Global Information Lookup Global Information

Refraction networking information


Refraction networking, also known as decoy routing, is a research anti-censorship approach that would allow users to circumvent a censor without using any individual proxy servers.[1] Instead, it implements proxy functionality at the core of partner networks, such as those of Internet service providers, outside the censored country. These networks would discreetly provide censorship circumvention for "any connection that passes through their networks."[2] This prevents censors from selectively blocking proxy servers and makes censorship more expensive, in a strategy similar to collateral freedom.[3][4][5]

The approach was independently invented by teams at the University of Michigan, the University of Illinois, and Raytheon BBN Technologies. There are five existing protocols: Telex,[6] TapDance,[7] Cirripede,[8] Curveball,[9] and Rebound.[10] These teams are now working together to develop and deploy refraction networking with support from the U.S. Department of State.[1][3]

  1. ^ a b "Refraction Networking". refraction.network. Retrieved 2020-12-06.
  2. ^ Frolov, Sergey; Douglas, Fred; Scott, Will; McDonald, Allison; VanderSloot, Benjamin; Hynes, Rod; Kruger, Adam; Kallitsis, Michalis; Robinson, David G.; Schultze, Steve; Borisov, Nikita (2017). "An ISP-Scale Deployment of TapDance". {{cite journal}}: Cite journal requires |journal= (help)
  3. ^ a b Braga, Matthew (2017-08-16). "In fight for free speech, researchers test anti-censorship tool built into the internet's core | CBC News". CBC. Retrieved 2020-12-06.
  4. ^ "$1M grant to develop secure, high-capacity research network at U-M". Michigan Engineering. 2020-01-29. Retrieved 2020-12-06.
  5. ^ "'Clever' TapDance approach to web censorship that works at ISP level". Naked Security. 2017-08-25. Retrieved 2020-12-06.
  6. ^ "Telex: Anticensorship in the Network Infrastructure | USENIX". www.usenix.org. Retrieved 2020-12-06.
  7. ^ Wustrow, Eric; Swanson, Colleen M.; Halderman, J. Alex (2014). TapDance: End-to-Middle Anticensorship without Flow Blocking. pp. 159–174. ISBN 978-1-931971-15-7.
  8. ^ Houmansadr, Amir; Nguyen, Giang T.K.; Caesar, Matthew; Borisov, Nikita (2011-10-17). "Cirripede". Proceedings of the 18th ACM conference on Computer and communications security. CCS '11. Chicago, Illinois, USA: Association for Computing Machinery. pp. 187–200. doi:10.1145/2046707.2046730. ISBN 978-1-4503-0948-6. S2CID 11019789.
  9. ^ "Decoy Routing: Toward Unblockable Internet Communication | USENIX". www.usenix.org. Retrieved 2020-12-06.
  10. ^ Ellard, D.; Jones, C.; Manfredi, V.; Strayer, W. T.; Thapa, B.; Welie, M. Van; Jackson, A. (2015). "Rebound: Decoy routing on asymmetric routes via error messages". 2015 IEEE 40th Conference on Local Computer Networks (LCN). pp. 91–99. doi:10.1109/LCN.2015.7366287. ISBN 978-1-4673-6770-7. S2CID 12887876.

and 26 Related for: Refraction networking information

Request time (Page generated in 0.8105 seconds.)

Refraction networking

Last Update:

Refraction networking, also known as decoy routing, is a research anti-censorship approach that would allow users to circumvent a censor without using...

Word Count : 412

Virtual private network

Last Update:

communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported...

Word Count : 3699

Domain fronting

Last Update:

records are stored in the same cloud. It has much the same effect. Refraction networking is an application of the broader principle. The basis for domain...

Word Count : 2504

Censorship of Skype

Last Update:

proxy server P2P Web proxies SSH VPN PAC Without a proxy server HTTPS IPv6 transition mechanism hosts DNSCrypt Domain fronting Refraction networking...

