SlideShare a Scribd company logo
WEB FILTERING
Internet Censorship
Omid Abbasi (Student at Shiraz University)
1/21
Our Goals
• What is the censorship?
• When it started?
• Why ?
• Who started?
• What is the scope of censorship?
• Who censor the internet?
• How does the censorship take place?
• Where is the censorship happening?
• How to get ride of it?
2/21
What is internet censorship?
• Internet censorship is essentially a method used by
corporations, governments and others in order to
filter what a user can view on the internet.
3/21
Why Started?
4/21
Critics
• Families:
• limit what sites their children can access.
• Governments:
• Viewing political pages that are against the ruling party.
• News pages that would inform citizens of conflicts.
• Pages they would deem obscene.
5/21
Solution
• Shutdown the internet
• Control publishers
• Control Access
6/21
What Countries censors?
Not Free Partially Free
Free No Data 7/21
Censor What?
Traditional social values
Political National security
8/21
What Iran censors
9/21
Types of censorship
What is facebook.com
facebook.com is 173.252.110.20
Hello are you there?
VPS
Give me facebook.com homepage
Normal web browsing
Censorship node
10/21
DNS hijacking
What is facebook.com
10.10.34.34
Hello are you there?
VPS
Censorship node
Types of censorship (cont’d)
11/21
Address or Port blocking
Hello are you there?
Censorship node
What is facebook.com
facebook.com is 173.252.110.20
Types of censorship (cont’d)
12/21
Web content filtering
Hello are you there?
Censorship node
What is facebook.com
facebook.com is 173.252.110.20
Hello are you there?
Types of censorship (cont’d)
13/21
Where Internet filtering accrues(Iran)?
14/21
When there is a problem
there is a solution
15/21
Primary objective
Connect censored users to the uncensored Internet
securely and anonymously.
16/21
Anatomy of Anti-Censorship System
17/21
Anti censorship methods
http proxy
18/21
CGI proxy
phproxy
James Marshall
Anti censorship methods (cont’d)
19/21
IP tunneling (VPN)
In IP tunneling, every IP packet, including addressing
information of its source and destination IP networks,
is encapsulated within another packet format native
to the transit network.
Anti censorship methods (cont’d)
20/21
21/21

More Related Content

What's hot

Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
Jacob Gee
 
Research proposal
Research proposalResearch proposal
Research proposal
Saba Afaq
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
Ronak Karanpuria
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
qwsny
 
Censorship
CensorshipCensorship
Censorship
Ann Marie Pipkin
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
andreteh3214474
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom House
 
How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?
Canadian Centre for Court Technology
 
Cases - the backbone of e-swaraj
Cases - the backbone of e-swarajCases - the backbone of e-swaraj
Cases - the backbone of e-swaraj
smalltown_boy
 
Interactive media
Interactive mediaInteractive media
Interactive media
Helen Bruce
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Scott Mills
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
Roxanne St Ives
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
Shashank Motepalli
 
Pornography on the internet presentation
Pornography on the internet presentationPornography on the internet presentation
Pornography on the internet presentation
Joe Dimech
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
ryangregory55
 
The Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet GatekeepersThe Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet Gatekeepers
Emily Laidlaw
 
Censorship
CensorshipCensorship
Censorship
jemcneilljr
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Tissue Chowtszyan
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
Tissue Chowtszyan
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speech
Emily Laidlaw
 

What's hot (20)

Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Internet censorship by ronak
Internet censorship by ronakInternet censorship by ronak
Internet censorship by ronak
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Censorship
CensorshipCensorship
Censorship
 
Mdia5000 presentation
Mdia5000 presentationMdia5000 presentation
Mdia5000 presentation
 
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
Freedom Trends and Assumptions - A Global Assessment of Internet and Digital ...
 
How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?How does Web2.0 affect the trial process?
How does Web2.0 affect the trial process?
 
