Telex (anti-censorship system)

Last updated

Telex is a research anti-censorship system that would allow users to circumvent a censor without alerting the censor to the act of circumvention. It is not ready for real users, but a proof-of-concept mock system exists. [1] [2] [3] [4] As of 2018, Telex has evolved into refraction networking. [5]

Contents

Purpose

Telex complements services like Tor (anonymity network) by placing Telex stations in the network infrastructure of free countries. A client can create a TLS tunnel that is indistinguishable from allowed traffic. That way, firewalls in censored countries are neither able to detect nor to block access to specific parts of the Internet, assuming they allow access at all. [6] [7] [8] [9]

See also

Related Research Articles

An Internet filter is software that restricts or controls the content an Internet user is capable to access, especially when utilized to restrict material delivered over the Internet via the Web, Email, or other means. Content-control software determines what content will be available or be blocked.

China censors both the publishing and viewing of online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of their government, and severely restricting freedom of the press. China's censorship includes the complete blockage of various websites, inspiring the policy's nickname, the "Great Firewall of China", which blocks websites. Methods used to block websites and pages include DNS spoofing, blocking access to IP addresses, analyzing and filtering URLs, packet inspection, and resetting connections.

<span class="mw-page-title-main">IP address blocking</span> Access restrictions based on IP address

IP address blocking or IP banning is a configuration of a network service that blocks requests from hosts with certain IP addresses. IP address blocking is commonly used to protect against brute force attacks and to prevent access by a disruptive address. It can also be used to restrict access to or from a particular geographic area; for example, Syndicating content to a specific region through the use of Internet geolocation.

The Great Firewall is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic. The Great Firewall operates by checking transmission control protocol (TCP) packets for keywords or sensitive words. If the keywords or sensitive words appear in the TCP packets, access will be closed. If one link is closed, more links from the same machine will be blocked by the Great Firewall. The effect includes: limiting access to foreign information sources, blocking foreign internet tools and mobile apps, and requiring foreign companies to adapt to domestic regulations.

Hacktivismo is an offshoot of Cult of the Dead Cow (cDc), whose beliefs include access to information as a basic human right. It was founded in 1999.

The OpenNet Initiative (ONI) was a joint project whose goal was to monitor and report on internet filtering and surveillance practices by nations. The project employed a number of technical means, as well as an international network of investigators, to determine the extent and nature of government-run internet filtering programs. Participating academic institutions included the Citizen Lab at the Munk Centre for International Studies, University of Toronto; Berkman Center for Internet & Society at Harvard Law School; the Oxford Internet Institute (OII) at University of Oxford; and, The SecDev Group, which took over from the Advanced Network Research Group at the Cambridge Security Programme, University of Cambridge.

<span class="mw-page-title-main">Psiphon</span> Free and open-source internet circumvention tool

Psiphon is a free and open-source Internet censorship circumvention tool that uses a combination of secure communication and obfuscation technologies, such as a VPN, SSH, and a Web proxy. Psiphon is a centrally managed and geographically diverse network of thousands of proxy servers, using a performance-oriented, single- and multi-hop routing architecture.

<span class="mw-page-title-main">Internet censorship</span> Control or suppression of what can be accessed, published, or viewed on the internet

Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible. Organizations providing internet access – such as schools and libraries – may choose to preclude access to material that they consider undesirable, offensive, age-inappropriate or even illegal, and regard this as ethical behaviour rather than censorship. Individuals and organizations may engage in self-censorship of material they publish, for moral, religious, or business reasons, to conform to societal norms, political views, due to intimidation, or out of fear of legal or other consequences.

<span class="mw-page-title-main">Marcus J. Ranum</span>

Marcus J. Ranum is a computer and network security researcher. He is credited with a number of innovations in firewalls, including building the first Internet email server for the whitehouse.gov domain, and intrusion detection systems. He has held technical and leadership positions with a number of computer security companies, and is a faculty member of the Institute for Applied Network Security.

An Internet outage or Internet blackout or Internet shutdown is the complete or partial failure of the internet services. It can occur due to censorship, cyberattacks, disasters, police or security services actions or errors.

