Refraction networking, also known as decoy routing, is a research anti-censorship approach that would allow users to circumvent a censor without using any individual proxy servers.[1] Instead, it implements proxy functionality at the core of partner networks, such as those of Internet service providers, outside the censored country. These networks would discreetly provide censorship circumvention for "any connection that passes through their networks."[2] This prevents censors from selectively blocking proxy servers and makes censorship more expensive, in a strategy similar to collateral freedom.[3][4][5]
The approach was independently invented by teams at the University of Michigan, the University of Illinois, and Raytheon BBN Technologies. There are five existing protocols: Telex,[6] TapDance,[7] Cirripede,[8] Curveball,[9] and Rebound.[10] These teams are now working together to develop and deploy refraction networking with support from the U.S. Department of State.[1][3]
^ abBraga, Matthew (2017-08-16). "In fight for free speech, researchers test anti-censorship tool built into the internet's core | CBC News". CBC. Retrieved 2020-12-06.
^"$1M grant to develop secure, high-capacity research network at U-M". Michigan Engineering. 2020-01-29. Retrieved 2020-12-06.
^"'Clever' TapDance approach to web censorship that works at ISP level". Naked Security. 2017-08-25. Retrieved 2020-12-06.
^"Telex: Anticensorship in the Network Infrastructure | USENIX". www.usenix.org. Retrieved 2020-12-06.
^Wustrow, Eric; Swanson, Colleen M.; Halderman, J. Alex (2014). TapDance: End-to-Middle Anticensorship without Flow Blocking. pp. 159–174. ISBN 978-1-931971-15-7.
^Houmansadr, Amir; Nguyen, Giang T.K.; Caesar, Matthew; Borisov, Nikita (2011-10-17). "Cirripede". Proceedings of the 18th ACM conference on Computer and communications security. CCS '11. Chicago, Illinois, USA: Association for Computing Machinery. pp. 187–200. doi:10.1145/2046707.2046730. ISBN 978-1-4503-0948-6. S2CID 11019789.
^"Decoy Routing: Toward Unblockable Internet Communication | USENIX". www.usenix.org. Retrieved 2020-12-06.
^Ellard, D.; Jones, C.; Manfredi, V.; Strayer, W. T.; Thapa, B.; Welie, M. Van; Jackson, A. (2015). "Rebound: Decoy routing on asymmetric routes via error messages". 2015 IEEE 40th Conference on Local Computer Networks (LCN). pp. 91–99. doi:10.1109/LCN.2015.7366287. ISBN 978-1-4673-6770-7. S2CID 12887876.
and 26 Related for: Refraction networking information
Refractionnetworking, also known as decoy routing, is a research anti-censorship approach that would allow users to circumvent a censor without using...
communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported...
records are stored in the same cloud. It has much the same effect. Refractionnetworking is an application of the broader principle. The basis for domain...
"objective refraction" the clinician typically shows the person lenses of progressively higher or weaker powers in a process known as subjective refraction. Cycloplegic...
original on 5 October 2015. Retrieved 29 November 2017. Freenet Social Networking guide Archived 15 August 2015 at the Wayback Machine Justus Ranvier, 2013...
GoAgent is a GNU GPL open-source cross-platform network access software. It is mainly written with Python and supports Windows, OS X, Linux and most Linux-based...
Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol...
firewalls that block web sites by using DIT's Peer-to-peer (P2P)-like proxy network system.[failed verification] FreeGate's anti-censorship capability is further...
Spring protests in 2010, protesters used Hotspot Shield to access social networking tools to communicate and upload videos. Hotspot Shield was also widely...
and whom they won't. This is different from peer-to-peer based anonymity networks like Tor and I2P, whose anonymization proxies are anonymous themselves...
The two technologies are similar in the way they can be used to redirect network traffic and make it appear as originating from another device (the server)...
a Web proxy. Psiphon is a centrally managed and geographically diverse network of thousands of proxy servers, using a performance-oriented, single- and...
DNSCrypt is a network protocol that authenticates and encrypts Domain Name System (DNS) traffic between the user's computer and recursive name servers...
found that the UltraReach network employed squid and ziproxy software, as well as ISC BIND servers bootstrapping for a wider network of open recursive DNS...
Retrieved 11 January 2018. clowwindy (22 August 2015). "Adopting iOS 9 network extension points". Archived from the original on 22 August 2015. Retrieved...
RFC describing the transmission of messages via homing pigeon. Air gap (networking) Darknet Data Mule IP over Avian Carriers Jargon File Meatspace Pod slurping...
therefore be regarded as an anonymous, offline, peer-to-peer file sharing network. In practice, USB dead drops are more often used for social or artistic...
System (IPFS) is a protocol, hypermedia and file sharing peer-to-peer network for storing and sharing data in a distributed file system. By using content-addressing...
A national intranet is an Internet Protocol-based walled garden network maintained by a nation state as a national substitute for the global Internet...
on an end user's PC or computer network, and which can filter all Internet content sent to or from the PC or network in question. Since wordfilters alter...
collateral freedom that mirrored content on widely used content delivery networks, such as Amazon CloudFront and CloudFlare, so that it would be too economically...
portal Internet portal Freedom of speech portal Veilid is a peer-to-peer network and application framework released by the Cult of the Dead Cow on August...
"government officials, companies or another outside party", the social networking site will notify users from that country that they may not see it. Following...
BitTorrent serverless networks. Before creating WebTorrent, the developers first created PeerCDN, a peer-to-peer content delivery network which was bought...
Facebook is a social networking service that has been gradually replacing traditional media channels since 2010. Facebook has limited moderation of the...