A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies

A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies

Christopher S. Leberknight, Mung Chiang, Felix Ming Fai Wong
Copyright: © 2012 |Pages: 16
DOI: 10.4018/jep.2012100102
(Individual Articles)
No Current Special Offers


This paper presents a conceptual study of Internet anti-censorship technologies. It begins with an overview of previous research on Internet anti-censorship systems and discusses their social, political and technological dimensions. Then for deployed Internet anti-censorship technologies, a taxonomy of their principles and techniques is presented, followed by a discussion of observed trends and implications. Based on the observations, the paper concludes with a discussion on the most critical design features to enable a successful and effective system.
Article Preview

2. Previous Research

Extant literature on circumvention technologies discusses several techniques and strategies for designing censorship resistant systems. There are two main dimensions: free access to information and free publication of information, the second being even more challenging than the first.

A key component for any censorship resistant system or circumvention technology is to ensure privacy by enabling users to communicate undetected in a censorship network. This is often accomplished by incorporating certain techniques such pseudonymity and anonymity into the system. However, previous research suggests that current techniques to ensure privacy still reveal a significant amount of identifying information (Rao & Rohatgi, 2000). Rao and Rohatgi (2000) indicate that techniques from linguistics and stylometry can use the identifying information to compromise pseudonymity. They suggest some countermeasures to address syntactic and semantic leaks of information. With respect syntactic leaks the authors suggest using a thesaurus tool, which could prompt the user to use alternatives while composing messages thereby reducing variations in vocabulary. For semantic leaks, they suggest translating the message to another language and then back again to the original language (Rao & Rohatgi, 2000).

Complete Article List

Search this Journal:
Open Access Articles
Volume 10: 2 Issues (2019)
Volume 9: 2 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing