang dikirimkan melalui internet memiliki alamat “Kepada” dan alamat “Dari”. Penyedia Layanan Internet atau administrator jaringan dapat membuat daftar lokasi yang sesuai dengan layanan yang ingin mereka blokir. Mereka kemudian dapat memblokir informasi apa pun di jaringan yang sedang dikirimkan ke atau dari lokasi tersebut.</p> <p>Ini dapat menyebabkan pemblokiran berlebihan karena banyak layanan dapat di-hosting di lokasi, atau alamat IP, yang sama. Demikian pula, banyak orang akhirnya berbagi alamat IP apa pun yang diberikan untuk akses internet mereka.</p> <p dir="ltr"><img alt="Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut.</em></small></p> <p> </p> <p><strong>Pemblokiran DNS.</strong> Perangkat Anda meminta komputer yang disebut “DNS resolver” (penyelesai DNS) di tempat situs berada. Saat Anda terkoneksi ke internet, DNS resolver standar yang digunakan perangkat Anda biasanya milik Penyedia Layanan Internet Anda. ISP dapat memprogram DNS resolver-nya agar memberikan jawaban yang salah, atau tidak ada jawaban, setiap kali pengguna mencoba mencari lokasi situs atau layanan yang diblokir. Jika Anda mengubah DNS resolver, tetapi koneksi DNS Anda tidak dienkripsi, ISP Anda masih dapat memblokir atau mengubah jawaban secara selektif untuk layanan yang diblokir.</p> <p><img alt=" <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Dalam diagram ini, permintaan alamat untuk IP eff.org dimodifikasi di tingkat Penyedia Layanan Internet. ISP mengganggu DNS resolver, lalu alamat IP dialihkan untuk memberikan jawaban yang salah atau tidak ada jawaban.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Pemfilteran kata kunci.</strong> Jika lalu lintas tidak terenkripsi, Penyedia Layanan Internet dapat memblokir halaman web berdasarkan kontennya. Dengan peningkatan umum dalam situs terenkripsi, jenis pemfilteran ini menjadi kurang populer.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Satu peringatan adalah bahwa administrator bisa <a href="/en/glossary/decrypt" class="glossify-link" data-title="mendekripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Membuat pesan atau data yang diacak dapat dipahami. Tujuan enkripsi adalah untuk membuat pesan yang hanya dapat didekripsi oleh orang atau orang-orang yang dimaksudkan untuk menerimanya. " data-original-title="decrypt">mendekripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> aktivitas terenkripsi jika pengguna menginstal “sertifikat CA” tepercaya yang disediakan oleh administrator perangkatnya. Karena pengguna perangkat harus menginstal sertifikat, ini adalah praktik yang lebih umum untuk jaringan lokal di tempat kerja dan sekolah, tetapi kurang umum di tingkat ISP.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Pada koneksi situs web yang tidak terenkripsi, Penyedia Layanan Internet (ISP) dapat memeriksa konten situs dengan membandingkannya ke jenis konten yang diblokir. Dalam contoh ini, menyebutkan kebebasan berbicara mengarah ke pemblokiran otomatis situs web." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Pada koneksi situs web yang tidak terenkripsi, Penyedia Layanan Internet (ISP) dapat memeriksa konten situs dengan membandingkannya ke jenis konten yang diblokir. Dalam contoh ini, menyebutkan kebebasan berbicara mengarah ke pemblokiran otomatis situs web.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jika Anda pernah melihat alamat web dieja sebagai “http://www.example.com/”, Anda akan mengenali bagian “http” pada istilah ini. HTTP (protokol transfer hiperteks) adalah cara peramban web di mesin Anda berbicara ke server web jarak jauh. Sayangnya, http standar mengirimkan teks secara tidak aman melalui internet. HTTPS (S adalah singkatan dari “secure” (aman)) menggunakan enkripsi untuk lebih baik melindungi data yang Anda kirimkan ke situs web, dan informasi yang mereka kembalikan kepada Anda, dari orang yang ingin melihatnya. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dalam pemfilteran situs. </strong>Jika mengakses situs melalui HTTPS, semua konten dienkripsi, kecuali nama situs. Karena mereka masih dapat melihat nama situs, Penyedia Layanan Internet atau administrator jaringan lokal dapat memutuskan akses ke situs mana yang akan diblokir.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Di dalam diagram ini, komputer mencoba mengakses eff.org/deeplinks. Administrator jaringan (diwakili oleh router) dapat melihat domain (eff.org), tetapi bukan alamat situs web lengkap setelah garis miring. Administrator jaringan dapat memutuskan akses ke domain mana yang akan diblokir." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, komputer mencoba mengakses eff.org/deeplinks. Administrator jaringan (diwakili oleh router) dapat melihat domain (eff.org), tetapi bukan alamat situs web lengkap setelah garis miring. Administrator jaringan dapat memutuskan akses ke domain mana yang akan diblokir.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protokol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Protokol komunikasi adalah cara pengiriman data antar program atau komputer. Program perangkat lunak yang menggunakan protokol yang sama dapat berbicara satu sama lain: jadi, peramban web dan server web menggunakan protokol yang sama, disebut "http". Beberapa protokol menggunakan enkripsi untuk melindungi kontennya. Versi aman dari protokol http disebut "https". Contoh lain protokol terenkripsi yang digunakan oleh banyak program berbeda adalah OTR (Off-the-Record), sebuah protokol untuk pengiriman pesan instan yang aman... " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node --> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Last reviewed: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>This is an overview of network censorship, but it is not comprehensive.</em></p> <p>Governments, companies, schools, and Internet providers sometimes use software to prevent their users from accessing certain websites and services that are otherwise available on the open web. This is called <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and it is a form of censorship. Filtering comes in different forms. Even with <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, censors can block entire websites, hosting providers, or Internet technologies. Sometimes, content is blocked based on the keywords it contains. When sites aren’t encrypted, censors can also block individual web pages.</p> <p>There are different ways of beating Internet censorship. Some protect you from surveillance, but many do not. When someone who controls your net connection filters or blocks a site, you can almost always use a circumvention tool to get to the information you need.</p> <p class="warning">Note: Circumvention tools that promise privacy or security are not always private or secure. And tools that use terms like “anonymizer” do not always keep your identity completely secret.</p> <p>The circumvention tool that is best for you depends on your security plan. If you’re not sure how to create a security plan, start <a href="https://ssd.eff.org/en/node/39">here</a>. While creating a security plan, be aware that someone who controls your Internet connection may notice that you are using a particular circumvention tool or technique, and take action against you or others.<br><br> In this article, we’ll talk about understanding Internet censorship, who can perform it, and how it happens.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Understanding Internet censorship and surveillance </a> <ul><li>Censorship and surveillance: two sides of the same coin</li> <li>The Cost of Surveillance</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Where and how network censorship and surveillance happen</a> <ul><li>Where is the blocking happening?</li> <li>How is it happening?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Circumvention techniques</a> <ul><li>Changing your DNS provider to access blocked websites or services</li> <li>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) or encrypted web proxy to access blocked websites or services.</li> <li>Using the Tor Browser to access a blocked website or to protect your identity.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Understanding Internet censorship and surveillance <a class="anchor-link-icon" href="#1">Anchor link</a></h2> <p>The Internet has a lot of processes that all have to work together properly in order to get your communications from one place to another. If someone is trying to block parts of the Internet, or particular activities, they may target many different parts of the system. The methods they use may depend on what technology and devices they have control over, their knowledge, their resources, and whether they are in a position of power to tell others what to do.</p> <h3>Surveillance and Censorship: Two Sides of the Same Coin</h3> <p>Internet surveillance and censorship go hand-in-hand. Internet censorship is a two-step process:</p> <ol><li>Spot “unacceptable” activity</li> <li>Block “unacceptable” activity</li> </ol><p>Spotting “unacceptable” activity is the same as Internet surveillance. If network administrators can see where you’re going on the Internet, they can decide whether to block it. By advocating for Internet and <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> privacy tools and technologies, we can also make <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> more difficult.</p> <p>Many circumvention techniques likewise have the additional benefit of protecting your information from network eavesdroppers when you go online.</p> <h3>The Cost of Surveillance</h3> <p>Blocking Internet traffic comes at a cost, and over-blocking can come at an even greater cost. A popular example is that the Chinese government does not censor GitHub’s website, even though many anti-government newsletters are hosted on the website. Software developers need access to GitHub to perform work that is beneficial to the Chinese economy. Right now, these censors have decided that it will cost them more to block Github than they would gain by blocking it.</p> <p>Not all censors would make the same decision. For example, temporary Internet blackouts are becoming increasingly common, even though these measures can seriously harm local economies.</p> <a class="anchor-link-target" name="2"> </a> <h2>Where and how censorship and surveillance happen <a class="anchor-link-icon" href="#2">Anchor link</a></h2> <h3>Where is the <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> happening?</h3> <p><img alt="Your computer tries to connect to https://eff.org, which is at a listed IP address (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of https://eff.org. The website successfully loads for your computer." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Your computer tries to connect to <a href="https://eff.org">https://eff.org</a>, which is at a listed <a href="/en/glossary/ip-address" class="glossify-link" data-title="IP address" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. " data-original-title="IP address">IP address<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of <a href="http://eff.org">https://eff.org</a>. The website successfully loads for your computer.</em></small></p> <p><img alt="An eye, watching a computer trying to connect to eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Blocking or filtering on your devices.</strong> This is especially common in schools and workplaces. Someone who sets up or manages your computers and phones can put software on them that limits how they can be used. The software changes how the device works and can make it unable to access certain sites, or to communicate online in certain ways. Spyware can work in a very similar way.</p> <p><img alt="An eye, watching traffic going in and out of a home network router." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Local network filtering.</strong> This is especially common in schools and workplaces. Someone who manages your local network (like a WiFi network) enforces some limits on your Internet activity, like monitoring or controlling where you go online or when searching for certain keywords.</p> <p><img alt="An eye, watching traffic coming in and out of an ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Blocking or filtering by Internet Service Providers (ISPs).</strong> Your ISP can generally perform the same type of filtering as the administrator of your local network. ISPs in many countries are compelled by their government to perform regular <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and censorship. Commercial ISPs can perform filtering as a service for households or employers. Particular residential Internet service providers may market filtered connections directly to customers as an option, and automatically apply specific censorship methods (like those described below) to all connections on their ISPs. They may do this even if it isn’t required by a government, because some of their customers want it.</p> <h3>How is the blocking happening?</h3> <p><strong>IP address blocking.</strong> “IP addresses” are the locations of computers on the Internet. Every piece of information that is sent over the Internet has a “To” address and a “From” address. Internet Service Providers or network administrators can create lists of locations that correspond with services they want to block. They can then block any pieces of information on the network that are being delivered to or from those locations.</p> <p>This can lead to overblocking, since many services can be hosted at the same location, or IP address. Similarly, many people wind up sharing any given IP address for their Internet access.</p> <p dir="ltr"><img alt="In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p> <p> </p> <p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node -->
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Terakhir ditinjau: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>Ini adalah gambaran umum sensor jaringan, tetapi tidak komprehensif.</em></p> <p>Pemerintah, perusahaan, sekolah, dan penyedia internet terkadang menggunakan perangkat lunak untuk mencegah penggunanya mengakses situs web dan layanan tertentu yang tersedia di web terbuka. Ini disebut <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, dan ini merupakan bentuk penyensoran. Pemfilteran hadir dalam berbagai bentuk. Bahkan dengan <a href="/en/glossary/encryption" class="glossify-link" data-title="enkripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sebuah proses yang mengambil pesan dan membuatnya tidak dapat dibaca, kecuali oleh orang yang mengetahui cara "mendekripsinya" kembali ke bentuk yang dapat dibaca. " data-original-title="encryption">enkripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, sensor dapat memblokir seluruh situs web, penyedia hosting, atau teknologi internet. Terkadang, konten diblokir berdasarkan kata kunci yang terdapat di dalamnya. Jika situs tidak dienkripsi, sensor juga dapat memblokir halaman web individual.</p> <p>Ada berbagai cara untuk mengatasi sensor internet. Beberapa cara dapat melindungi Anda dari pengawasan, tetapi banyak yang tidak. Jika seseorang yang mengontrol koneksi internet Anda memfilter atau memblokir sebuah situs, Anda hampir selalu dapat menggunakan alat pengelakan untuk mendapatkan informasi yang Anda perlukan.</p> <p class="warning">Catatan: Alat pengelakan yang menjanjikan privasi atau keamanan tidak selalu bersifat pribadi atau aman. Dan alat yang menggunakan istilah seperti "penganonim" (anonymizer) tidak selalu merahasiakan identitas Anda sepenuhnya.</p> <p>Alat pengelakan yang terbaik untuk Anda bergantung pada rencana keamanan Anda. Jika Anda tidak mengetahui pasti cara membuat rencana keamanan, mulailah <a href="https://ssd.eff.org/en/node/39">di sini</a>. Saat membuat rencana keamanan, ketahuilah bahwa seseorang yang mengontrol koneksi internet Anda mungkin mengetahui bahwa Anda menggunakan alat atau teknik pengelakan tertentu, dan mengambil tindakan terhadap Anda atau orang lain.<br><br> Di dalam artikel ini, kita akan membahas tentang pengertian sensor internet, siapa yang dapat melakukannya, dan bagaimana hal ini terjadi.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Memahami penyensoran dan pengawasan internet </a> <ul><li>Penyensoran dan pengawasan: dua sisi mata uang yang sama</li> <li>Harga sebuah Pengawasan</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Di mana dan bagaimana penyensoran dan pengawasan jaringan terjadi</a> <ul><li>Di mana pemblokiran terjadi?</li> <li>Bagaimana ini terjadi?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Berbagai teknik pengelakan</a> <ul><li>Mengganti penyedia DNS Anda untuk mengakses situs web atau layanan yang diblokir</li> <li>Menggunakan <a href="/en/glossary/vpn" class="glossify-link" data-title="Jaringan Pribadi Virtual" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="Virtual Private Network">Jaringan Pribadi Virtual<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) atau proksi web terenkripsi untuk mengakses situs web atau layanan yang diblokir.</li> <li>Menggunakan Tor Browser untuk mengakses situs web yang diblokir atau untuk melindungi identitas Anda.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Memahami penyensoran dan pengawasan internet <a class="anchor-link-icon" href="#1">Tautan jangkar</a></h2> <p>Internet memiliki banyak proses, dan semua proses ini harus bekerja sama dengan baik untuk menyampaikan komunikasi Anda dari satu tempat ke tempat lain. Jika seseorang mencoba memblokir suatu bagian internet, atau aktivitas tertentu, dia mungkin menyasar banyak bagian sistem yang berbeda. Metode yang digunakannya mungkin bergantung pada teknologi dan perangkat apa yang dikendalikannya, pengetahuannya, sumber dayanya, dan apakah dia dalam posisi yang memiliki kuasa untuk memerintahkan orang lain.