The Use of Liberation Technology

  • Giovanni ZiccardiEmail author
Part of the Law, Governance and Technology Series book series (LGTS, volume 7)


This Chapter briefly describes, with a more technological approach, instruments and techniques used in critical contexts to circumvent filters, to give to the user a good level of anonymity, to encrypt data, to connect to sites banned by several regimes, to spread sensitive information using blog platforms and other means. After a first introduction to the concept of “liberation technology” and to the most common strategies used to operate safely in repressive contexts, the Chapter will list, with a short comment, the most used software tools, such as Tor, the proxies system and the best techniques to make information circulating free.


Internet User Proxy Server Virtual Private Network Traffic Analysis Anonymous Service 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Dingledine, Roger. 2010. Ten things to look for in a circumvention tool. Accessed 24 Nov 2011.
  2. Dingledine, Roger, Michael J. Freedman, and David Molnar. 2000. The free haven project: distributed anonymous storage service.∼mfreed/docs/freehaven-pet00.pdf. Accessed 24 Nov 2011.
  3. Dingledine, Roger, Nick Mathewson, and Paul Syverson. 2004. Tor: The second-generation onion router. Accessed 24 Nov 2011.
  4. Enigmax. 2011. Which VPN providers really take anonymity seriously? Accessed 10 June 2012.
  5. Grimmelmann, James. 2012. Sealand, HavenCo, and the rule of law. Accessed 13 Nov 2012.
  6. Johnson, Aaron, Paul Syverson, Roger Dingledine, and Nick Mathewson. 2011. Trust-based anonymous communication: Adversary models and routing algorithms.∼arma/anonymity-trust-ccs2011.pdf. Accessed 21 Nov 2011.
  7. Loesing, Karsten, Steven Murdoch, and Roger Dingledine. 2010. A case study on measuring statistical data in the Tor anonymity network. Workshop on ethics in computer security research.∼sjm217/papers/wecsr10measuring.pdf. Accessed 24 Nov 2011.
  8. Ngan, Tsuen-Wan “Johnny”, Dingledine, Roger, and Wallach, Dan S. 2010. Building incentives into Tor. Financial cryptography and data security. Accessed 24 Nov 2011.
  9. Roberts, Hal, Ethan Zuckerman, Jillian York, Robert Faris, and John Palfrey. 2010. Circumvention tool usage report. Accessed 24 Nov 2011.

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  1. 1.Department “Cesare Beccaria” Faculty of LawUniversity of MilanMilanoItaly

Personalised recommendations