Difference between revisions of "Internet Anonymity/Internet surveillance and censorship"
m (1 revision) |
m (1 revision) |
(No difference)
|
Latest revision as of 17:18, 6 August 2013
Internet surveillance and censorship
- Subsections
Add or edit subsection:
Position |
6/1 |
Type | Lesson |
Section of | Internet Anonymity |
Lang | En |
- Last modified: 6 August 2013 17:18:21
Demonstrate how data and website requests travel on the Internet, the WHOIS databases and how website filtering is achieved. Draw a diagram explaining circumvention with proxy servers and explain the advantages of Tor. Demonstrate the network traffic generated by Tor.
Trainer's notes: Use wireshark and etherape for demonstration of network traffic. Prepare in advance to make sure the demo works for you (your network card, OS). With enough time and research, prepare a brief overview of past and present circumvention technologies, including http://peacefire.org, http://psiphon.ca, web translators, http accelerators, and so on.