</p> <h3>Pengawasan dan Penyensoran: Dua Sisi Mata Uang yang Sama</h3> <p>Pengawasan dan penyensoran internet berjalan beriringan. Penyensoran internet adalah proses dua langkah:</p> <ol><li>Menemukan aktivitas yang “tidak dapat diterima”</li> <li>Memblokir aktivitas yang “tidak dapat diterima”</li> </ol><p>Menemukan aktivitas yang “tidak dapat diterima” sama dengan pengawasan internet. Jika administrator jaringan dapat melihat tujuan Anda di internet, mereka dapat memutuskan apakah akan memblokirnya atau tidak. Dengan mengadvokasi internet dan <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jenis informasi apa pun, biasanya disimpan dalam bentuk digital. Data dapat mencakup dokumen, gambar, kunci, program, pesan, dan informasi, atau berkas digital lainnya. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> berbagai alat dan teknologi privasi, kita juga dapat membuat <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> lebih sulit.</p> <p>Banyak teknik pengelakan juga memiliki manfaat tambahan untuk melindungi informasi Anda dari penyadap jaringan saat Anda online.</p> <h3>Harga sebuah Pengawasan</h3> <p>Memblokir lalu lintas internet memerlukan biaya, dan pemblokiran yang berlebihan dapat menimbulkan biaya yang lebih besar. Contoh yang populer adalah bahwa pemerintah Tiongkok tidak menyensor situs web GitHub, meskipun banyak buletin anti-pemerintah dimuat di situs web tersebut. Para pengembang perangkat lunak memerlukan akses ke GitHub untuk melakukan pekerjaan yang menguntungkan perekonomian Tiongkok. Saat ini, sensor-sensor ini telah memutuskan bahwa akan lebih mahal bagi mereka jika memblokir Github dibanding apa yang akan mereka peroleh dengan memblokirnya.</p> <p>Tidak semua sensor akan membuat keputusan yang sama. Misalnya, pemadaman internet sementara menjadi semakin umum, meskipun langkah-langkah ini dapat sangat merugikan ekonomi lokal.</p> <a class="anchor-link-target" name="2"> </a> <h2>Di mana dan bagaimana penyensoran dan pengawasan terjadi <a class="anchor-link-icon" href="#2">Tautan jangkar</a></h2> <h3>Di mana <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> terjadi?</h3> <p><img alt="Komputer Anda mencoba terhubung ke https://eff.org, yang ada di alamat IP yang terdaftar (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di https://eff.org. Situs web tersebut berhasil dimuat untuk komputer Anda." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Komputer Anda mencoba terhubung ke <a href="https://eff.org">https://eff.org</a>, yang ada di <a href="/en/glossary/ip-address" class="glossify-link" data-title="alamat IP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Perangkat di internet memerlukan alamatnya sendiri untuk menerima data, seperti halnya rumah atau bisnis memerlukan alamat jalan untuk menerima surat fisik. Alamat ini adalah alamat IP-nya (Protokol Internet). Saat Anda terhubung ke situs web atau server lain secara online, Anda biasanya mengungkapkan alamat IP Anda sendiri. Ini tidak selalu mengungkapkan identitas Anda (sulit untuk memetakan alamat IP pada alamat asli atau komputer tertentu). Namun, alamat IP dapat mengungkapkan beberapa informasi tentang Anda, seperti lokasi kasar Anda atau nama Penyedia Layanan Internet Anda. Layanan seperti Tor memungkinkan Anda untuk menyembunyikan alamat IP Anda, dan ini membantu memberi Anda anonimitas di internet. " data-original-title="IP address">Alamat IP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di <a href="http://eff.org">https://eff.org</a>. Situs web tersebut berhasil dimuat untuk komputer Anda.</em></small></p> <p><img alt="Mata, yang mengawasi komputer saat mencoba untuk terkoneksi ke eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Memblokir atau memfilter di perangkat Anda.</strong>Ini sangat umum di sekolah dan tempat kerja. Seseorang yang menyiapkan atau mengelola komputer dan ponsel Anda dapat menggunakan perangkat lunak yang membatasi penggunaannya. Perangkat lunak mengubah cara kerja perangkat dan membuatnya tidak dapat mengakses situs tertentu, atau berkomunikasi online dengan cara tertentu. Spyware dapat bekerja dengan cara yang sangat mirip.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar di router jaringan rumah." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Pemfilteran jaringan lokal.</strong> Ini sangat umum di sekolah dan tempat kerja. Seseorang yang mengelola jaringan lokal Anda (seperti jaringan Wi-Fi) memberlakukan beberapa batasan pada aktivitas internet Anda, seperti memantau atau mengontrol tempat Anda online atau saat mencari kata kunci tertentu.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Pemblokiran dan pemfilteran oleh Penyedia Layanan Internet (ISP).</strong> ISP Anda umumnya dapat melakukan jenis pemfilteran yang sama dengan administrator jaringan lokal Anda. ISP di banyak negara dipaksa oleh pemerintah mereka untuk melakukan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan penyensoran secara teratur. ISP Komersial dapat melakukan pemfilteran atau penyaringan sebagai layanan untuk rumah tangga atau pemberi kerja. Penyedia layanan internet perumahan tertentu mungkin memasarkan koneksi yang difilter langsung kepada pelanggan sebagai opsi, dan secara otomatis menerapkan metode penyensoran khusus (seperti yang dijelaskan di bawah ini) pada semua koneksi di ISP mereka. Mereka mungkin melakukan ini, meskipun tidak diwajibkan oleh pemerintah, karena ada pelanggan mereka yang menginginkannya.</p> <h3>Bagaimana pemblokiran terjadi?</h3> <p><strong>Pemblokiran alamat IP.</strong> “Alamat IP” adalah lokasi komputer di internet. Setiap informasi yang dikirimkan melalui internet memiliki alamat “Kepada” dan alamat “Dari”. Penyedia Layanan Internet atau administrator jaringan dapat membuat daftar lokasi yang sesuai dengan layanan yang ingin mereka blokir. Mereka kemudian dapat memblokir informasi apa pun di jaringan yang sedang dikirimkan ke atau dari lokasi tersebut.</p> <p>Ini dapat menyebabkan pemblokiran berlebihan karena banyak layanan dapat di-hosting di lokasi, atau alamat IP, yang sama. Demikian pula, banyak orang akhirnya berbagi alamat IP apa pun yang diberikan untuk akses internet mereka.</p> <p dir="ltr"><img alt="Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut.</em></small></p> <p> </p> <p><strong>Pemblokiran DNS.</strong> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node --> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Last reviewed: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>This is an overview of network censorship, but it is not comprehensive.</em></p> <p>Governments, companies, schools, and Internet providers sometimes use software to prevent their users from accessing certain websites and services that are otherwise available on the open web. This is called <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and it is a form of censorship. Filtering comes in different forms. Even with <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, censors can block entire websites, hosting providers, or Internet technologies. Sometimes, content is blocked based on the keywords it contains. When sites aren’t encrypted, censors can also block individual web pages.</p> <p>There are different ways of beating Internet censorship. Some protect you from surveillance, but many do not. When someone who controls your net connection filters or blocks a site, you can almost always use a circumvention tool to get to the information you need.</p> <p class="warning">Note: Circumvention tools that promise privacy or security are not always private or secure. And tools that use terms like “anonymizer” do not always keep your identity completely secret.</p> <p>The circumvention tool that is best for you depends on your security plan. If you’re not sure how to create a security plan, start <a href="https://ssd.eff.org/en/node/39">here</a>. While creating a security plan, be aware that someone who controls your Internet connection may notice that you are using a particular circumvention tool or technique, and take action against you or others.<br><br> In this article, we’ll talk about understanding Internet censorship, who can perform it, and how it happens.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Understanding Internet censorship and surveillance </a> <ul><li>Censorship and surveillance: two sides of the same coin</li> <li>The Cost of Surveillance</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Where and how network censorship and surveillance happen</a> <ul><li>Where is the blocking happening?</li> <li>How is it happening?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Circumvention techniques</a> <ul><li>Changing your DNS provider to access blocked websites or services</li> <li>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) or encrypted web proxy to access blocked websites or services.</li> <li>Using the Tor Browser to access a blocked website or to protect your identity.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Understanding Internet censorship and surveillance <a class="anchor-link-icon" href="#1">Anchor link</a></h2> <p>The Internet has a lot of processes that all have to work together properly in order to get your communications from one place to another. If someone is trying to block parts of the Internet, or particular activities, they may target many different parts of the system. The methods they use may depend on what technology and devices they have control over, their knowledge, their resources, and whether they are in a position of power to tell others what to do.</p> <h3>Surveillance and Censorship: Two Sides of the Same Coin</h3> <p>Internet surveillance and censorship go hand-in-hand. Internet censorship is a two-step process:</p> <ol><li>Spot “unacceptable” activity</li> <li>Block “unacceptable” activity</li> </ol><p>Spotting “unacceptable” activity is the same as Internet surveillance. If network administrators can see where you’re going on the Internet, they can decide whether to block it. By advocating for Internet and <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> privacy tools and technologies, we can also make <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> more difficult.</p> <p>Many circumvention techniques likewise have the additional benefit of protecting your information from network eavesdroppers when you go online.</p> <h3>The Cost of Surveillance</h3> <p>Blocking Internet traffic comes at a cost, and over-blocking can come at an even greater cost. A popular example is that the Chinese government does not censor GitHub’s website, even though many anti-government newsletters are hosted on the website. Software developers need access to GitHub to perform work that is beneficial to the Chinese economy. Right now, these censors have decided that it will cost them more to block Github than they would gain by blocking it.</p> <p>Not all censors would make the same decision. For example, temporary Internet blackouts are becoming increasingly common, even though these measures can seriously harm local economies.</p> <a class="anchor-link-target" name="2"> </a> <h2>Where and how censorship and surveillance happen <a class="anchor-link-icon" href="#2">Anchor link</a></h2> <h3>Where is the <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> happening?</h3> <p><img alt="Your computer tries to connect to https://eff.org, which is at a listed IP address (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of https://eff.org. The website successfully loads for your computer." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Your computer tries to connect to <a href="https://eff.org">https://eff.org</a>, which is at a listed <a href="/en/glossary/ip-address" class="glossify-link" data-title="IP address" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. " data-original-title="IP address">IP address<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of <a href="http://eff.org">https://eff.org</a>. The website successfully loads for your computer.</em></small></p> <p><img alt="An eye, watching a computer trying to connect to eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Blocking or filtering on your devices.</strong> This is especially common in schools and workplaces. Someone who sets up or manages your computers and phones can put software on them that limits how they can be used. The software changes how the device works and can make it unable to access certain sites, or to communicate online in certain ways. Spyware can work in a very similar way.</p> <p><img alt="An eye, watching traffic going in and out of a home network router." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Local network filtering.</strong> This is especially common in schools and workplaces. Someone who manages your local network (like a WiFi network) enforces some limits on your Internet activity, like monitoring or controlling where you go online or when searching for certain keywords.</p> <p><img alt="An eye, watching traffic coming in and out of an ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Blocking or filtering by Internet Service Providers (ISPs).</strong> Your ISP can generally perform the same type of filtering as the administrator of your local network. ISPs in many countries are compelled by their government to perform regular <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and censorship. Commercial ISPs can perform filtering as a service for households or employers. Particular residential Internet service providers may market filtered connections directly to customers as an option, and automatically apply specific censorship methods (like those described below) to all connections on their ISPs. They may do this even if it isn’t required by a government, because some of their customers want it.</p> <h3>How is the blocking happening?</h3> <p><strong>IP address blocking.</strong> “IP addresses” are the locations of computers on the Internet. Every piece of information that is sent over the Internet has a “To” address and a “From” address. Internet Service Providers or network administrators can create lists of locations that correspond with services they want to block. They can then block any pieces of information on the network that are being delivered to or from those locations.</p> <p>This can lead to overblocking, since many services can be hosted at the same location, or IP address. Similarly, many people wind up sharing any given IP address for their Internet access.</p> <p dir="ltr"><img alt="In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p> <p> </p> <p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node -->
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Terakhir ditinjau: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>Ini adalah gambaran umum sensor jaringan, tetapi tidak komprehensif.</em></p> <p>Pemerintah, perusahaan, sekolah, dan penyedia internet terkadang menggunakan perangkat lunak untuk mencegah penggunanya mengakses situs web dan layanan tertentu yang tersedia di web terbuka. Ini disebut <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, dan ini merupakan bentuk penyensoran. Pemfilteran hadir dalam berbagai bentuk. Bahkan dengan <a href="/en/glossary/encryption" class="glossify-link" data-title="enkripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sebuah proses yang mengambil pesan dan membuatnya tidak dapat dibaca, kecuali oleh orang yang mengetahui cara "mendekripsinya" kembali ke bentuk yang dapat dibaca. " data-original-title="encryption">enkripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, sensor dapat memblokir seluruh situs web, penyedia hosting, atau teknologi internet. Terkadang, konten diblokir berdasarkan kata kunci yang terdapat di dalamnya. Jika situs tidak dienkripsi, sensor juga dapat memblokir halaman web individual.</p> <p>Ada berbagai cara untuk mengatasi sensor internet. Beberapa cara dapat melindungi Anda dari pengawasan, tetapi banyak yang tidak. Jika seseorang yang mengontrol koneksi internet Anda memfilter atau memblokir sebuah situs, Anda hampir selalu dapat menggunakan alat pengelakan untuk mendapatkan informasi yang Anda perlukan.</p> <p class="warning">Catatan: Alat pengelakan yang menjanjikan privasi atau keamanan tidak selalu bersifat pribadi atau aman. Dan alat yang menggunakan istilah seperti "penganonim" (anonymizer) tidak selalu merahasiakan identitas Anda sepenuhnya.</p> <p>Alat pengelakan yang terbaik untuk Anda bergantung pada rencana keamanan Anda. Jika Anda tidak mengetahui pasti cara membuat rencana keamanan, mulailah <a href="https://ssd.eff.org/en/node/39">di sini</a>. Saat membuat rencana keamanan, ketahuilah bahwa seseorang yang mengontrol koneksi internet Anda mungkin mengetahui bahwa Anda menggunakan alat atau teknik pengelakan tertentu, dan mengambil tindakan terhadap Anda atau orang lain.<br><br> Di dalam artikel ini, kita akan membahas tentang pengertian sensor internet, siapa yang dapat melakukannya, dan bagaimana hal ini terjadi.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Memahami penyensoran dan pengawasan internet </a> <ul><li>Penyensoran dan pengawasan: dua sisi mata uang yang sama</li> <li>Harga sebuah Pengawasan</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Di mana dan bagaimana penyensoran dan pengawasan jaringan terjadi</a> <ul><li>Di mana pemblokiran terjadi?</li> <li>Bagaimana ini terjadi?