What's new
  • Happy Birthday ICMag! Been 20 years since Gypsy Nirvana created the forum! We are celebrating with a 4/20 Giveaway and by launching a new Patreon tier called "420club". You can read more here.
  • Important notice: ICMag's T.O.U. has been updated. Please review it here. For your convenience, it is also available in the main forum menu, under 'Quick Links"!

Bypassing Internet CENSORSHIP, even when common secure protocols, Tor etc are blocked

PhenoMenal

Hairdresser
Veteran
We live in a digital age, but one where some governments prevent their citizens from using secure encrypted protocols (think SSL ie. HTTPS webbrowsing, ESMTP email, Tor, VPNs, torrents etc) FOR THEIR HUMAN RIGHT OF FREEDOM OF SPEECH ... we've seen this a lot in the past from North Korea, Iran, and more recently Egyptian and Syrian govt ("the west" even currently getting a LOT of attacks by the Syrian Electronic Army on sites like NYTimes, Twitter etc), and there are also many other nations who refuse to give their citizens freedom of speech.

Here is another option, a very clever software tool called 'Dust', by researcher Brandon Wiley, just presented at Defcon ... PDF

src: http://www.schneier.com/blog/archives/2013/08/evading_interne.html

The greatest danger to free speech on the Internet today is filtering of traffic using protocol fingerprinting. Protocols such as SSL, Tor, BitTorrent, and VPNs are being summarily blocked, regardless of their legal and ethical uses. Fortunately, it is possible to bypass this filtering by reencoding traffic into a form which cannot be correctly fingerprinted by the filtering hardware. I will be presenting a tool called Dust which provides an engine for reencoding traffic into a variety of forms. By developing a good model of how filtering hardware differentiates traffic into different protocols, a profile can be created which allows Dust to reencode arbitrary traffic to bypass the filters.

Dust is different than other approaches because it is not simply another obfuscated protocol. It is an engine which can encode traffic according to the given specifications. As the filters change their algorithms for protocol detection, rather than developing a new protocol, Dust can just be reconfigured to use different parameters. In fact, Dust can be automatically reconfigured using examples of what traffic is blocked and what traffic gets through. Using machine learning a new profile is created which will reencode traffic so that it resembles that which gets through and not that which is blocked. Dust has been created with the goal of defeating real filtering hardware currently deployed for the purpose of censoring free speech on the Internet. In this talk I will discuss how the real filtering hardware work and how to effectively defeat it.
 
Last edited:

Skip

Active member
Veteran
Sounds cool, but a bit technical for most ppl. Esp. if you have to manually reconfigure the protocol to stop blocking.
 

PhenoMenal

Hairdresser
Veteran
*nod* these days even with the best software it's always going to take a bit of IT/tech savvy™ when it comes to these types of programs ... but these tools ensure that people, even in rogue regimes where freedom of speech is not permitted or highly restricted, are still able to make their voices heard, and the importance of that cannot be underestimated. :)
 

LiLWaynE

I Feel Good
ICMag Donor
Veteran
Something must be created soon to make everyone and anyone who uses any device that connects to the internet or cellular network anonymous ...... THAT will be the game changer here and would restore inner peace for many

I feel like I am seriously being targeted by the NSA ever since this started and I have been vehemently protesting obama and the NSA regarding this matter... some odd shit has been happening in my life...

for example, i ordered something through USPS and when my package arrived it was ripped open so whoever handled it could see what it was that I ordered.... prior to this situation, I have done tons of business with USPS and never were any of my packages fucked with.

that is one of many strange things that has occured in last month or so...and the following is another thing that just happened day or two ago...


...I get an email from google+ asking me if I am friends with Glenn Greenwald and if so I should click a button...... now how the fuck would google+ come up with such a thing? I have sent many emails (not through gmail) and tweets to GG, but how the fck should google know that? I feel like the NSA is involved and is trying to find ANYONE who may even be remotely associated with the guy so they can monitor them in hopes of silencing them.... i mean fuck they even went as far as holding up glenn greenwalds partner for 9 hours...

am I crazy or is it a great possibility that I am being watched hard now because of my non stop internet protesting on community forums all across the net regarding this NSA matter?
 

donnaafifi

New member
I have several trials with VPN services. Nowdays i am using >>>>>link removed due to terms of use<<<<<< to bypass internet censorship. It is very reliable and encrypts your connection out of country so the censors can't see what i am doing. Some of my friends have been using it for up to 2 years with no issues.
 
Last edited by a moderator:
I just use a little USB wireless broadband modem, so when I am at work where TOR is blocked I fire up my USB broadband modem...and then use TOR.
 

Latest posts

Latest posts

Top