The Use of Liberation Technology
- 1.7k Downloads
This Chapter briefly describes, with a more technological approach, instruments and techniques used in critical contexts to circumvent filters, to give to the user a good level of anonymity, to encrypt data, to connect to sites banned by several regimes, to spread sensitive information using blog platforms and other means. After a first introduction to the concept of “liberation technology” and to the most common strategies used to operate safely in repressive contexts, the Chapter will list, with a short comment, the most used software tools, such as Tor, the proxies system and the best techniques to make information circulating free.
KeywordsInternet User Proxy Server Virtual Private Network Traffic Analysis Anonymous Service
- Copeland, D. 2012. How to get around the great firewall of China. http://www.readwriteweb.com/archives/how-to-get-around-the-great-firewall-of-china.php?utm_source=ReadWriteWeb+Newsletters&utm_medium=email&utm_campaign=dfd3f8bc22-RWWDailyNewsletter. Accessed 12 June 2012.
- Dingledine, Roger. 2010. Ten things to look for in a circumvention tool. https://www.torproject.org/press/presskit/2010-09-16-circumvention-features.pdf. Accessed 24 Nov 2011.
- Dingledine, Roger, Michael J. Freedman, and David Molnar. 2000. The free haven project: distributed anonymous storage service. http://www.cs.princeton.edu/∼mfreed/docs/freehaven-pet00.pdf. Accessed 24 Nov 2011.
- Dingledine, Roger, Nick Mathewson, and Paul Syverson. 2004. Tor: The second-generation onion router. https://svn.torproject.org/svn/projects/design-paper/tor-design.pdf. Accessed 24 Nov 2011.
- Enigmax. 2011. Which VPN providers really take anonymity seriously? https://torrentfreak.com/which-vpn-providers-really-take-anonymity-seriously-111007/. Accessed 10 June 2012.
- Grimmelmann, James. 2012. Sealand, HavenCo, and the rule of law. http://works.bepress.com/cgi/viewcontent.cgi?article=1035&context=james_grimmelmann. Accessed 13 Nov 2012.
- Johnson, Aaron, Paul Syverson, Roger Dingledine, and Nick Mathewson. 2011. Trust-based anonymous communication: Adversary models and routing algorithms. http://freehaven.net/∼arma/anonymity-trust-ccs2011.pdf. Accessed 21 Nov 2011.
- Loesing, Karsten, Steven Murdoch, and Roger Dingledine. 2010. A case study on measuring statistical data in the Tor anonymity network. Workshop on ethics in computer security research. http://www.cl.cam.ac.uk/∼sjm217/papers/wecsr10measuring.pdf. Accessed 24 Nov 2011.
- Ngan, Tsuen-Wan “Johnny”, Dingledine, Roger, and Wallach, Dan S. 2010. Building incentives into Tor. Financial cryptography and data security. http://freehaven.net/anonbib/papers/incentives-fc10.pdf. Accessed 24 Nov 2011.
- Roberts, Hal, Ethan Zuckerman, Jillian York, Robert Faris, and John Palfrey. 2010. Circumvention tool usage report. http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_Circumvention_Tool_Usage_Report.pdf. Accessed 24 Nov 2011.