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Berbagai teknik pengelakan</a> <ul><li>Mengganti penyedia DNS Anda untuk mengakses situs web atau layanan yang diblokir</li> <li>Menggunakan <a href="/en/glossary/vpn" class="glossify-link" data-title="Jaringan Pribadi Virtual" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="Virtual Private Network">Jaringan Pribadi Virtual<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) atau proksi web terenkripsi untuk mengakses situs web atau layanan yang diblokir.</li> <li>Menggunakan Tor Browser untuk mengakses situs web yang diblokir atau untuk melindungi identitas Anda.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Memahami penyensoran dan pengawasan internet <a class="anchor-link-icon" href="#1">Tautan jangkar</a></h2> <p>Internet memiliki banyak proses, dan semua proses ini harus bekerja sama dengan baik untuk menyampaikan komunikasi Anda dari satu tempat ke tempat lain. Jika seseorang mencoba memblokir suatu bagian internet, atau aktivitas tertentu, dia mungkin menyasar banyak bagian sistem yang berbeda. Metode yang digunakannya mungkin bergantung pada teknologi dan perangkat apa yang dikendalikannya, pengetahuannya, sumber dayanya, dan apakah dia dalam posisi yang memiliki kuasa untuk memerintahkan orang lain.</p> <h3>Pengawasan dan Penyensoran: Dua Sisi Mata Uang yang Sama</h3> <p>Pengawasan dan penyensoran internet berjalan beriringan. Penyensoran internet adalah proses dua langkah:</p> <ol><li>Menemukan aktivitas yang “tidak dapat diterima”</li> <li>Memblokir aktivitas yang “tidak dapat diterima”</li> </ol><p>Menemukan aktivitas yang “tidak dapat diterima” sama dengan pengawasan internet. Jika administrator jaringan dapat melihat tujuan Anda di internet, mereka dapat memutuskan apakah akan memblokirnya atau tidak. Dengan mengadvokasi internet dan <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jenis informasi apa pun, biasanya disimpan dalam bentuk digital. Data dapat mencakup dokumen, gambar, kunci, program, pesan, dan informasi, atau berkas digital lainnya. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> berbagai alat dan teknologi privasi, kita juga dapat membuat <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> lebih sulit.</p> <p>Banyak teknik pengelakan juga memiliki manfaat tambahan untuk melindungi informasi Anda dari penyadap jaringan saat Anda online.</p> <h3>Harga sebuah Pengawasan</h3> <p>Memblokir lalu lintas internet memerlukan biaya, dan pemblokiran yang berlebihan dapat menimbulkan biaya yang lebih besar. Contoh yang populer adalah bahwa pemerintah Tiongkok tidak menyensor situs web GitHub, meskipun banyak buletin anti-pemerintah dimuat di situs web tersebut. Para pengembang perangkat lunak memerlukan akses ke GitHub untuk melakukan pekerjaan yang menguntungkan perekonomian Tiongkok. Saat ini, sensor-sensor ini telah memutuskan bahwa akan lebih mahal bagi mereka jika memblokir Github dibanding apa yang akan mereka peroleh dengan memblokirnya.</p> <p>Tidak semua sensor akan membuat keputusan yang sama. Misalnya, pemadaman internet sementara menjadi semakin umum, meskipun langkah-langkah ini dapat sangat merugikan ekonomi lokal.</p> <a class="anchor-link-target" name="2"> </a> <h2>Di mana dan bagaimana penyensoran dan pengawasan terjadi <a class="anchor-link-icon" href="#2">Tautan jangkar</a></h2> <h3>Di mana <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> terjadi?</h3> <p><img alt="Komputer Anda mencoba terhubung ke https://eff.org, yang ada di alamat IP yang terdaftar (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di https://eff.org. Situs web tersebut berhasil dimuat untuk komputer Anda." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Komputer Anda mencoba terhubung ke <a href="https://eff.org">https://eff.org</a>, yang ada di <a href="/en/glossary/ip-address" class="glossify-link" data-title="alamat IP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Perangkat di internet memerlukan alamatnya sendiri untuk menerima data, seperti halnya rumah atau bisnis memerlukan alamat jalan untuk menerima surat fisik. Alamat ini adalah alamat IP-nya (Protokol Internet). Saat Anda terhubung ke situs web atau server lain secara online, Anda biasanya mengungkapkan alamat IP Anda sendiri. Ini tidak selalu mengungkapkan identitas Anda (sulit untuk memetakan alamat IP pada alamat asli atau komputer tertentu). Namun, alamat IP dapat mengungkapkan beberapa informasi tentang Anda, seperti lokasi kasar Anda atau nama Penyedia Layanan Internet Anda. Layanan seperti Tor memungkinkan Anda untuk menyembunyikan alamat IP Anda, dan ini membantu memberi Anda anonimitas di internet. " data-original-title="IP address">Alamat IP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di <a href="http://eff.org">https://eff.org</a>. Situs web tersebut berhasil dimuat untuk komputer Anda.</em></small></p> <p><img alt="Mata, yang mengawasi komputer saat mencoba untuk terkoneksi ke eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Memblokir atau memfilter di perangkat Anda.</strong>Ini sangat umum di sekolah dan tempat kerja. Seseorang yang menyiapkan atau mengelola komputer dan ponsel Anda dapat menggunakan perangkat lunak yang membatasi penggunaannya. Perangkat lunak mengubah cara kerja perangkat dan membuatnya tidak dapat mengakses situs tertentu, atau berkomunikasi online dengan cara tertentu. Spyware dapat bekerja dengan cara yang sangat mirip.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar di router jaringan rumah." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Pemfilteran jaringan lokal.</strong> Ini sangat umum di sekolah dan tempat kerja. Seseorang yang mengelola jaringan lokal Anda (seperti jaringan Wi-Fi) memberlakukan beberapa batasan pada aktivitas internet Anda, seperti memantau atau mengontrol tempat Anda online atau saat mencari kata kunci tertentu.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Pemblokiran dan pemfilteran oleh Penyedia Layanan Internet (ISP).</strong> ISP Anda umumnya dapat melakukan jenis pemfilteran yang sama dengan administrator jaringan lokal Anda. ISP di banyak negara dipaksa oleh pemerintah mereka untuk melakukan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan penyensoran secara teratur. ISP Komersial dapat melakukan pemfilteran atau penyaringan sebagai layanan untuk rumah tangga atau pemberi kerja. Penyedia layanan internet perumahan tertentu mungkin memasarkan koneksi yang difilter langsung kepada pelanggan sebagai opsi, dan secara otomatis menerapkan metode penyensoran khusus (seperti yang dijelaskan di bawah ini) pada semua koneksi di ISP mereka. Mereka mungkin melakukan ini, meskipun tidak diwajibkan oleh pemerintah, karena ada pelanggan mereka yang menginginkannya.</p> <h3>Bagaimana pemblokiran terjadi?</h3> <p><strong>Pemblokiran alamat IP.</strong> “Alamat IP” adalah lokasi komputer di internet. Setiap informasi yang dikirimkan melalui internet memiliki alamat “Kepada” dan alamat “Dari”. Penyedia Layanan Internet atau administrator jaringan dapat membuat daftar lokasi yang sesuai dengan layanan yang ingin mereka blokir. Mereka kemudian dapat memblokir informasi apa pun di jaringan yang sedang dikirimkan ke atau dari lokasi tersebut.</p> <p>Ini dapat menyebabkan pemblokiran berlebihan karena banyak layanan dapat di-hosting di lokasi, atau alamat IP, yang sama. Demikian pula, banyak orang akhirnya berbagi alamat IP apa pun yang diberikan untuk akses internet mereka.</p> <p dir="ltr"><img alt="Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em> <p> </p> <p><strong> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node --> |
![]() New translation Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Last reviewed: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>This is an overview of network censorship, but it is not comprehensive.</em></p> <p>Governments, companies, schools, and Internet providers sometimes use software to prevent their users from accessing certain websites and services that are otherwise available on the open web. This is called <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and it is a form of censorship. Filtering comes in different forms. Even with <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, censors can block entire websites, hosting providers, or Internet technologies. Sometimes, content is blocked based on the keywords it contains. When sites aren’t encrypted, censors can also block individual web pages.</p> <p>There are different ways of beating Internet censorship. Some protect you from surveillance, but many do not. When someone who controls your net connection filters or blocks a site, you can almost always use a circumvention tool to get to the information you need.</p> <p class="warning">Note: Circumvention tools that promise privacy or security are not always private or secure. And tools that use terms like “anonymizer” do not always keep your identity completely secret.</p> <p>The circumvention tool that is best for you depends on your security plan. If you’re not sure how to create a security plan, start <a href="https://ssd.eff.org/en/node/39">here</a>. While creating a security plan, be aware that someone who controls your Internet connection may notice that you are using a particular circumvention tool or technique, and take action against you or others.<br><br> In this article, we’ll talk about understanding Internet censorship, who can perform it, and how it happens.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Understanding Internet censorship and surveillance </a> <ul><li>Censorship and surveillance: two sides of the same coin</li> <li>The Cost of Surveillance</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Where and how network censorship and surveillance happen</a> <ul><li>Where is the blocking happening?</li> <li>How is it happening?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Circumvention techniques</a> <ul><li>Changing your DNS provider to access blocked websites or services</li> <li>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) or encrypted web proxy to access blocked websites or services.</li> <li>Using the Tor Browser to access a blocked website or to protect your identity.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Understanding Internet censorship and surveillance <a class="anchor-link-icon" href="#1">Anchor link</a></h2> <p>The Internet has a lot of processes that all have to work together properly in order to get your communications from one place to another. If someone is trying to block parts of the Internet, or particular activities, they may target many different parts of the system. The methods they use may depend on what technology and devices they have control over, their knowledge, their resources, and whether they are in a position of power to tell others what to do.</p> <h3>Surveillance and Censorship: Two Sides of the Same Coin</h3> <p>Internet surveillance and censorship go hand-in-hand. Internet censorship is a two-step process:</p> <ol><li>Spot “unacceptable” activity</li> <li>Block “unacceptable” activity</li> </ol><p>Spotting “unacceptable” activity is the same as Internet surveillance. If network administrators can see where you’re going on the Internet, they can decide whether to block it. By advocating for Internet and <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> privacy tools and technologies, we can also make <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> more difficult.</p> <p>Many circumvention techniques likewise have the additional benefit of protecting your information from network eavesdroppers when you go online.</p> <h3>The Cost of Surveillance</h3> <p>Blocking Internet traffic comes at a cost, and over-blocking can come at an even greater cost. A popular example is that the Chinese government does not censor GitHub’s website, even though many anti-government newsletters are hosted on the website. Software developers need access to GitHub to perform work that is beneficial to the Chinese economy. Right now, these censors have decided that it will cost them more to block Github than they would gain by blocking it.</p> <p>Not all censors would make the same decision. For example, temporary Internet blackouts are becoming increasingly common, even though these measures can seriously harm local economies.</p> <a class="anchor-link-target" name="2"> </a> <h2>Where and how censorship and surveillance happen <a class="anchor-link-icon" href="#2">Anchor link</a></h2> <h3>Where is the <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> happening?</h3> <p><img alt="Your computer tries to connect to https://eff.org, which is at a listed IP address (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of https://eff.org. The website successfully loads for your computer." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Your computer tries to connect to <a href="https://eff.org">https://eff.org</a>, which is at a listed <a href="/en/glossary/ip-address" class="glossify-link" data-title="IP address" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. " data-original-title="IP address">IP address<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of <a href="http://eff.org">https://eff.org</a>. The website successfully loads for your computer.</em></small></p> <p><img alt="An eye, watching a computer trying to connect to eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Blocking or filtering on your devices.</strong> This is especially common in schools and workplaces. Someone who sets up or manages your computers and phones can put software on them that limits how they can be used. The software changes how the device works and can make it unable to access certain sites, or to communicate online in certain ways. Spyware can work in a very similar way.</p> <p><img alt="An eye, watching traffic going in and out of a home network router." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Local network filtering.</strong> This is especially common in schools and workplaces. Someone who manages your local network (like a WiFi network) enforces some limits on your Internet activity, like monitoring or controlling where you go online or when searching for certain keywords.</p> <p><img alt="An eye, watching traffic coming in and out of an ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Blocking or filtering by Internet Service Providers (ISPs).</strong> Your ISP can generally perform the same type of filtering as the administrator of your local network. ISPs in many countries are compelled by their government to perform regular <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and censorship. Commercial ISPs can perform filtering as a service for households or employers. Particular residential Internet service providers may market filtered connections directly to customers as an option, and automatically apply specific censorship methods (like those described below) to all connections on their ISPs. They may do this even if it isn’t required by a government, because some of their customers want it.</p> <h3>How is the blocking happening?</h3> <p><strong>IP address blocking.</strong> “IP addresses” are the locations of computers on the Internet. Every piece of information that is sent over the Internet has a “To” address and a “From” address. Internet Service Providers or network administrators can create lists of locations that correspond with services they want to block. They can then block any pieces of information on the network that are being delivered to or from those locations.</p> <p>This can lead to overblocking, since many services can be hosted at the same location, or IP address. Similarly, many people wind up sharing any given IP address for their Internet access.</p> <p dir="ltr"><img alt="In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p> <p> </p> <p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node -->
