> 1. Since many users from various censoring countries are here, > what are the rules re. censorship (if they are written..) > say in places like Myanmar, China, Singapore, UAE, Saudi Arabia etc... ? It is difficult to determine exactly what countries block all the time, since it is prone to change, however you'll find that most countries censor porn (often some commercial list they've purchased) and sites of specific political concern. Myanmar Uses dansguardian I've found that some porn and dissident (i.e. free burma type) sites are blocked. China Uses sophisticated packet filtering Can ban by keyword Bans lots of sites (difficult to tell exactly b/c 1. after visiting a blocked site your connection will die for a seemingly random period of time 5 -20 min and 2. because the errors you get a generic network timeout (i.e. 400 and above) etc... but they block tinbet sites, falun gong sites etc... see the Berman Center's study for details) Singapore block porn -- reportedly 100 high impact sites. I've found that playboy.com sex.com are blocked. I havent really looked into it in more detail than that. UAE I've found mostly porn is blocked and some specific sites critical like uaeprison.com Saudi Mostly porn, gambling and dissident e.g. MIRA are blocked. I am working on a world wide study of this if anyone is interested. (metac0m@xxxxxxxxx) > Do these countries have their Do's and don't in some website ? > If so URL please Many ISP's have their terms of service posted -- often in english too -- but they are generally vague. > > 2. There used to be a web site called "Safe Web" and they had > a proxy called Triangle boy (if I remember right) > Are these guys in business still ? If so under what name ? where? Triangle boy is no longer around. > > 3. Which free servers allow you to run your software from there > for e.g. If I wish to set up a stunnel connection, would any free server > be of help Point of access for circumvention is problematic: if you can find out about it publicly so can those who want to censor it. Its far easier if you have freinds/relatives in a non censored country who can install circumvention software for you. Anoter problem is -- and I've experienced this -- that if you setup a publicly accessible circumvention system people begin downloading entire porn movies hogging up all your bandwidth -- it can be very frustrating. The other problems are a) if your connection is not encrypted anyone upstream (i.e. you ISP) can easily track the content of your sessions, also if they censor by keyword you may also still be censored. If you use an ancrypted connection -- HTTPS, SSH etc.... then they can only see that you have connected to the remote server -- they cannot in the case of HTTPS see the path of what you've requested -- so if you setup a CGIProxy etc... be sure to include a random path so that if they connect to what you've connected to to see whats going on they can't see that you are accessing a circumvention system. > One reason I look for free ones is that I'm afraid m credit card payments > can be easily traced. The other reason of course should be obvious !!! > > > TIA > DG > > > > > On 11 Jan 2004, wayne <wayne@xxxxxxxxxxxxx> wrote: > >> From: John Doe <johndoe32102002@xxxxxxxxx> > >> Subject: [noCensorship] Re: request advice > >> To: nocensorship@xxxxxxxxxxxxx > >> > >> If you get me a port, I can get you through unfiltered > >> internet with the software HTTPort. > > > >Or even without HTTPort, in fact. :-) > > > >> Because it is a > >> "high crime" in your country for you to do so, I would > >> be cautious. Whatever bypass you use, it will be > >> visible to their firewall and their logs of that. The > >> only way to stay "invisible" and use proxies is to get > >> 20 people to host a http proxy on the port and switch > >> the proxy every 30 sec. with Multiproxy Software > >> (making it look like you are going to different > >> sites). > > > >And that would look suspicious too. > >As well as being logged just as easily. > >Not invisible, by any stretch of the imagination. > > > >In the worst scenario, they own the wires out of the country, > >they are network sniffing everything, so they can see anything > >that passes out. Even if it's all encrypted, they can see the > >user's IP address, and the (immediate) destination(s). > >Those 30 sec switches would presumably be connections on > >unblocked (and therefore non-standard) ports - they probably > >wouldn't look much like web sites. > > > >The safest approach is still to encrypt it all. Unfortunately > >that looks suspicious too, but at least you can say you're looking > >at a secure site. Especially if the first site you are connected > >to is on port 443. That's something someone could easily set up > >for Sayar - do you want to offer? I'd be happy to help you set it > >up. > > > >I don't want to go into details in public, because it's a bit too > >easy to incriminate both myself (I use this technique a lot, > >under similar circumstances), as well as anyone who would try > >it from a place where noone else would even be thinking of it. > > > >To find out if this is even possible Sayar needs to test port 443 > >to start with, of course. > > > >> Good luck, > >> John Doe (U.S.) > > > ===8>============== noCensorship community =============== > List's webpage: //www.freelists.org/webpage/nocensorship > List's archive: //www.freelists.org/archives/nocensorship > To unsubscribe: nocensorship-request@xxxxxxxxxxxxx with 'unsubscribe' in the > SUBJECT field. > Moderator's email: nocensorship-moderators@xxxxxxxxxxxxx > ===8>============== noCensorship community =============== > > > ===8>============== noCensorship community =============== List's webpage: //www.freelists.org/webpage/nocensorship List's archive: //www.freelists.org/archives/nocensorship To unsubscribe: nocensorship-request@xxxxxxxxxxxxx with 'unsubscribe' in the SUBJECT field. Moderator's email: nocensorship-moderators@xxxxxxxxxxxxx ===8>============== noCensorship community ===============