Internet Anonymity/Internet surveillance and censorship

Revision as of 21:26, 7 February 2013 by DavidM (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)



Internet surveillance and censorship

  • Subsections


Add or edit subsection:

Position

6/1

TypeLesson
Section ofInternet Anonymity
LangEn
  • Last modified: 6 August 2013 17:18:21


  • русская версия



Demonstrate how data and website requests travel on the Internet, the WHOIS databases and how website filtering is achieved. Draw a diagram explaining circumvention with proxy servers and explain the advantages of Tor. Demonstrate the network traffic generated by Tor.

Trainer's notes: Use wireshark and etherape for demonstration of network traffic. Prepare in advance to make sure the demo works for you (your network card, OS). With enough time and research, prepare a brief overview of past and present circumvention technologies, including http://peacefire.org, http://psiphon.ca, web translators, http accelerators, and so on.

Last modified on 7 February 2013, at 21:26