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Terakhir ditinjau: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>Ini adalah gambaran umum sensor jaringan, tetapi tidak komprehensif.</em></p> <p>Pemerintah, perusahaan, sekolah, dan penyedia internet terkadang menggunakan perangkat lunak untuk mencegah penggunanya mengakses situs web dan layanan tertentu yang tersedia di web terbuka. Ini disebut <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, dan ini merupakan bentuk penyensoran. Pemfilteran hadir dalam berbagai bentuk. Bahkan dengan <a href="/en/glossary/encryption" class="glossify-link" data-title="enkripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sebuah proses yang mengambil pesan dan membuatnya tidak dapat dibaca, kecuali oleh orang yang mengetahui cara "mendekripsinya" kembali ke bentuk yang dapat dibaca. " data-original-title="encryption">enkripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, sensor dapat memblokir seluruh situs web, penyedia hosting, atau teknologi internet. Terkadang, konten diblokir berdasarkan kata kunci yang terdapat di dalamnya. Jika situs tidak dienkripsi, sensor juga dapat memblokir halaman web individual.</p> <p>Ada berbagai cara untuk mengatasi sensor internet. Beberapa cara dapat melindungi Anda dari pengawasan, tetapi banyak yang tidak. Jika seseorang yang mengontrol koneksi internet Anda memfilter atau memblokir sebuah situs, Anda hampir selalu dapat menggunakan alat pengelakan untuk mendapatkan informasi yang Anda perlukan.</p> <p class="warning">Catatan: Alat pengelakan yang menjanjikan privasi atau keamanan tidak selalu bersifat pribadi atau aman. Dan alat yang menggunakan istilah seperti "penganonim" (anonymizer) tidak selalu merahasiakan identitas Anda sepenuhnya.</p> <p>Alat pengelakan yang terbaik untuk Anda bergantung pada rencana keamanan Anda. Jika Anda tidak mengetahui pasti cara membuat rencana keamanan, mulailah <a href="https://ssd.eff.org/en/node/39">di sini</a>. Saat membuat rencana keamanan, ketahuilah bahwa seseorang yang mengontrol koneksi internet Anda mungkin mengetahui bahwa Anda menggunakan alat atau teknik pengelakan tertentu, dan mengambil tindakan terhadap Anda atau orang lain.<br><br> Di dalam artikel ini, kita akan membahas tentang pengertian sensor internet, siapa yang dapat melakukannya, dan bagaimana hal ini terjadi.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Memahami penyensoran dan pengawasan internet </a> <ul><li>Penyensoran dan pengawasan: dua sisi mata uang yang sama</li> <li>Harga sebuah Pengawasan</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Di mana dan bagaimana penyensoran dan pengawasan jaringan terjadi</a> <ul><li>Di mana pemblokiran terjadi?</li> <li>Bagaimana ini terjadi?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Berbagai teknik pengelakan</a> <ul><li>Mengganti penyedia DNS Anda untuk mengakses situs web atau layanan yang diblokir</li> <li>Menggunakan <a href="/en/glossary/vpn" class="glossify-link" data-title="Jaringan Pribadi Virtual" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="Virtual Private Network">Jaringan Pribadi Virtual<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) atau proksi web terenkripsi untuk mengakses situs web atau layanan yang diblokir.</li> <li>Menggunakan Tor Browser untuk mengakses situs web yang diblokir atau untuk melindungi identitas Anda.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Memahami penyensoran dan pengawasan internet <a class="anchor-link-icon" href="#1">Tautan jangkar</a></h2> <p>Internet memiliki banyak proses, dan semua proses ini harus bekerja sama dengan baik untuk menyampaikan komunikasi Anda dari satu tempat ke tempat lain. Jika seseorang mencoba memblokir suatu bagian internet, atau aktivitas tertentu, dia mungkin menyasar banyak bagian sistem yang berbeda. Metode yang digunakannya mungkin bergantung pada teknologi dan perangkat apa yang dikendalikannya, pengetahuannya, sumber dayanya, dan apakah dia dalam posisi yang memiliki kuasa untuk memerintahkan orang lain.</p> <h3>Pengawasan dan Penyensoran: Dua Sisi Mata Uang yang Sama</h3> <p>Pengawasan dan penyensoran internet berjalan beriringan. Penyensoran internet adalah proses dua langkah:</p> <ol><li>Menemukan aktivitas yang “tidak dapat diterima”</li> <li>Memblokir aktivitas yang “tidak dapat diterima”</li> </ol><p>Menemukan aktivitas yang “tidak dapat diterima” sama dengan pengawasan internet. Jika administrator jaringan dapat melihat tujuan Anda di internet, mereka dapat memutuskan apakah akan memblokirnya atau tidak. Dengan mengadvokasi internet dan <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jenis informasi apa pun, biasanya disimpan dalam bentuk digital. Data dapat mencakup dokumen, gambar, kunci, program, pesan, dan informasi, atau berkas digital lainnya. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> berbagai alat dan teknologi privasi, kita juga dapat membuat <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> lebih sulit.</p> <p>Banyak teknik pengelakan juga memiliki manfaat tambahan untuk melindungi informasi Anda dari penyadap jaringan saat Anda online.</p> <h3>Harga sebuah Pengawasan</h3> <p>Memblokir lalu lintas internet memerlukan biaya, dan pemblokiran yang berlebihan dapat menimbulkan biaya yang lebih besar. Contoh yang populer adalah bahwa pemerintah Tiongkok tidak menyensor situs web GitHub, meskipun banyak buletin anti-pemerintah dimuat di situs web tersebut. Para pengembang perangkat lunak memerlukan akses ke GitHub untuk melakukan pekerjaan yang menguntungkan perekonomian Tiongkok. Saat ini, sensor-sensor ini telah memutuskan bahwa akan lebih mahal bagi mereka jika memblokir Github dibanding apa yang akan mereka peroleh dengan memblokirnya.</p> <p>Tidak semua sensor akan membuat keputusan yang sama. Misalnya, pemadaman internet sementara menjadi semakin umum, meskipun langkah-langkah ini dapat sangat merugikan ekonomi lokal.</p> <a class="anchor-link-target" name="2"> </a> <h2>Di mana dan bagaimana penyensoran dan pengawasan terjadi <a class="anchor-link-icon" href="#2">Tautan jangkar</a></h2> <h3>Di mana <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> terjadi?</h3> <p><img alt="Komputer Anda mencoba terhubung ke https://eff.org, yang ada di alamat IP yang terdaftar (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di https://eff.org. Situs web tersebut berhasil dimuat untuk komputer Anda." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Komputer Anda mencoba terhubung ke <a href="https://eff.org">https://eff.org</a>, yang ada di <a href="/en/glossary/ip-address" class="glossify-link" data-title="alamat IP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Perangkat di internet memerlukan alamatnya sendiri untuk menerima data, seperti halnya rumah atau bisnis memerlukan alamat jalan untuk menerima surat fisik. Alamat ini adalah alamat IP-nya (Protokol Internet). Saat Anda terhubung ke situs web atau server lain secara online, Anda biasanya mengungkapkan alamat IP Anda sendiri. Ini tidak selalu mengungkapkan identitas Anda (sulit untuk memetakan alamat IP pada alamat asli atau komputer tertentu). Namun, alamat IP dapat mengungkapkan beberapa informasi tentang Anda, seperti lokasi kasar Anda atau nama Penyedia Layanan Internet Anda. Layanan seperti Tor memungkinkan Anda untuk menyembunyikan alamat IP Anda, dan ini membantu memberi Anda anonimitas di internet. " data-original-title="IP address">Alamat IP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di <a href="http://eff.org">https://eff.org</a>. Situs web tersebut berhasil dimuat untuk komputer Anda.</em></small></p> <p><img alt="Mata, yang mengawasi komputer saat mencoba untuk terkoneksi ke eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Memblokir atau memfilter di perangkat Anda.</strong>Ini sangat umum di sekolah dan tempat kerja. Seseorang yang menyiapkan atau mengelola komputer dan ponsel Anda dapat menggunakan perangkat lunak yang membatasi penggunaannya. Perangkat lunak mengubah cara kerja perangkat dan membuatnya tidak dapat mengakses situs tertentu, atau berkomunikasi online dengan cara tertentu. Spyware dapat bekerja dengan cara yang sangat mirip.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar di router jaringan rumah." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Pemfilteran jaringan lokal.</strong> Ini sangat umum di sekolah dan tempat kerja. Seseorang yang mengelola jaringan lokal Anda (seperti jaringan Wi-Fi) memberlakukan beberapa batasan pada aktivitas internet Anda, seperti memantau atau mengontrol tempat Anda online atau saat mencari kata kunci tertentu.</p> <p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Pemblokiran dan pemfilteran oleh Penyedia Layanan Internet (ISP).</strong> ISP Anda umumnya dapat melakukan jenis pemfilteran yang sama dengan administrator jaringan lokal Anda. ISP di banyak negara dipaksa oleh pemerintah mereka untuk melakukan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan penyensoran secara teratur. ISP Komersial dapat melakukan pemfilteran atau penyaringan sebagai layanan untuk rumah tangga atau pemberi kerja. Penyedia layanan internet perumahan tertentu mungkin memasarkan koneksi yang difilter langsung kepada pelanggan sebagai opsi, dan secara otomatis menerapkan metode penyensoran khusus (seperti yang dijelaskan di bawah ini) pada semua koneksi di ISP mereka. Mereka mungkin melakukan ini, meskipun tidak diwajibkan oleh pemerintah, karena ada pelanggan mereka yang menginginkannya.</p> <h3>Bagaimana pemblokiran terjadi?</h3> <p><strong>Pemblokiran alamat IP.</strong> “Alamat IP” adalah lokasi komputer di internet. Setiap informasi yang dikirimkan melalui internet memiliki alamat “Kepada” dan alamat “Dari”. Penyedia Layanan Internet atau administrator jaringan dapat membuat daftar lokasi yang sesuai dengan layanan yang ingin mereka blokir. Mereka kemudian dapat memblokir informasi apa pun di jaringan yang sedang dikirimkan ke atau dari lokasi tersebut.</p> <p>Ini dapat menyebabkan pemblokiran berlebihan karena banyak layanan dapat di-hosting di lokasi, atau alamat IP, yang sama. Demikian pula, banyak orang akhirnya berbagi alamat IP apa pun yang diberikan untuk akses internet mereka.</p> <p dir="ltr"><img alt="Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p> <p> </p> <p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node --> |
![]() New contributor Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
New contributor
2 days ago
|
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
</div>
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Last reviewed: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>This is an overview of network censorship, but it is not comprehensive.</em></p> <p>Governments, companies, schools, and Internet providers sometimes use software to prevent their users from accessing certain websites and services that are otherwise available on the open web. This is called <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and it is a form of censorship. Filtering comes in different forms. Even with <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, censors can block entire websites, hosting providers, or Internet technologies. Sometimes, content is blocked based on the keywords it contains. When sites aren’t encrypted, censors can also block individual web pages.</p> <p>There are different ways of beating Internet censorship. Some protect you from surveillance, but many do not. When someone who controls your net connection filters or blocks a site, you can almost always use a circumvention tool to get to the information you need.</p> <p class="warning">Note: Circumvention tools that promise privacy or security are not always private or secure. And tools that use terms like “anonymizer” do not always keep your identity completely secret.</p> <p>The circumvention tool that is best for you depends on your security plan. If you’re not sure how to create a security plan, start <a href="https://ssd.eff.org/en/node/39">here</a>. While creating a security plan, be aware that someone who controls your Internet connection may notice that you are using a particular circumvention tool or technique, and take action against you or others.<br><br> In this article, we’ll talk about understanding Internet censorship, who can perform it, and how it happens.</p> <ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Understanding Internet censorship and surveillance </a> <ul><li>Censorship and surveillance: two sides of the same coin</li> <li>The Cost of Surveillance</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Where and how network censorship and surveillance happen</a> <ul><li>Where is the blocking happening?</li> <li>How is it happening?</li> </ul></li> <li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Circumvention techniques</a> <ul><li>Changing your DNS provider to access blocked websites or services</li> <li>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) or encrypted web proxy to access blocked websites or services.</li> <li>Using the Tor Browser to access a blocked website or to protect your identity.</li> </ul></li> </ul><a class="anchor-link-target" name="1"> </a> <h2>Understanding Internet censorship and surveillance <a class="anchor-link-icon" href="#1">Anchor link</a></h2> <p>The Internet has a lot of processes that all have to work together properly in order to get your communications from one place to another. If someone is trying to block parts of the Internet, or particular activities, they may target many different parts of the system. The methods they use may depend on what technology and devices they have control over, their knowledge, their resources, and whether they are in a position of power to tell others what to do.</p> <h3>Surveillance and Censorship: Two Sides of the Same Coin</h3> <p>Internet surveillance and censorship go hand-in-hand. Internet censorship is a two-step process:</p> <ol><li>Spot “unacceptable” activity</li> <li>Block “unacceptable” activity</li> </ol><p>Spotting “unacceptable” activity is the same as Internet surveillance. If network administrators can see where you’re going on the Internet, they can decide whether to block it. By advocating for Internet and <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> privacy tools and technologies, we can also make <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> more difficult.</p> <p>Many circumvention techniques likewise have the additional benefit of protecting your information from network eavesdroppers when you go online.</p> <h3>The Cost of Surveillance</h3> <p>Blocking Internet traffic comes at a cost, and over-blocking can come at an even greater cost. A popular example is that the Chinese government does not censor GitHub’s website, even though many anti-government newsletters are hosted on the website. Software developers need access to GitHub to perform work that is beneficial to the Chinese economy. Right now, these censors have decided that it will cost them more to block Github than they would gain by blocking it.</p> <p>Not all censors would make the same decision. For example, temporary Internet blackouts are becoming increasingly common, even though these measures can seriously harm local economies.</p> <a class="anchor-link-target" name="2"> </a> <h2>Where and how censorship and surveillance happen <a class="anchor-link-icon" href="#2">Anchor link</a></h2> <h3>Where is the <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> happening?</h3> <p><img alt="Your computer tries to connect to https://eff.org, which is at a listed IP address (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of https://eff.org. The website successfully loads for your computer." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p> <p><small><em>Your computer tries to connect to <a href="https://eff.org">https://eff.org</a>, which is at a listed <a href="/en/glossary/ip-address" class="glossify-link" data-title="IP address" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. " data-original-title="IP address">IP address<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of <a href="http://eff.org">https://eff.org</a>. The website successfully loads for your computer.</em></small></p> <p><img alt="An eye, watching a computer trying to connect to eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p> <p><strong>(1) Blocking or filtering on your devices.</strong> This is especially common in schools and workplaces. Someone who sets up or manages your computers and phones can put software on them that limits how they can be used. The software changes how the device works and can make it unable to access certain sites, or to communicate online in certain ways. Spyware can work in a very similar way.</p> <p><img alt="An eye, watching traffic going in and out of a home network router." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p> <p><strong>(2) Local network filtering.</strong> This is especially common in schools and workplaces. Someone who manages your local network (like a WiFi network) enforces some limits on your Internet activity, like monitoring or controlling where you go online or when searching for certain keywords.</p> <p><img alt="An eye, watching traffic coming in and out of an ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p> <p><strong>(3) Blocking or filtering by Internet Service Providers (ISPs).</strong> Your ISP can generally perform the same type of filtering as the administrator of your local network. ISPs in many countries are compelled by their government to perform regular <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and censorship. Commercial ISPs can perform filtering as a service for households or employers. Particular residential Internet service providers may market filtered connections directly to customers as an option, and automatically apply specific censorship methods (like those described below) to all connections on their ISPs. They may do this even if it isn’t required by a government, because some of their customers want it.</p> <h3>How is the blocking happening?</h3> <p><strong>IP address blocking.</strong> “IP addresses” are the locations of computers on the Internet. Every piece of information that is sent over the Internet has a “To” address and a “From” address. Internet Service Providers or network administrators can create lists of locations that correspond with services they want to block. They can then block any pieces of information on the network that are being delivered to or from those locations.</p> <p>This can lead to overblocking, since many services can be hosted at the same location, or IP address. Similarly, many people wind up sharing any given IP address for their Internet access.</p> <p dir="ltr"><img alt="In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p> <p> </p> <p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p> <p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p> <h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p> <p><a class="anchor-link-target" name="3" id="3"> </a></p> <h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p> <p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p> <h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p> <h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p> <p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p> <h3>Using the Tor Browser</h3> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p> <p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p> <p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p> </div> </div> </div> <!-- /.node --> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
</div>
</div>
</div>
</div> |
