Major circumvention methods include alternate names and addresses; mirrors, caches, and copies; alternative platforms; proxying; and traffic obfuscation.
Alternate names and addresses Censorship filters may block specific domain names, using either
DNS hijacking or URL filtering. Websites can sometimes be accessed through alternate names and addresses that may not be blocked. Some websites offer the same content across multiple pages or domains. For example, the English Wikipedia is available at two locations: the
main page and the mobile version. If a website's DNS resolution is disrupted, but the site is not otherwise blocked, it may be possible to access the site directly by its IP address or by modifying a computer's
hosts file. It may be possible to bypass DNS-based blocking by using alternative DNS servers or
public recursive name servers (especially via an encrypted DNS client). For example, the following URLs all access the same site, but only some browsers will recognize all forms of the URL: • http://192.0.33.8/ (dotted decimal) • http://3221233928/ (decimal) • http://0300.0000.0041.0010/ (dotted octal) • http://0xc0002108/ (hexadecimal) • http://0xc0.0x00.0x21.0x08/ (dotted hexadecimal) The
Blockchain project
Namecoin is an attempt to decentralize Internet namespaces beyond the control of any single entity. Decentralized namespaces enable domains to resist censorship. Discussion of the project began in 2010 with a desire to achieve names that are decentralized, secure, and human-readable.
Mirrors, caches, and copies Certain online services allow users to access content that is blocked on the Internet through cached or mirrored copies: •
Cached pages: Some search engines retain copies of previously indexed webpages, or
cached pages, which are often hosted by search engines; these may not be blocked. •
RSS aggregators:
RSS aggregators such as
Feedly may be able to receive and then forward RSS feeds that are blocked if accessed directly.
Alternative platforms Alternative types of Internet hosting platform can provide options for circumventing Internet censorship. Such alternatives include decentralized hosting, anonymity networks, federated platforms, providers with different policies, and
darknets: •
Decentralized hosting: Content creators may publish to an alternative platform that is willing to host this content.
Napster was the earliest
peer-to-peer (P2P) platform, but it was closed because of vulnerabilities with centralized
bootstrapping.
Gnutella was the first sustainable P2P platform that featured hosting by decentralization. The motto of the
Freenet P2P platform is that "true freedom requires true anonymity." Later, the
BitTorrent P2P protocol was developed to allocate resources with high performance and fairness.
ZeroNet P2P web hosting was the first
distributed hash table (DHT) system to support dynamic and updatable webpages. The
YaCy P2P search engine is the leading distributed search.
GNUnet is rebuilding the internet framework from the ground up for resilience technologically idealized. •
Anonymity networks: The
Tor and
Invisible Internet Project (I2P) networks result in increased willingness to host content that would otherwise be censored. However, hosting implementation and server location may cause challenges, and the content is still hosted by a single entity that can be controlled. • •
Federated: Semi-decentralized, federated platforms such as
Nextcloud and
PeerTube make it easier for users to find an instance where they are welcome. •
Providers with different policies: Some platforms that rely on
cloud computing may have laxer
terms of service (TOS). However, cloud computing does not, in principle, innovate fundamental laxness.
Proxying A variety of techniques support a user in leveraging technical proxies to circumvent Internet censorship: •
Web proxy server: A Web
proxy server (or web proxy) allows users to load external web pages through a server that makes and receives requests on behalf of the user, rather than directly from the blocked original server (or source). •
Domain fronting:
Domain fronting hides the destination of a network connection by passing initial requests through a
content delivery network or other popular site that censors may be unwilling to block. This technique was used by messaging applications such as
Signal and
Telegram. Similarly, Tor's meek system uses
Microsoft's Azure cloud. However, large cloud providers such as
Amazon Web Services and
Google Cloud no longer support meek. As another option, a website owner can create a free account to use a
Cloudflare domain for fronting. •
Tunneling protocol: By employing a
tunneling protocol such as
Secure Shell (SSH), a user can forward all of their traffic over an encrypted channel; as a result, both outgoing requests to blocked sites and incoming responses from those sites are hidden from censors, for whom it appears as unreadable SSH traffic. •
Virtual private network (VPN): Through a
virtual private network (VPN), a user can create secure connections to more permissive countries, letting users browse as if they were located in one of those countries.
Traffic obfuscation A censor may be able to detect and block the use of circumvention tools through
deep packet inspection. Ongoing work aims to make circumvention tools less detectable in several ways: randomizing the traffic; attempting to mimic a whitelisted protocol; or tunneling traffic through a whitelisted site by using domain fronting or Tor's meek system. ==Internet alternatives==