Word Count : 593

Refractive error

Last Update:

"objective refraction" the clinician typically shows the person lenses of progressively higher or weaker powers in a process known as subjective refraction. Cycloplegic...

Word Count : 3821

Hyphanet

Last Update:

original on 5 October 2015. Retrieved 29 November 2017. Freenet Social Networking guide Archived 15 August 2015 at the Wayback Machine Justus Ranvier, 2013...

Word Count : 6086

GoAgent

Last Update:

GoAgent is a GNU GPL open-source cross-platform network access software. It is mainly written with Python and supports Windows, OS X, Linux and most Linux-based...

Word Count : 144

HTTPS

Last Update:

Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol...

Word Count : 4373

Freegate

Last Update:

firewalls that block web sites by using DIT's Peer-to-peer (P2P)-like proxy network system.[failed verification] FreeGate's anti-censorship capability is further...

Word Count : 1289

Hotspot Shield

Last Update:

Spring protests in 2010, protesters used Hotspot Shield to access social networking tools to communicate and upload videos. Hotspot Shield was also widely...

Word Count : 1026

Java Anon Proxy

Last Update:

and whom they won't. This is different from peer-to-peer based anonymity networks like Tor and I2P, whose anonymization proxies are anonymous themselves...

Word Count : 965

Outline VPN

Last Update:

The two technologies are similar in the way they can be used to redirect network traffic and make it appear as originating from another device (the server)...

Word Count : 621

Psiphon

Last Update:

a Web proxy. Psiphon is a centrally managed and geographically diverse network of thousands of proxy servers, using a performance-oriented, single- and...

Word Count : 1101

DNSCrypt

Last Update:

DNSCrypt is a network protocol that authenticates and encrypts Domain Name System (DNS) traffic between the user's computer and recursive name servers...

Word Count : 943

Ultrasurf

Last Update:

found that the UltraReach network employed squid and ziproxy software, as well as ISC BIND servers bootstrapping for a wider network of open recursive DNS...

Word Count : 1579

Shadowsocks

Last Update:

Retrieved 11 January 2018. clowwindy (22 August 2015). "Adopting iOS 9 network extension points". Archived from the original on 22 August 2015. Retrieved...

Word Count : 993

Sneakernet

Last Update:

RFC describing the transmission of messages via homing pigeon. Air gap (networking) Darknet Data Mule IP over Avian Carriers Jargon File Meatspace Pod slurping...

Word Count : 2351

USB dead drop

Last Update:

therefore be regarded as an anonymous, offline, peer-to-peer file sharing network. In practice, USB dead drops are more often used for social or artistic...

Word Count : 1532

InterPlanetary File System

Last Update:

System (IPFS) is a protocol, hypermedia and file sharing peer-to-peer network for storing and sharing data in a distributed file system. By using content-addressing...

Word Count : 1856

National intranet

Last Update:

A national intranet is an Internet Protocol-based walled garden network maintained by a nation state as a national substitute for the global Internet...

Word Count : 869

Wordfilter

Last Update:

on an end user's PC or computer network, and which can filter all Internet content sent to or from the PC or network in question. Since wordfilters alter...

Word Count : 1489

GreatFire

Last Update:

collateral freedom that mirrored content on widely used content delivery networks, such as Amazon CloudFront and CloudFlare, so that it would be too economically...

Word Count : 771

Veilid

Last Update:

portal Internet portal Freedom of speech portal Veilid is a peer-to-peer network and application framework released by the Cult of the Dead Cow on August...

Word Count : 258

Censorship of Twitter

Last Update:

"government officials, companies or another outside party", the social networking site will notify users from that country that they may not see it. Following...

Word Count : 7316

WebTorrent

Last Update:

BitTorrent serverless networks. Before creating WebTorrent, the developers first created PeerCDN, a peer-to-peer content delivery network which was bought...

Word Count : 741

Censorship of Facebook

Last Update:

Facebook is a social networking service that has been gradually replacing traditional media channels since 2010. Facebook has limited moderation of the...

Word Count : 5771

PDF Search Engine © AllGlobal.net