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
</section>
</section>
|
![]() Translation changed Surveillance Self-Defense (Extracts) / Understanding and Circumventing Network Censorship — Indonesian |
<div class="breadcrumb">
<a href="/en/module-categories/further-learning">Further Learning</a> </div>
<div class="breadcrumb">
<a href="/en/module-categories/further-learning">Pembela |
9 | File in original format as translated in the repository | Plain text file | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
9 | All strings, converted files enriched with comments; suitable for offline translation | Android String Resource | CSV | JSON | gettext PO | iOS strings | TBX | TMX | XLIFF 1.1 with gettext extensions | XLIFF 1.1 | XLSX |
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Last reviewed: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>This is an overview of network censorship, but it is not comprehensive.</em></p>
<p>Governments, companies, schools, and Internet providers sometimes use software to prevent their users from accessing certain websites and services that are otherwise available on the open web. This is called <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and it is a form of censorship. Filtering comes in different forms. Even with <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, censors can block entire websites, hosting providers, or Internet technologies. Sometimes, content is blocked based on the keywords it contains. When sites aren’t encrypted, censors can also block individual web pages.</p>
<p>There are different ways of beating Internet censorship. Some protect you from surveillance, but many do not. When someone who controls your net connection filters or blocks a site, you can almost always use a circumvention tool to get to the information you need.</p>
<p class="warning">Note: Circumvention tools that promise privacy or security are not always private or secure. And tools that use terms like “anonymizer” do not always keep your identity completely secret.</p>
<p>The circumvention tool that is best for you depends on your security plan. If you’re not sure how to create a security plan, start <a href="https://ssd.eff.org/en/node/39">here</a>. While creating a security plan, be aware that someone who controls your Internet connection may notice that you are using a particular circumvention tool or technique, and take action against you or others.<br><br>
In this article, we’ll talk about understanding Internet censorship, who can perform it, and how it happens.</p>
<ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Understanding Internet censorship and surveillance </a>
<ul><li>Censorship and surveillance: two sides of the same coin</li>
<li>The Cost of Surveillance</li>
</ul></li>
<li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Where and how network censorship and surveillance happen</a>
<ul><li>Where is the blocking happening?</li>
<li>How is it happening?</li>
</ul></li>
<li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Circumvention techniques</a>
<ul><li>Changing your DNS provider to access blocked websites or services</li>
<li>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) or encrypted web proxy to access blocked websites or services.</li>
<li>Using the Tor Browser to access a blocked website or to protect your identity.</li>
</ul></li>
</ul><a class="anchor-link-target" name="1"> </a> <h2>Understanding Internet censorship and surveillance <a class="anchor-link-icon" href="#1">Anchor link</a></h2>
<p>The Internet has a lot of processes that all have to work together properly in order to get your communications from one place to another. If someone is trying to block parts of the Internet, or particular activities, they may target many different parts of the system. The methods they use may depend on what technology and devices they have control over, their knowledge, their resources, and whether they are in a position of power to tell others what to do.</p>
<h3>Surveillance and Censorship: Two Sides of the Same Coin</h3>
<p>Internet surveillance and censorship go hand-in-hand. Internet censorship is a two-step process:</p>
<ol><li>Spot “unacceptable” activity</li>
<li>Block “unacceptable” activity</li>
</ol><p>Spotting “unacceptable” activity is the same as Internet surveillance. If network administrators can see where you’re going on the Internet, they can decide whether to block it. By advocating for Internet and <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> privacy tools and technologies, we can also make <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> more difficult.</p>
<p>Many circumvention techniques likewise have the additional benefit of protecting your information from network eavesdroppers when you go online.</p>
<h3>The Cost of Surveillance</h3>
<p>Blocking Internet traffic comes at a cost, and over-blocking can come at an even greater cost. A popular example is that the Chinese government does not censor GitHub’s website, even though many anti-government newsletters are hosted on the website. Software developers need access to GitHub to perform work that is beneficial to the Chinese economy. Right now, these censors have decided that it will cost them more to block Github than they would gain by blocking it.</p>
<p>Not all censors would make the same decision. For example, temporary Internet blackouts are becoming increasingly common, even though these measures can seriously harm local economies.</p>
<a class="anchor-link-target" name="2"> </a> <h2>Where and how censorship and surveillance happen <a class="anchor-link-icon" href="#2">Anchor link</a></h2>
<h3>Where is the <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> happening?</h3>
<p><img alt="Your computer tries to connect to https://eff.org, which is at a listed IP address (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of https://eff.org. The website successfully loads for your computer." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p>
<p><small><em>Your computer tries to connect to <a href="https://eff.org">https://eff.org</a>, which is at a listed <a href="/en/glossary/ip-address" class="glossify-link" data-title="IP address" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A device on the Internet needs its own address to receive data, just like a home or business needs a street address to receive physical mail. This address is its IP (Internet Protocol) address. When you connect to a website or other server online, you usually reveal your own IP address. This doesn't necessarily reveal either your identity (it's hard to map an IP address to a real address or a particular computer). An IP address can give away some information about you, however, such as your rough location or the name of your Internet Service Provider. Services like Tor let you hide your IP address, which helps give you anonymity online. " data-original-title="IP address">IP address<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (the numbered sequence beside the server associated with EFF’s website). The request for that website is made and passed along to various devices, such as your home network router and your Internet Service Provider (ISP), before reaching the intended IP address of <a href="http://eff.org">https://eff.org</a>. The website successfully loads for your computer.</em></small></p>
<p><img alt="An eye, watching a computer trying to connect to eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p>
<p><strong>(1) Blocking or filtering on your devices.</strong> This is especially common in schools and workplaces. Someone who sets up or manages your computers and phones can put software on them that limits how they can be used. The software changes how the device works and can make it unable to access certain sites, or to communicate online in certain ways. Spyware can work in a very similar way.</p>
<p><img alt="An eye, watching traffic going in and out of a home network router." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p>
<p><strong>(2) Local network filtering.</strong> This is especially common in schools and workplaces. Someone who manages your local network (like a WiFi network) enforces some limits on your Internet activity, like monitoring or controlling where you go online or when searching for certain keywords.</p>
<p><img alt="An eye, watching traffic coming in and out of an ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p>
<p><strong>(3) Blocking or filtering by Internet Service Providers (ISPs).</strong> Your ISP can generally perform the same type of filtering as the administrator of your local network. ISPs in many countries are compelled by their government to perform regular <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Internet filtering" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="Internet filtering">Internet filtering<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and censorship. Commercial ISPs can perform filtering as a service for households or employers. Particular residential Internet service providers may market filtered connections directly to customers as an option, and automatically apply specific censorship methods (like those described below) to all connections on their ISPs. They may do this even if it isn’t required by a government, because some of their customers want it.</p>
<h3>How is the blocking happening?</h3>
<p><strong>IP address blocking.</strong> “IP addresses” are the locations of computers on the Internet. Every piece of information that is sent over the Internet has a “To” address and a “From” address. Internet Service Providers or network administrators can create lists of locations that correspond with services they want to block. They can then block any pieces of information on the network that are being delivered to or from those locations.</p>
<p>This can lead to overblocking, since many services can be hosted at the same location, or IP address. Similarly, many people wind up sharing any given IP address for their Internet access.</p>
<p dir="ltr"><img alt="In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the Internet Service Provider cross-checks the requested IP address against a list of blocked IP addresses. It determines that the IP address for eff.org matches that of a blocked IP address, and blocks the request to the website.</em></small></p>
<p> </p>
<p><strong>DNS blocking.</strong> Your device asks computers called “DNS resolvers” where sites are located. When you connect to the Internet, the default DNS resolver your device uses typically belongs to your Internet Service Provider. An ISP can program its DNS resolver to give an incorrect answer, or no answer, whenever a user tries to look up the location of a blocked site or service. If you change your DNS resolver, but your DNS connection isn’t encrypted, your ISP can still selectively block or change answers for blocked services.</p>
<p><img alt="In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the request for eff.org’s IP address is modified at the Internet Service Provider level. The ISP interferes with the DNS resolver, and the IP address is redirected to give an incorrect answer or no answer.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p><strong>Keyword filtering.</strong> If traffic is unencrypted, Internet Service Providers can block web pages based on their contents. With a general increase in encrypted sites, this type of filtering is becoming less popular.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">One caveat is that administrators can <a href="/en/glossary/decrypt" class="glossify-link" data-title="decrypt" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Make a scrambled message or data intelligible. The goal of encryption is to make messages that can only be decrypted by the person or people who are meant to receive them. " data-original-title="decrypt">decrypt<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> encrypted activity if users install a trusted “CA certificate” provided by the administrators of their device. Since the user of a device must install the certificate, this is a more common practice for local networks at workplaces and schools, but less common at the ISP-level.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>On an unencrypted website connection, an Internet Service Provider (ISP) is able to check the content of a site against its blocked content types. In this example, mentioning free speech leads to an automatic block of a website.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> site filtering. </strong>When accessing sites over HTTPS, all of the content is encrypted except the name of the site. Since they can still see the site name, Internet Service Providers or local network administrators can decide which sites to block access to.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, a computer attempts to access eff.org/deeplinks. The network administrator (represented by a router) is able to see domain (eff.org) but not the full website address after the slash. The network administrator can decide which domains to block access to.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protocol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A communications protocol is a way of sending data between programs or computers. Software programs that use the same protocol can talk to each other: so web browsers and web servers speak the same protocol, called "http". Some protocols use encryption to protect their contents. The secure version of the http protocol is called "https". Another example of an encrypted protocol used by many different programs is OTR (Off-the-Record), a protocol for secure instant messaging. " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p>
<h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p>
<p><a class="anchor-link-target" name="3" id="3"> </a></p>
<h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p>
<p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p>
<p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p>
<h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Filtering is a polite term for blocking or censoring Internet traffic. Virtual Private Networks or services like Tor are sometimes used to access Internet communications that would otherwise be filtered. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p>
<h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p>
<h3>Using the Tor Browser</h3>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p>
<p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above.</p>
</div> </div>
</div> <!-- /.node -->
<div class="field field-name-field-updated field-type-datestamp field-label-inline clearfix field-wrapper"><div class="field-label">Terakhir ditinjau: </div><span class="date-display-single">4-25-2020</span></div><div class="body field"><p><em>Ini adalah gambaran umum sensor jaringan, tetapi tidak komprehensif.</em></p>
<p>Pemerintah, perusahaan, sekolah, dan penyedia internet terkadang menggunakan perangkat lunak untuk mencegah penggunanya mengakses situs web dan layanan tertentu yang tersedia di web terbuka. Ini disebut <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblo
ckirang" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, dan ini merupakan bentuk penyensoran. Pemfilteran hadir dalam berbagai bentuk. Bahkan dengan <a href="/en/glossary/encryption" class="glossify-link" data-title="enkripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sebuah proses yang mengambil pesan dan membuatnya tidak dapat dibaca, kecuali oleh orang yang mengetahui cara "mendekripsinya" kembali ke bentuk yang dapat dibaca. " data-original-title="encryption">enkripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, sensor dapat memblokir seluruh situs web, penyedia hosting, atau teknologi internet. Terkadang, konten diblokir berdasarkan kata kunci yang terdapat di dalamnya. Jika situs tidak dienkripsi, sensor juga dapat memblokir halaman web individual.</p><p>Ada berbagai cara untuk mengatasi sensor internet. Beberapa cara dapat melindungi Anda dari pengawasan, tetapi banyak yang tidak. Jika seseorang yang mengontrol koneksi internet Anda memfilter atau memblokir sebuah situs, Anda hampir selalu dapat menggunakan alat pengelakan untuk mendapatkan informasi yang Anda perlukan.</p>
<p class="warning">Catatan: Alat pengelakan yang menjanjikan privasi atau keamanan tidak selalu bersifat pribadi atau aman. Dan alat yang menggunakan istilah seperti "penganonim" (anonymizer) tidak selalu merahasiakan identitas Anda sepenuhnya.</p>
<p>Alat pengelakan yang terbaik untuk Anda bergantung pada rencana keamanan Anda. Jika Anda tidak mengetahui pasti cara membuat rencana keamanan, mulailah <a href="https://ssd.eff.org/en/node/39">di sini</a>. Saat membuat rencana keamanan, ketahuilah bahwa seseorang yang mengontrol koneksi internet Anda mungkin mengetahui bahwa Anda menggunakan alat atau teknik pengelakan tertentu, dan mengambil tindakan terhadap Anda atau orang lain.<br><br>
Di dalam artikel ini, kita akan membahas tentang pengertian sensor internet, siapa yang dapat melakukannya, dan bagaimana hal ini terjadi.</p>
<ul><li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#1">Memahami penyensoran dan pengawasan internet </a>
<ul><li>Penyensoran dan pengawasan: dua sisi mata uang yang sama</li>
<li>Harga sebuah Pengawasan</li>
</ul></li>
<li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#2">Di mana dan bagaimana penyensoran dan pengawasan jaringan terjadi</a>
<ul><li>Di mana pemblokiran terjadi?</li>
<li>Bagaimana ini terjadi?</li>
</ul></li>
<li><a href="https://ssd.eff.org/en/module/understanding-and-circumventing-network-censorship#3">Berbagai teknik pengelakan</a>
