Internet Censorship Flashcards

1
Q

What is internet censorship?

A

Legal control or suppression of what can be accessed, published, or viewed on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name five ways internet censorship is implemented.

A
  1. IP address blocking
  2. DNS blocking
  3. Keyword filtering
  4. HTTP(S) filtering
  5. Protocol filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a censorship node?

A

Component of a system that can be used to evade internet censorship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does TCP/IP do?

A

Defines how data is sent and received over the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is IP blocking?

A

Governments or ISPs (Internet Service Providers) can block access to specific IP addresses associated with censored websites, and have those requests rerouted or denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can VPNs do?

A

Encapsulate traffic in encrypted tunnels, masking its true destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can TOR do?

A

Anonymizes connections by routing them through multiple nodes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does HTTPS do?

A

Encrypts traffic, making it harder to inspect or block without also disrupting unrelated services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Deep Packet Inspection?

A

Analyze the content of TCP packets. If certain keywords, domains, or types of traffic (VPNs or Tor) are detected, the packets can be dropped or redirected, effectively blocking access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is DNS tampering?

A

The DNS is manipulated to block or redirect access to certain websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is decoy routing?

A

Redirects traffic to blocked content by embedding cryptographic signals in requests to seemingly benign destinations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an End-to-Middle Proxy?

A

Proxies that sit between the user and the destination, routing traffic to bypass censorship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Telex?

A

To circumvent censorship by embedding cryptographic signals in traffic that cooperating routers detect and reroute to blocked content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens during HTTP filtering?

A

Censors inspect HTTP traffic and block or reset connections based on forbidden content or requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does DNS blocking work?

A

Prevents domain names from being resolved to their IP addresses by manipulating DNS responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is speed throttling used in censorship?

A

Bandwidth for certain protocols like HTTPS or SSH is limited, effectively slowing or disrupting access.

17
Q

What censorship techniques were observed in Iran?

A

HTTP filtering, DNS filtering, and speed throttling with variations based on political events like elections.

18
Q

How does the Great Firewall of China discover circumvention servers?

A

Using techniques like active probing, domain blocking, and keyword filtering.

19
Q

What is collateral damage in censorship?

A

Blocking or disrupting access to unintended sites or services due to overly broad censorship techniques.

20
Q

What are common tools to measure internet censorship?

A

On Hosts: RIPE Atlas, OONI Probe
Research Networks: PlanetLab
Remote Measurement: Augur, IRIS, Quack

21
Q

What are challenges in measuring internet censorship?

A

Issues include establishing ground truth, achieving sufficient coverage, addressing ethical concerns, and ensuring continuity.

22
Q

What are common methods to bypass censorship?

A

Encryption, VPNs, Tor, decoy routing, and end-to-middle proxies.

23
Q

What is John Gilmour’s famous quote about censorship?

A

“The Internet treats censorship as a malfunction and routes around it.”