Search database
Filter
28
Featured
Topics
9
7
5
4
3
2
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Language
Document type
7
4
1
1
Countries / Regions
Authors & Publishers
Media focus
Publication Years
Methods applied
Journals
Output Type
"This publication identifies at least 12 digital threats, including illegal or arbitrary digital surveillance, location tracking, and software and hardware exploits without the knowledge of the target. Further examples that are considered are: phishing, fake domain attacks, Man-in-the-Middle (MitM) ... more
"The aim of this report is not to question the value of supporting Internet freedom in closed societies such as Iran. Rather, the intent is to provide a picture of how difficult it is to achieve progress in such countries. In times of tightening budgets for media development work, it is worth consid ... more
"While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that gene ... more
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f ... more
"Eine Serie von Fallstudien – unter anderem zur Funktion von Blogs und Microblogs als „bottom- up journalism“ und zu Aktivitätsfeldern des chinesischen „hacktivism“ – verdeutlicht, welches Potenzial politischer Mobilisierung auch im chinesischen Kontext in der internetbasierten Kommunik ... more
"Blogs are more or less controllable for those who want to keep them under surveillance. Governments that are most up to do date with new technology use the most sophisticated filtering or blocking techniques, preventing them from appearing on the Web at all. But bloggers don't just sit back and let ... more
"This guide is meant to introduce non-technical users to Internet censorship circumvention technologies, and help them choose which of them best suits their circumstances and needs." (Page 5)