<ul><li>Mengganti penyedia DNS Anda untuk mengakses situs web atau layanan yang diblokir</li>
<li>Menggunakan <a href="/en/glossary/vpn" class="glossify-link" data-title="Jaringan Pribadi Virtual" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="Virtual Private Network">Jaringan Pribadi Virtual<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (<a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>) atau proksi web terenkripsi untuk mengakses situs web atau layanan yang diblokir.</li>
<li>Menggunakan Tor Browser untuk mengakses situs web yang diblokir atau untuk melindungi identitas Anda.</li>
</ul></li>
</ul><a class="anchor-link-target" name="1"> </a> <h2>Memahami penyensoran dan pengawasan internet <a class="anchor-link-icon" href="#1">Tautan jangkar</a></h2>
<p>Internet memiliki banyak proses, dan semua proses ini harus bekerja sama dengan baik untuk menyampaikan komunikasi Anda dari satu tempat ke tempat lain. Jika seseorang mencoba memblokir suatu bagian internet, atau aktivitas tertentu, dia mungkin menyasar banyak bagian sistem yang berbeda. Metode yang digunakannya mungkin bergantung pada teknologi dan perangkat apa yang dikendalikannya, pengetahuannya, sumber dayanya, dan apakah dia dalam posisi yang memiliki kuasa untuk memerintahkan orang lain.</p>
<h3>Pengawasan dan Penyensoran: Dua Sisi Mata Uang yang Sama</h3>
<p>Pengawasan dan penyensoran internet berjalan beriringan. Penyensoran internet adalah proses dua langkah:</p>
<ol><li>Menemukan aktivitas yang “tidak dapat diterima”</li>
<li>Memblokir aktivitas yang “tidak dapat diterima”</li>
</ol><p>Menemukan aktivitas yang “tidak dapat diterima” sama dengan pengawasan internet. Jika administrator jaringan dapat melihat tujuan Anda di internet, mereka dapat memutuskan apakah akan memblokirnya atau tidak. Dengan mengadvokasi internet dan <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jenis informasi apa pun, biasanya disimpan dalam bentuk digital. Data dapat mencakup dokumen, gambar, kunci, program, pesan, dan informasi, atau berkas digital lainnya. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> berbagai alat dan teknologi privasi, kita juga dapat membuat <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> lebih sulit.</p>
<p>Banyak teknik pengelakan juga memiliki manfaat tambahan untuk melindungi informasi Anda dari penyadap jaringan saat Anda online.</p>
<h3>Harga sebuah Pengawasan</h3>
<p>Memblokir lalu lintas internet memerlukan biaya, dan pemblokiran yang berlebihan dapat menimbulkan biaya yang lebih besar. Contoh yang populer adalah bahwa pemerintah Tiongkok tidak menyensor situs web GitHub, meskipun banyak buletin anti-pemerintah dimuat di situs web tersebut. Para pengembang perangkat lunak memerlukan akses ke GitHub untuk melakukan pekerjaan yang menguntungkan perekonomian Tiongkok. Saat ini, sensor-sensor ini telah memutuskan bahwa akan lebih mahal bagi mereka jika memblokir Github dibanding apa yang akan mereka peroleh dengan memblokirnya.</p>
<p>Tidak semua sensor akan membuat keputusan yang sama. Misalnya, pemadaman internet sementara menjadi semakin umum, meskipun langkah-langkah ini dapat sangat merugikan ekonomi lokal.</p>
<a class="anchor-link-target" name="2"> </a> <h2>Di mana dan bagaimana penyensoran dan pengawasan terjadi <a class="anchor-link-icon" href="#2">Tautan jangkar</a></h2>
<h3>Di mana <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> terjadi?</h3>
<p><img alt="Komputer Anda mencoba terhubung ke https://eff.org, yang ada di alamat IP yang terdaftar (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di https://eff.org. Situs web tersebut berhasil dimuat untuk komputer Anda." src="/files/2020/04/25/circumvention-overview.png" style="width: 600px; height: 300px;"></p>
<p><small><em>Komputer Anda mencoba terhubung ke <a href="https://eff.org">https://eff.org</a>, yang ada di <a href="/en/glossary/ip-address" class="glossify-link" data-title="alamat IP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Perangkat di internet memerlukan alamatnya sendiri untuk menerima data, seperti halnya rumah atau bisnis memerlukan alamat jalan untuk menerima surat fisik. Alamat ini adalah alamat IP-nya (Protokol Internet). Saat Anda terhubung ke situs web atau server lain secara online, Anda biasanya mengungkapkan alamat IP Anda sendiri. Ini tidak selalu mengungkapkan identitas Anda (sulit untuk memetakan alamat IP pada alamat asli atau komputer tertentu). Namun, alamat IP dapat mengungkapkan beberapa informasi tentang Anda, seperti lokasi kasar Anda atau nama Penyedia Layanan Internet Anda. Layanan seperti Tor memungkinkan Anda untuk menyembunyikan alamat IP Anda, dan ini membantu memberi Anda anonimitas di internet. " data-original-title="IP address">Alamat IP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (urutan bernomor di samping server yang terkait dengan situs web EFF). Permintaan untuk situs web itu dibuat dan diteruskan ke berbagai perangkat, seperti router jaringan rumah dan Penyedia Layanan Internet (ISP) Anda, sebelum mencapai alamat IP yang dimaksud di <a href="http://eff.org">https://eff.org</a>. Situs web tersebut berhasil dimuat untuk komputer Anda.</em></small></p>
<p><img alt="Mata, yang mengawasi komputer saat mencoba untuk terkoneksi ke eff.org." src="/files/2020/04/25/circumvention-device.png" style="height: 200px; width: 150px;"></p>
<p><strong>(1) Memblokir atau memfilter di perangkat Anda.</strong>Ini sangat umum di sekolah dan tempat kerja. Seseorang yang menyiapkan atau mengelola komputer dan ponsel Anda dapat menggunakan perangkat lunak yang membatasi penggunaannya. Perangkat lunak mengubah cara kerja perangkat dan membuatnya tidak dapat mengakses situs tertentu, atau berkomunikasi online dengan cara tertentu. Spyware dapat bekerja dengan cara yang sangat mirip.</p>
<p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar di router jaringan rumah." src="/files/2020/04/27/circumvention-router-small.png.jpeg" style="width: 150px; height: 150px;"></p>
<p><strong>(2) Pemfilteran jaringan lokal.</strong> Ini sangat umum di sekolah dan tempat kerja. Seseorang yang mengelola jaringan lokal Anda (seperti jaringan Wi-Fi) memberlakukan beberapa batasan pada aktivitas internet Anda, seperti memantau atau mengontrol tempat Anda online atau saat mencari kata kunci tertentu.</p>
<p><img alt="Mata, yang mengawasi lalu lintas masuk dan keluar ISP." src="/files/2020/04/25/circumvention-isp_0.png" style="width: 150px; height: 200px;"></p>
<p><strong>(3) Pemblokiran dan pemfilteran oleh Penyedia Layanan Internet (ISP).</strong> ISP Anda umumnya dapat melakukan jenis pemfilteran yang sama dengan administrator jaringan lokal Anda. ISP di banyak negara dipaksa oleh pemerintah mereka untuk melakukan <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="Pemfilteran internet" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="Internet filtering">Pemfilteran internet<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan penyensoran secara teratur. ISP Komersial dapat melakukan pemfilteran atau penyaringan sebagai layanan untuk rumah tangga atau pemberi kerja. Penyedia layanan internet perumahan tertentu mungkin memasarkan koneksi yang difilter langsung kepada pelanggan sebagai opsi, dan secara otomatis menerapkan metode penyensoran khusus (seperti yang dijelaskan di bawah ini) pada semua koneksi di ISP mereka. Mereka mungkin melakukan ini, meskipun tidak diwajibkan oleh pemerintah, karena ada pelanggan mereka yang menginginkannya.</p>
<h3>Bagaimana pemblokiran terjadi?</h3>
<p><strong>Pemblokiran alamat IP.</strong> “Alamat IP” adalah lokasi komputer di internet. Setiap informasi yang dikirimkan melalui internet memiliki alamat “Kepada” dan alamat “Dari”. Penyedia Layanan Internet atau administrator jaringan dapat membuat daftar lokasi yang sesuai dengan layanan yang ingin mereka blokir. Mereka kemudian dapat memblokir informasi apa pun di jaringan yang sedang dikirimkan ke atau dari lokasi tersebut.</p>
<p>Ini dapat menyebabkan pemblokiran berlebihan karena banyak layanan dapat di-hosting di lokasi, atau alamat IP, yang sama. Demikian pula, banyak orang akhirnya berbagi alamat IP apa pun yang diberikan untuk akses internet mereka.</p>
<p dir="ltr"><img alt="Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut." src="/files/2020/04/25/circumvention-ipaddressblocking.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" id="docs-internal-guid-8c95c95a-7fff-3891-fe34-c07a7a93cc43" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, Penyedia Layanan Internet memeriksa silang alamat IP yang diminta terhadap daftar alamat IP yang diblokir. Ini menentukan apakah alamat IP untuk eff.org tersebut sama dengan alamat IP yang diblokir, dan memblokir permintaan ke situs web tersebut.</em></small></p>
<p> </p>
<p><strong>Pemblokiran DNS.</strong> Perangkat Anda meminta komputer yang disebut “DNS resolver” (penyelesai DNS) di tempat situs berada. Saat Anda terkoneksi ke internet, DNS resolver standar yang digunakan perangkat Anda biasanya milik Penyedia Layanan Internet Anda. ISP dapat memprogram DNS resolver-nya agar memberikan jawaban yang salah, atau tidak ada jawaban, setiap kali pengguna mencoba mencari lokasi situs atau layanan yang diblokir. Jika Anda mengubah DNS resolver, tetapi koneksi DNS Anda tidak dienkripsi, ISP Anda masih dapat memblokir atau mengubah jawaban secara selektif untuk layanan yang diblokir.</p>
<p><img alt="Dalam diagram ini, permintaan untuk alamat IP eff.org dimodifikasi di tingkat Penyedia Layanan Internet. ISP mengganggu DNS resolver, lalu alamat IP dialihkan untuk memberikan jawaban yang salah atau tidak ada jawaban." src="/files/2020/04/25/circumvention-dnsblocking.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Dalam diagram ini, permintaan alamat untuk IP eff.org dimodifikasi di tingkat Penyedia Layanan Internet. ISP mengganggu DNS resolver, lalu alamat IP dialihkan untuk memberikan jawaban yang salah atau tidak ada jawaban.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p><strong>Pemfilteran kata kunci.</strong> Jika lalu lintas tidak terenkripsi, Penyedia Layanan Internet dapat memblokir halaman web berdasarkan kontennya. Dengan peningkatan umum dalam situs terenkripsi, jenis pemfilteran ini menjadi kurang populer.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Satu peringatan adalah bahwa administrator bisa <a href="/en/glossary/decrypt" class="glossify-link" data-title="mendekripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Membuat pesan atau data yang diacak dapat dipahami. Tujuan enkripsi adalah untuk membuat pesan yang hanya dapat didekripsi oleh orang atau orang-orang yang dimaksudkan untuk menerimanya. " data-original-title="decrypt">mendekripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> aktivitas terenkripsi jika pengguna menginstal “sertifikat CA” tepercaya yang disediakan oleh administrator perangkatnya. Karena pengguna perangkat harus menginstal sertifikat, ini adalah praktik yang lebih umum untuk jaringan lokal di tempat kerja dan sekolah, tetapi kurang umum di tingkat ISP.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Pada koneksi situs web yang tidak terenkripsi, Penyedia Layanan Internet (ISP) dapat memeriksa konten situs dengan membandingkannya ke jenis konten yang diblokir. Dalam contoh ini, menyebutkan kebebasan berbicara mengarah ke pemblokiran otomatis situs web." src="/files/2020/04/25/circumvention-keywordfiltering.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Pada koneksi situs web yang tidak terenkripsi, Penyedia Layanan Internet (ISP) dapat memeriksa konten situs dengan membandingkannya ke jenis konten yang diblokir. Dalam contoh ini, menyebutkan kebebasan berbicara mengarah ke pemblokiran otomatis situs web.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jika Anda pernah melihat alamat web dieja sebagai “http://www.example.com/”, Anda akan mengenali bagian “http” pada istilah ini. HTTP (protokol transfer hiperteks) adalah cara peramban web di mesin Anda berbicara
ke server web jarak jauh. Sayangnya, http standar mengirimkan teks secara tidak aman melalui internet. HTTPS (S adalah singkatan dari “secure” (aman)) menggunakan enkripsi untuk lebih baik melindungi data yang Anda kirimkan ke situs web, dan informasi yang mereka kembalikan kepada Anda, dari orang yang ingin melihatnya. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dalam pemfilteran situs. </strong>Jika mengakses situs melalui HTTPS, semua konten dienkripsi, kecuali nama situs. Karena mereka masih dapat melihat nama situs, Penyedia Layanan Internet atau administrator jaringan lokal dapat memutuskan akses ke situs mana yang akan diblokir.</p>dengan server web jarak jauh. Sayangnya, http standar mengirimkan teks secara tidak aman melalui internet. HTTPS (S adalah singkatan dari “secure” (aman)) menggunakan enkripsi agar lebih baik melindungi data yang Anda kirimkan ke situs web, dan informasi yang mereka kembalikan kepada Anda, dari orang yang ingin melihatnya. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dalam pemfilteran situs. </strong>Jika mengakses situs melalui HTTPS, semua konten dienkripsi, kecuali nama situs. Karena mereka masih dapat melihat nama situs, Penyedia Layanan Internet atau administrator jaringan lokal dapat memutuskan akses ke situs mana yang akan diblokir.</p><p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Di dalam diagram ini, komputer mencoba mengakses eff.org/deeplinks. Administrator jaringan (diwakili oleh router) dapat melihat domain (eff.org), tetapi bukan alamat situs web lengkap setelah garis miring. Administrator jaringan dapat memutuskan akses ke domain mana yang akan diblokir." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, komputer mencoba mengakses eff.org/deeplinks. Administrator jaringan (diwakili oleh router) dapat melihat domain (eff.org), tetapi bukan alamat situs web lengkap setelah garis miring. Administrator jaringan dapat memutuskan akses ke domain mana yang akan diblokir.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protokol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Protokol komunikasi adalah cara pengiriman data antar program atau komputer. Program perangkat lunak yang menggunakan protokol yang sama dapat berbicara satu sama lain: jadi, peramban web dan server web menggunakan protokol yang sama, disebut "http". Beberapa protokol menggunakan enkripsi untuk melindungi kontennya. Versi aman dari protokol http disebut "https". Contoh lain protokol terenkripsi yang digunakan oleh banyak program berbeda adalah OTR (Off-the-Record), sebuah protokol untuk pengiriman pesan instan yang aman... " data-original-title="Protocol">Protocol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> and port blocking.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A tool that protects a computer from unwanted connections to or from local networks and the Internet. A firewall might have rules that forbid outgoing email, or connections to certain websites. Firewalls can be used as a first line of defense to protect a device from unexpected interference. They can also be used to prevent users from accessing the Internet in certain ways. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or router might try to identify what kind of Internet technology someone is using to communicate, and block certain ones by recognizing technical details of how they communicate (protocols and port numbers are examples of information that can be used to identify what technology is being used). If the firewall can correctly recognize what kind of communication is happening or what technology is being used, it can be configured not to pass that communication along. For example, some networks might block the technologies used by certain <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (Internet phone call) or <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> applications.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the router recognizes a computer attempting to connect to an HTTPS site, which uses Port 443. Port 443 is on this router’s list of blocked protocols.</em></small></p>
<h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Other types of blocking</h3>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Usually, blocking and filtering is used to prevent people from accessing specific sites or services. However, different types of blocking are becoming more common as well.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Network shutdown.</strong> A network shutdown could also involve physically unplugging network infrastructure, like routers, network cables, or cellular towers, so that connections are physically prevented or are so bad that they are unusable.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">This can be a special case of IP address blocking, in which all or most IP addresses are blocked. Because it’s often possible to tell what country an IP address is used in, some countries have also experimented with temporarily blocking all or most foreign IP addresses, allowing some connections within the country but blocking most connections going outside the country.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>A computer attempts to connect to eff.org’s US-based IP address. At the Internet Service Provider’s level, the request is checked: the IP address for eff.org is checked against a list of blocked international IP addresses, and is blocked.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Throttling.</strong> Internet Service Providers can selectively throttle, or slow down, different types of traffic. Many government censors have started to slow down connections to certain sites rather than block them altogether. This type of blocking is harder to identify, and lets the ISP deny that it is restricting access. People might think their own Internet connection is just slow, or that the service they’re connecting to is not working.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>A computer tries to connect to eff.org. Their Internet Service Provider slows down their connection.</em></small></p>