<span class="mw-page-title-main">Ultrasurf</span>

UltraSurf is a freeware Internet censorship circumvention product created by UltraReach Internet Corporation. The software bypasses Internet censorship and firewalls using an HTTP proxy server, and employs encryption protocols for privacy.

Internet censorship circumvention is the use of various methods and tools to bypass internet censorship.

<span class="mw-page-title-main">Internet censorship in Russia</span>

In Russia, internet censorship is enforced on the basis of several laws and through several mechanisms. Since 2012, Russia maintains a centralized internet blacklist maintained by the Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor).

<span class="mw-page-title-main">VPN blocking</span>

VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems. Often used by large organizations such as national governments or corporations, it can act as a tool for computer security or Internet censorship by preventing the use of VPNs to bypass network firewall systems.

<span class="mw-page-title-main">Lantern (software)</span> Internet censorship circumvention software

Lantern is a free internet censorship circumvention tool that operates in some of the most extreme censorship environments, such as China, Iran, and Russia. It uses wide variety of protocols and techniques that obfuscate network traffic and/or co-mingle traffic with protocols censors are reluctant to block. It also uses domain fronting. It is not an anonymity tool like Tor.

<span class="mw-page-title-main">J. Alex Halderman</span> American computer scientist

J. Alex Halderman is professor of Computer Science and Engineering at the University of Michigan, where he is also director of the Center for Computer Security & Society. Halderman's research focuses on computer security and privacy, with an emphasis on problems that broadly impact society and public policy.

<span class="mw-page-title-main">Domain fronting</span> Technique for Internet censorship circumvention

Domain fronting is a technique for Internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than is discernable to third parties monitoring the requests and connections.

Collateral freedom is an anti-censorship strategy that attempts to make it economically prohibitive for censors to block content on the Internet. This is achieved by hosting content on cloud services that are considered by censors to be "too important to block," and then using encryption to prevent censors from identifying requests for censored information that is hosted among other content, forcing censors to either allow access to the censored information or take down entire services.

Refraction networking, also known as decoy routing, is a research anti-censorship approach that would allow users to circumvent a censor without using any individual proxy servers. Instead, it implements proxy functionality at the core of partner networks, such as those of Internet service providers, outside the censored country. These networks would discreetly provide censorship circumvention for "any connection that passes through their networks." This prevents censors from selectively blocking proxy servers and makes censorship more expensive, in a strategy similar to collateral freedom.

<span class="mw-page-title-main">Snowflake (software)</span> Anti-censorship software

Snowflake is a software package for assisting others in circumventing internet censorship by relaying data requests. Snowflake relay nodes are meant to be created by people in countries where Tor and Snowflake are not blocked. People under censorship then use a Snowflake client, packaged with the Tor Browser or Onion Browser, to access the Tor network, using Snowflake relays as proxy servers. Access to the Tor network can in turn give access to other blocked services. A Snowflake node can be created by either installing a browser extension, installing a stand-alone program, or browsing a webpage with an embedded Snowflake relay. The node runs whenever the browser or program is connected to the internet.

References

  1. J. Alex Halderman (18 July 2011). "Anticensorship in the Internet's Infrastructure". freedom-to-tinker.com. Retrieved 30 January 2014.
  2. "A New Way Around Internet Censorship?". NPR.org. Retrieved 2017-01-04.
  3. "Telex to help defeat web censors". BBC News. 2011-07-19. Retrieved 2017-01-04.
  4. "Thwarting internet censorship: Telex". www.engin.umich.edu. Retrieved 2017-01-04.
  5. "Telex: Anticensorship in the Network Infrastructure". telex.cc. Retrieved 2020-12-06.
  6. Wustrow, Eric; Wolchok, Scott; Goldberg, Ian; Halderman, J. Alex (2011). "Telex: Anticensorship in the Network Infrastructure" (PDF). Proceedings of the 20th USENIX Conference on Security. Berkeley, CA, USA: USENIX Association: 30.
  7. "Telex Anti-Censorship System - Schneier on Security". www.schneier.com. Retrieved 2017-01-04.
  8. Nguyen, Tuan. "New software may end internet censorship once and for all | ZDNet". ZDNet. Retrieved 2017-01-04.
  9. "Deep packet inspection used to stop censorship in new "Telex" scheme". Ars Technica. Retrieved 2017-01-04.