<p><a class="anchor-link-target" name="3" id="3"> </a></p>
<h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Circumvention techniques <a class="anchor-link-icon" href="#3">Anchor link</a></h2>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Generally, if there is less information about your Internet activity, it can be harder for your Internet Service Provider or network administrator to selectively block particular types of activity. That’s why using Internet-wide <a href="/en/glossary/encryption" class="glossify-link" data-title="encryption" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A process that takes a message and makes it unreadable except to a person who knows how to "decrypt" it back into a readable form. " data-original-title="encryption">encryption<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> standards can help.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an insecure HTTP request for "http://example.com/page" from a device. The page URL and contents can be read by your network administrators, your ISP, and any entity in between." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p>
<p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP protects little of your browsing information...</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing a secure HTTPS request for "https://eff.org/deeplinks" from a device. The site is revealed to your network administrators and your ISP, but they can't see the page you're viewing." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p>
<p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="If you've ever seen a web address spelled out as “http://www.example.com/”, you'll recognize the “http” bit of this term. HTTP (hypertext transfer protocol) is the way a web browser on your machine talks to a remote web server. Unfortunately, standard http sends text insecurely across the Internet. HTTPS (the S stands for “secure”) uses encryption to better protect the data you send to websites, and the information they return to you, from prying eyes. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> protects much more...</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="A graphic showing an ideal secure HTTPS request for "https://eff.org/deeplinks" from a device. By encrypting DNS and the site name, your network administrators or ISP will have trouble figuring out what website you're viewing." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…encrypted DNS and other protocols will protect the site name, too.</p>
<h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Changing your DNS provider and using encrypted DNS</h3>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">If Internet Service Providers are only relying on <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="blocking" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">blocking<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> changing your DNS provider and using encrypted DNS may restore your access.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Changing your DNS provider.</strong> This can be done in the “network settings” of your device (phone or computer). Note that your new DNS provider will obtain the information about your browsing activity that your ISP once had, which can be a privacy concern depending on your <a href="/en/glossary/threat-model" class="glossify-link" data-title="threat model" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A way of thinking about the sorts of protection you want for your data so you can decide which potentional threats you are going to take seriously. It's impossible to protect against every kind of trick or adversary, so you should concentrate on which people might want your data, what they might want from it, and how they might get it. Coming up with a set of possible threats you plan to protect against is called threat modeling or assessing your risks. " data-original-title="threat model">threat model<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla compiles <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">a list of DNS providers</a> that have strong privacy policies and commitments to not share your browsing <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any kind of information, typically stored in a digital form. Data can include documents, pictures, keys, programs, messages, and other digital information or files. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Using encrypted DNS.</strong> Encrypted DNS technologies are currently being rolled out. This prevents any network actor from seeing (and filtering) your DNS traffic. You can configure <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-over-HTTPS easily on Firefox</a> and configure <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-over-TLS on Android.</a></p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Right now, there aren’t easy ways for users to do this in other applications.</p>
<h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> or Encrypted Proxy</h3>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>In this diagram, the computer uses a VPN, which encrypts its traffic and connects to eff.org. The network router and Internet Service Provider might see that the computer is using a VPN, but the data is encrypted. The Internet Service Provider routes the connection to the VPN server in another country. This VPN then connects to the eff.org website.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Virtual Private Network" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="A virtual private network is a method for connecting your computer securely to the network of an organization on the other side of the Internet. When you use a VPN, all of your computer's Internet communications are packaged together, encrypted, and then relayed to this other organization, where they are decrypted, unpacked, and then sent on to their destination. To the organization's network, or any other computer on the wider Internet, it looks like your computer's request is coming from inside the organization, not from your location. VPNs are used by businesses to provide secure access to internal resources (like file servers or printers). They are also used by individuals to bypass local censorship, or defeat local surveillance. " data-original-title="Virtual Private Network">Virtual Private Network<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) encrypts and sends all Internet data from your computer through a server (another computer). This computer could belong to a commercial or nonprofit VPN service, your company, or a trusted contact. Once a VPN service is correctly configured, you can use it to access webpages, e-mail, instant messaging, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Any technology that allows you to use the Internet for voice communication with other VoIP users or receive telephone calls over the Internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, and any other Internet service. A VPN protects your traffic from being spied on locally, but your VPN provider can still keep records (also known as logs) of the websites you access, or even let a third party look directly at your web browsing. Depending on your threat model, the possibility of a government eavesdropping on your VPN connection or getting access to your VPN logs may be a significant <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risk" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="In computer security, risk analysis is calculating the chance that threats might succeed, so you know how much effort to spend defending against them. There may be many different ways that you might lose control or access to your data, but some of them are less likely than others. Conducting a risk assessment means deciding which threats you are going to take seriously, and which may be too rare or too harmless (or too difficult to combat) to worry about. See threat modeling. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. For some users, this could outweigh the short-term benefits of using a VPN.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Check out our guide about <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">choosing specific VPN services.</a></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p>
<h3>Using the Tor Browser</h3>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor is <a href="/en/glossary/open-source-software" class="glossify-link" data-title="open-source software" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Open source software, or free software, is software that can be distributed freely in a form that lets others modify it and rebuild it from scratch. While it is known as “free software," it's not necessarily free as in zero-cost: FLOSS programmers can ask for donations, or charge for support or for copies. Linux is an example of a free, open source program, as are Firefox and Tor. " data-original-title="open-source software">open-source software<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> designed to give you anonymity on the web. Tor Browser is a <a href="/en/glossary/web-browser" class="glossify-link" data-title="web browser" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="The program you use to view websites on the Internet. Firefox, Safari, Internet Explorer, and Chrome are all web browsers. Mobile devices have a web browser app for the same purpose. " data-original-title="web browser">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> built on top of the Tor anonymity network. Because of how Tor routes your web browsing traffic, it also allows you to circumvent censorship. (See our How to: Use Tor guides for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>The computer uses Tor to connect to eff.org. Tor routes the connection through several “relays,” which can be run by different individuals or organizations all over the world. The final “exit relay” connects to eff.org. The ISP can see that you’re using Tor, but cannot easily see what site you are visiting. The owner of eff.org, similarly, can tell that someone using Tor has connected to its site, but does not know where that user is coming from.</em></small></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">When you first start the Tor Browser, you can choose an option specifying that you are on a network that is censored:</p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="A screen capture of Tor's Network Settings page, which offers users extra choices via a "Configure" button if their Internet connection is censored or proxied." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor will not only bypass some national censorship, but, if properly configured, can also protect your identity from an <a href="/en/glossary/adversary" class="glossify-link" data-title="adversary" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Your adversary is the person or organization attempting to undermine your security goals. Adversaries can be different, depending on the situation. For instance, you may worry about criminals spying on the network at a cafe, or your classmates logging into your accounts on a shared computer at a school. Often the adversary is hypothetical. " data-original-title="adversary">adversary<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> listening in on your country’s networks. However, it can be slow and difficult to use, and anyone who can see your network activity may notice that you are using Tor.</p>
<p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Note: Make sure you’re downloading the Tor Browser from the <a href="https://www.torproject.org/" rel="noreferrer">official website.</a></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Learn how to use Tor for <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, and <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, but please be sure to tap “Configure” instead of “Connect” in the window displayed above
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Di dalam diagram ini, komputer mencoba mengakses eff.org/deeplinks. Administrator jaringan (diwakili oleh router) dapat melihat domain (eff.org), tetapi bukan alamat situs web lengkap setelah garis miring. Administrator jaringan dapat memutuskan akses ke domain mana yang akan diblokir." src="/files/2020/04/25/circumvention-httpssitefiltering.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, komputer mencoba mengakses eff.org/deeplinks. Administrator jaringan (diwakili oleh router) dapat melihat domain (eff.org), tetapi bukan alamat situs web lengkap setelah garis miring. Administrator jaringan dapat memutuskan akses ke domain mana yang akan diblokir.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong><a href="/en/glossary/protocol" class="glossify-link" data-title="Protokol" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Protokol komunikasi adalah cara pengiriman data antar program atau komputer. Program perangkat lunak yang menggunakan protokol yang sama dapat berbicara satu sama lain: jadi, peramban web dan server web menggunakan protokol yang sama, disebut "http". Beberapa protokol menggunakan enkripsi untuk melindungi kontennya. Versi aman dari protokol http disebut "https". Contoh lain protokol terenkripsi yang digunakan oleh banyak program berbeda adalah OTR (Off-the-Record), sebuah protokol untuk pengiriman pesan instan yang aman... " data-original-title="Protocol">Protokol<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan pemblokiran port.</strong> A <a href="/en/glossary/firewall" class="glossify-link" data-title="firewall" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Alat yang melindungi komputer dari koneksi yang tidak diinginkan ke atau dari jaringan lokal dan Internet. Firewall mungkin memiliki aturan yang melarang email keluar, atau koneksi ke situs web tertentu. Firewall dapat digunakan sebagai garis pertahanan pertama untuk melindungi perangkat dari gangguan yang tidak terduga. Ini juga dapat digunakan untuk mencegah pengguna mengakses internet dengan cara tertentu. " data-original-title="firewall">firewall<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau router mungkin mencoba mengidentifikasi jenis teknologi internet apa yang digunakan seseorang untuk berkomunikasi, dan memblokir teknologi tertentu dengan mengenali detail teknis cara mereka berkomunikasi (protokol dan nomor port adalah contoh informasi yang dapat digunakan untuk mengidentifikasi teknologi apa yang sedang digunakan). Jika firewall dapat dengan benar mengenali jenis komunikasi apa yang terjadi atau teknologi apa yang digunakan, firewall dapat dikonfigurasi untuk tidak meneruskan komunikasi tersebut. Misalnya, beberapa jaringan mungkin memblokir teknologi yang digunakan oleh suatu <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Teknologi apa pun yang memungkinkan Anda menggunakan internet untuk komunikasi suara dengan pengguna VoIP lain atau menerima panggilan telepon melalui internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (panggilan telepon internet) atau <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dan penerapannya.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Di dalam diagram ini, router mengenali komputer yang mencoba terkoneksi ke sebuah situs HTTPS, yang menggunakan Port 443. Port 443 ada di daftar protokol yang diblokir router ini." src="/files/2020/04/25/circumvention-protocolandportblocking.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, router mengenali komputer yang mencoba terkoneksi ke sebuah situs HTTPS, yang menggunakan Port 443. Port 443 ada di daftar protokol yang diblokir router ini.</em></small></p>
<h3 dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:4pt;">Berbagai jenis pemblokiran lain</h3>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Biasanya, pemblokiran dan pemfilteran digunakan untuk mencegah orang mengakses situs atau layanan tertentu. Namun, berbagai jenis pemblokiran menjadi lebih umum juga.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Penutupan jaringan.</strong> Penutupan jaringan juga dapat melibatkan pencabutan/mematikan infrastruktur jaringan secara fisik, seperti router, kabel jaringan, atau menara seluler, sehingga koneksi secara fisik dicegah atau sangat buruk sehingga tidak dapat digunakan.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;">Ini bisa menjadi kasus khusus pemblokiran alamat IP, di mana semua atau sebagian besar alamat IP diblokir. Karena sering kali dapat diketahui di negara mana alamat IP digunakan, beberapa negara juga telah bereksperimen dengan memblokir sementara semua atau sebagian besar alamat IP asing, mengizinkan beberapa koneksi di dalam negara, tetapi memblokir sebagian besar koneksi ke luar negara.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Sebuah komputer mencoba terkoneksi ke alamat IP eff.org yang berada di AS. Pada tingkat Penyedia Layanan Internet, permintaan ini diperiksa: alamat IP untuk eff.org diperiksa dengan membandingkan ke daftar alamat IP internasional yang diblokir, lalu diblokir." src="/files/2020/04/25/circumvention-networkshutdown.jpeg" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Sebuah komputer mencoba terkoneksi ke alamat IP eff.org yang berada di AS. Pada tingkat Penyedia Layanan Internet, permintaan ini diperiksa: alamat IP untuk eff.org diperiksa dengan membandingkan ke daftar alamat IP internasional yang diblokir, lalu diblokir.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><strong>Pelambatan.</strong> Penyedia Layanan Internet dapat secara selektif membatasi, atau memperlambat, berbagai jenis lalu lintas. Banyak sensor pemerintah mulai memperlambat koneksi ke situs tertentu daripada memblokirnya sama sekali. Jenis pemblokiran ini lebih sulit untuk diidentifikasi, dan membiarkan ISP menyangkal bahwa hal ini membatasi akses. Orang-orang mungkin mengira koneksi internet mereka sendiri yang lambat, atau layanan yang ingin mereka jangkau memang tidak berfungsi.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><img alt="Sebuah komputer mencoba terkoneksi ke eff.org. Penyedia Layanan Internet komputer ini memperlambat koneksinya." src="/files/2020/04/25/circumvention-throttling_0.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height: 1.656; margin-top: 18pt; margin-bottom: 12pt;"><small><em>Sebuah komputer mencoba terkoneksi ke eff.org. Penyedia Layanan Internet komputer ini memperlambat koneksinya.</em></small></p>
<p><a class="anchor-link-target" name="3" id="3"> </a></p>
<h2 dir="ltr" id="docs-internal-guid-6027bd1a-7fff-9990-adf2-c998ae4365e7" style="line-height:1.656;margin-top:18pt;margin-bottom:12pt;">Berbagai teknik pengelakan <a class="anchor-link-icon" href="#3">Tautan jangkar</a></h2>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Secara umum, jika ada sedikit informasi tentang aktivitas internet Anda, mungkin akan lebih sulit bagi Penyedia Layanan Internet Anda atau administrator jaringan untuk memblokir jenis aktivitas tertentu secara selektif. Itu sebabnya di tataran internet menggunakan <a href="/en/glossary/encryption" class="glossify-link" data-title="enkripsi" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sebuah proses yang mengambil pesan dan membuatnya tidak dapat dibaca, kecuali oleh orang yang mengetahui cara "mendekripsinya" kembali ke bentuk yang dapat dibaca. " data-original-title="encryption">enkripsi<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> yang standar bisa membantu.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="URL halaman dan kontennya dapat dibaca oleh administrator jaringan Anda, ISP Anda, dan entitas apa pun di antaranya." src="/files/2020/04/25/circumvention-http.png" style="width: 600px; height: 300px;"></p>
<p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">HTTP melindungi sedikit informasi penelusuran Anda...</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="Grafis yang menampilkan permintaan HTTPS aman untuk "https://eff.org/deeplinks" dari sebuah perangkat. Situs tersebut diungkapkan kepada administrator jaringan dan ISP Anda, tetapi mereka tidak dapat melihat halaman yang Anda lihat." src="/files/2020/04/25/circumvention-https.png" style="height: 300px; width: 600px;"></p>
<p class="rtecenter" dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> ...<a href="/en/glossary/https" class="glossify-link" data-title="HTTPS" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jika Anda pernah melihat alamat web dieja sebagai “http://www.example.com/”, Anda akan mengenali bagian “http” pada istilah ini. HTTP (protokol transfer hiperteks) adalah cara peramban web di mesin Anda berbicara dengan server web jarak jauh. Sayangnya, http standar mengirimkan teks secara tidak aman melalui internet. HTTPS (S adalah singkatan dari “secure” (aman)) menggunakan enkripsi agar lebih baik melindungi data yang Anda kirimkan ke situs web, dan informasi yang mereka kembalikan kepada Anda, dari orang yang ingin melihatnya. " data-original-title="HTTPS">HTTPS<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> jauh lebih melindungi...</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><img alt="Grafis yang menunjukkan permintaan HTTPS aman yang ideal untuk "https://eff.org/deeplinks" dari sebuah perangkat. Mengenkripsi DNS dan nama situs akan membuat administrator jaringan atau ISP Anda kesulitan mengetahui situs web apa yang sedang Anda lihat." src="/files/2020/04/25/circumvention-dnsoverhttps.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;text-align: center;margin-top:0pt;margin-bottom:0pt;">…DNS terenkripsi dan protokol lain juga akan melindungi nama situs.</p>
<h3 dir="ltr" style="line-height:1.656;margin-top:16pt;margin-bottom:4pt;">Mengganti penyedia DNS Anda dan menggunakan DNS terenkripsi</h3>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Jika para Penyedia Layanan Internet mengandalkan <strong>DNS <a href="/en/glossary/internet-filtering" class="glossify-link" data-title="pemblokiran" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Pemfilteran adalah istilah yang sopan untuk memblokir atau menyensor lalu lintas internet. Jaringan Pribadi Virtual, atau layanan seperti Tor, terkadang digunakan untuk mengakses komunikasi internet yang seharusnya difilter. " data-original-title="blocking">pemblokiran<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>,</strong> mengganti penyedia DNS Anda dan menggunakan DNS terenkripsi dapat memulihkan akses Anda.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Mengganti penyedia DNS Anda.</strong> Ini dapat dilakukan di “pengaturan jaringan” perangkat Anda (ponsel atau komputer). Perhatikan bahwa penyedia DNS baru Anda akan mendapatkan informasi tentang aktivitas penelusuran Anda yang pernah dimiliki ISP Anda, dan ini dapat menjadi masalah privasi, bergantung pada <a href="/en/glossary/threat-model" class="glossify-link" data-title="model ancaman" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Sebuah cara untuk memikirkan tentang jenis perlindungan yang Anda inginkan untuk data Anda sehingga Anda dapat memutuskan ancaman potensial mana yang akan Anda anggap serius. Tidak mungkin untuk melindungi dari setiap jenis tipuan atau musuh. Jadi, Anda harus berkonsentrasi pada siapa yang mungkin menginginkan data Anda, apa yang mungkin mereka inginkan dari data itu, dan bagaimana cara mereka bisa mendapatkannya. Membuat serangkaian kemungkinan ancaman yang Anda rencanakan untuk dilindungi disebut pemodelan ancaman atau menilai risiko Anda. " data-original-title="threat model">model ancaman<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Mozilla menyusun <a href="https://wiki.mozilla.org/Security/DOH-resolver-policy" rel="noreferrer">sebuah daftar penyedia DNS</a> yang memiliki kebijakan privasi yang kuat dan komitmen untuk tidak membagikan data penelusuran Anda <a href="/en/glossary/data" class="glossify-link" data-title="data" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jenis informasi apa pun, biasanya disimpan dalam bentuk digital. Data dapat mencakup dokumen, gambar, kunci, program, pesan, dan informasi atau berkas digital lainnya. " data-original-title="data">data<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>.</p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"><strong>Menggunakan DNS terenkripsi.</strong> Teknologi DNS terenkripsi saat ini sedang diluncurkan. Ini mencegah pelaku jaringan apa pun untuk melihat (dan memfilter) lalu lintas DNS Anda. Anda dapat mengonfigurasi <a href="https://support.mozilla.org/en-US/kb/firefox-dns-over-https#w_manually-enabling-and-disabling-dns-over-https" rel="noreferrer">DNS-lewat-HTTPS (DNS-over-HTTPS) dengan mudah di Firefox</a> dan mengonfigurasi <a href="https://android-developers.googleblog.com/2018/04/dns-over-tls-support-in-android-p.html" rel="noreferrer">DNS-lewat-TLS (DNS-over-TLS) di Android.</a></p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:0pt;">Saat ini, tidak ada cara mudah bagi pengguna untuk melakukannya di aplikasi lain.</p>
<h3>Using a <a href="/en/glossary/vpn" class="glossify-link" data-title="VPN" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="VPN">VPN<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> atau Proksi Terenkripsi</h3>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;"><img alt="Di dalam diagram ini, komputer menggunakan VPN, yang mengenkripsi lalu lintasnya dan terkoneksi ke eff.org. Router jaringan dan Penyedia Layanan Internet mungkin melihat bahwa komputer ini menggunakan VPN, tetapi datanya dienkripsi. Penyedia Layanan Internet merutekan koneksi ke server VPN di negara lain. VPN ini kemudian terkoneksi ke situs web eff.org." src="/files/2020/04/25/circumvention-vpn.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"><small><em>Di dalam diagram ini, komputer menggunakan VPN, yang mengenkripsi lalu lintasnya dan terkoneksi ke eff.org. Router jaringan dan Penyedia Layanan Internet mungkin melihat bahwa komputer ini menggunakan VPN, tetapi datanya dienkripsi. Penyedia Layanan Internet merutekan koneksi ke server VPN di negara lain. VPN ini kemudian terkoneksi ke situs web eff.org.</em></small></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;margin-top:0pt;margin-bottom:12pt;">A <a href="/en/glossary/vpn" class="glossify-link" data-title="Jaringan Pribadi Virtual" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Jaringan pribadi virtual adalah metode untuk menghubungkan komputer Anda dengan aman ke jaringan organisasi di sisi lain internet. Saat Anda menggunakan VPN, semua komunikasi internet komputer Anda dikemas bersama, dienkripsi, kemudian diteruskan ke organisasi lain ini, di sini komunikasi Anda didekripsi, dibongkar, kemudian dikirimkan ke tujuannya. Ke jaringan organisasi tersebut, atau komputer lain apa pun di internet yang lebih luas, sehingga permintaan komputer Anda sepertinya berasal dari dalam organisasi tersebut, bukan dari lokasi Anda yang sebenarnya. VPN digunakan oleh bisnis/perusahaan untuk menyediakan akses yang aman ke sumber daya internal (seperti printer atau server berkas). Ini juga digunakan oleh individu untuk mengelak dari sensor lokal, atau mengatasi pengawasan lokal. " data-original-title="Virtual Private Network">Jaringan Pribadi Virtual<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> (VPN) mengenkripsi dan mengirimkan semua data internet dari komputer Anda melalui server (komputer lain). Komputer ini mungkin dimiliki oleh layanan VPN komersial atau nirlaba, perusahaan Anda, atau kontak tepercaya. Setelah layanan VPN dikonfigurasi dengan benar, Anda dapat menggunakannya untuk mengakses halaman web, email, pesan instan, <a href="/en/glossary/voip" class="glossify-link" data-title="VoIP" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Teknologi apa pun yang memungkinkan Anda menggunakan internet untuk komunikasi suara dengan pengguna VoIP lain atau menerima panggilan telepon melalui internet. " data-original-title="VoIP">VoIP<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>, dan apa pun layanan internet lainnya. VPN melindungi lalu lintas Anda agar tidak dimata-matai secara lokal, tetapi penyedia VPN Anda masih dapat menyimpan catatan (juga dikenal sebagai log) dari situs web yang Anda akses, atau bahkan membiarkan pihak ketiga melihat langsung penelusuran web Anda. Bergantung pada model ancaman terhadap Anda, kemungkinan pemerintah menguping koneksi VPN Anda atau mendapatkan akses ke log VPN Anda mungkin signifikan dalam hal <a href="/en/glossary/risk-assessment" class="glossify-link" data-title="risiko" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Dalam keamanan komputer, analisis risiko menghitung peluang keberhasilan ancaman, sehingga Anda mengetahui berapa besar upaya yang harus dikerahkan untuk mempertahankannya. Mungkin ada berbagai cara yang membuat Anda kehilangan kendali atau akses ke data Anda, tetapi beberapa di antaranya lebih kecil kemungkinannya daripada yang lain. Melakukan penilaian risiko berarti memutuskan ancaman mana yang akan Anda anggap serius, dan mana yang mungkin terlalu jarang atau terlalu berbahaya (atau terlalu sulit untuk dilawan) untuk dikhawatirkan. Lihat pemodelan ancaman. " data-original-title="risk">risk<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a>. Bagi beberapa pengguna, ini bisa terlalu besar dibanding manfaat jangka pendek menggunakan VPN.</p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;">Bacalah panduan kami tentang <a href="https://ssd.eff.org/en/module/choosing-vpn-thats-right-you">memilih layanan VPN yang spesifik.</a></p>
<p dir="ltr" style="line-height:1.656;margin-top:12pt;margin-bottom:12pt;"> </p>
<h3>Menggunakan Tor Browser</h3>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Tor adalah <a href="/en/glossary/open-source-software" class="glossify-link" data-title="perangkat lunak sumber terbuka" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Perangkat lunak sumber terbuka, atau perangkat lunak gratis, adalah perangkat lunak yang dapat didistribusikan secara bebas dalam bentuk yang memungkinkan orang lain memodifikasinya dan membangunnya kembali dari awal. Meskipun dikenal sebagai “perangkat lunak bebas”," ini belum tentu gratis dalam arti tanpa biaya: pemrogram FLOSS bisa meminta sumbangan, atau membebankan biaya untuk dukungan atau salinan. Linux adalah contoh program sumber terbuka gratis, seperti halnya Firefox dan Tor. " data-original-title="open-source software">perangkat lunak sumber terbuka<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dirancang untuk memberi Anda anonimitas di web. Tor Browser adalah <a href="/en/glossary/web-browser" class="glossify-link" data-title="peramban web" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Program yang Anda gunakan untuk melihat situs web di internet. Firefox, Safari, Internet Explorer, dan Chrome semuanya adalah peramban web. Perangkat seluler memiliki aplikasi peramban web untuk tujuan yang sama. " data-original-title="peramban web">web browser<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> dibangun di atas jaringan anonimitas Tor. Karena cara Tor merutekan lalu lintas penelusuran web Anda, ini juga memungkinkan Anda menghindari penyensoran. (Lihat Cara: Menggunakan panduan Tor untuk <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, dan <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>).</p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="Komputer menggunakan Tor untuk terkoneksi ke eff.org. Tor merutekan koneksi melalui beberapa “relai”, yang dapat dijalankan oleh individu atau organisasi yang berbeda di seluruh dunia. “Relai keluar” (Exit relay) terakhir terkoneksi ke eff.org. ISP dapat melihat bahwa Anda menggunakan Tor, tetapi tidak dapat dengan mudah melihat situs apa yang Anda kunjungi. Demikian pula, pemilik eff.org dapat mengetahui bahwa seseorang yang menggunakan Tor telah terkoneksi ke situsnya, tetapi tidak mengetahui dari mana pengguna tersebut berasal." src="/files/2020/04/25/circumvention-tor_0.png" style="width: 600px; height: 300px;"></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><small><em>Komputer menggunakan Tor untuk terkoneksi ke eff.org. Tor merutekan koneksi melalui beberapa “relai”, yang dapat dijalankan oleh individu atau organisasi yang berbeda di seluruh dunia. “Relai keluar” (Exit relay) terakhir terkoneksi ke eff.org. ISP dapat melihat bahwa Anda menggunakan Tor, tetapi tidak dapat dengan mudah melihat situs apa yang Anda kunjungi. Demikian pula, pemilik eff.org dapat mengetahui bahwa seseorang yang menggunakan Tor telah terkoneksi ke situsnya, tetapi tidak mengetahui dari mana pengguna tersebut berasal.</em></small></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"> </p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;">Saat Anda pertama kali menjalankan Tor Browser, Anda dapat memilih opsi yang mencantumkan bahwa Anda berada di jaringan yang disensor:</p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:0pt;"><img alt="Tangkapan layar halaman Pengaturan Jaringan Tor, yang menawarkan pilihan tambahan kepada pengguna melalui sebuah tombol "Konfigurasi" jika koneksi internetnya disensor atau diproksi." src="/files/2020/05/01/tor-browser-launcher.png" style="width: 600px; height: 516px;"></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Tor tidak hanya akan memintas beberapa sensor nasional, tetapi jika dikonfigurasi dengan benar, juga dapat melindungi identitas Anda dari <a href="/en/glossary/adversary" class="glossify-link" data-title="musuh" title="" data-placement="top" data-trigger="hover" data-html="true" data-toggle="popover" data-container="body" data-content="Musuh Anda adalah orang atau organisasi yang mencoba merusak tujuan keamanan Anda. Musuh bisa berbeda, tergantung situasinya. Misalnya, Anda mungkin khawatir tentang penjahat yang memata-matai jaringan di kafe, atau teman sekelas Anda masuk ke akun Anda di komputer bersama di sekolah. Sering kali musuh bersifat hipotetis. " data-original-title="adversary">musuh<img src="https://ssd.eff.org/sites/all/themes/ssd/img/info.png"></a> mendengarkan di jaringan negara Anda. Namun, ini bisa lambat dan sulit digunakan, dan siapa pun yang dapat melihat aktivitas jaringan Anda mungkin mengetahui bahwa Anda menggunakan Tor.</p>
<p class="warning" dir="ltr" style="line-height: 1.656; background-color: rgb(255, 255, 255); margin-top: 0pt; margin-bottom: 12pt;">Catatan: Pastikan Anda mengunduh Tor Browser dari <a href="https://www.torproject.org/" rel="noreferrer">situs web resmi.</a></p>
<p dir="ltr" style="line-height:1.656;background-color:#ffffff;margin-top:0pt;margin-bottom:12pt;">Pelajari cara menggunakan Tor untuk <a href="https://ssd.eff.org/en/node/97">Linux</a>, <a href="https://ssd.eff.org/en/node/80/">macOS</a>, <a href="https://ssd.eff.org/en/node/57/">Windows</a>, dan <a href="https://ssd.eff.org/en/module/how-use-tor-android">Android</a>, tetapi pastikan untuk mengetuk “Konfigurasi”, bukan “Hubungkan” di jendela yang ditampilkan di atas.</p>
</div> </div>
</div> <!-- /.node -->