Cases - the backbone of e-swaraj
Cases - the backbone of e-swarajCases - the backbone of e-swaraj
Cases - the backbone of e-swaraj
 
Interactive media
Interactive mediaInteractive media
Interactive media
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Cst group project#2, intro++
Cst group project#2, intro++Cst group project#2, intro++
Cst group project#2, intro++
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
 
Pornography on the internet presentation
Pornography on the internet presentationPornography on the internet presentation
Pornography on the internet presentation
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
The Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet GatekeepersThe Human Rights Responsibilities of Internet Gatekeepers
The Human Rights Responsibilities of Internet Gatekeepers
 
Censorship
CensorshipCensorship
Censorship
 
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
Internet Freedom HKBU, Contemporary Europe and Asia 2012, POLS 3620
 
Internet freedom
Internet freedomInternet freedom
Internet freedom
 
What is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speechWhat is a joke? The role of social media providers in regulating speech
What is a joke? The role of social media providers in regulating speech
 

Similar to Internet Censorship

Presentation on social media
Presentation on social mediaPresentation on social media
Presentation on social media
Shahzad Ali
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
national textile university
 
101118 edemocracy workshop in Brighton
101118 edemocracy workshop in Brighton101118 edemocracy workshop in Brighton
101118 edemocracy workshop in Brighton
Mark Walker
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
RishabhParashar18
 
English presentation 1 (social media)
English presentation 1 (social media)English presentation 1 (social media)
English presentation 1 (social media)
Usama Khan
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
RishabhParashar18
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
Sean Mulholland
 
League of Women Voters Houston - Election Cybersecurity Study Overview
League of Women Voters Houston - Election Cybersecurity Study OverviewLeague of Women Voters Houston - Election Cybersecurity Study Overview
League of Women Voters Houston - Election Cybersecurity Study Overview
Jeff Reichman
 
Social Media
Social MediaSocial Media
Social Media
Bijay Bhandari
 
GLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITY
GLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITYGLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITY
GLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITY
George Dumitrache
 
Introduction to Social Media
Introduction to Social MediaIntroduction to Social Media
Introduction to Social Media
RAHUL CHAVAN
 
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Walter Neary
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
Vikas Gupta
 
Cyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle EastCyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle East
3wv
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
Andrew Krzmarzick
 
Political participation in the internet era, South Korea
Political participation in the internet era, South KoreaPolitical participation in the internet era, South Korea
Political participation in the internet era, South Korea
Binh Truong
 
The digital closet 2014 - slideshare - aug 20
The digital closet   2014 - slideshare - aug 20The digital closet   2014 - slideshare - aug 20
The digital closet 2014 - slideshare - aug 20
iSMSS, University of Alberta
 
Web whisperers
Web whisperersWeb whisperers
Web whisperers
jilloviatt
 
Research
ResearchResearch
Research
triixta
 
Social protests and online communities.pptx
Social protests and online communities.pptxSocial protests and online communities.pptx
Social protests and online communities.pptx
tigerlion13
 

Similar to Internet Censorship (20)

Presentation on social media
Presentation on social mediaPresentation on social media
Presentation on social media
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
101118 edemocracy workshop in Brighton
101118 edemocracy workshop in Brighton101118 edemocracy workshop in Brighton
101118 edemocracy workshop in Brighton
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
English presentation 1 (social media)
English presentation 1 (social media)English presentation 1 (social media)
English presentation 1 (social media)
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
League of Women Voters Houston - Election Cybersecurity Study Overview
League of Women Voters Houston - Election Cybersecurity Study OverviewLeague of Women Voters Houston - Election Cybersecurity Study Overview
League of Women Voters Houston - Election Cybersecurity Study Overview
 
Social Media
Social MediaSocial Media
Social Media
 
GLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITY
GLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITYGLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITY
GLOBAL PERSPECTIVE CAMBRIDGE IGCSE: LAW AND CRIMINALITY
 
Introduction to Social Media
Introduction to Social MediaIntroduction to Social Media
Introduction to Social Media
 
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
Friends, Faux Pas, Tweets and Traps: How Elected Officials Can Use Social Med...
 
Effects of social media on youth
Effects of social media on youthEffects of social media on youth
Effects of social media on youth
 
Cyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle EastCyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle East
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
Political participation in the internet era, South Korea
Political participation in the internet era, South KoreaPolitical participation in the internet era, South Korea
Political participation in the internet era, South Korea
 
The digital closet 2014 - slideshare - aug 20
The digital closet   2014 - slideshare - aug 20The digital closet   2014 - slideshare - aug 20
The digital closet 2014 - slideshare - aug 20
 
Web whisperers
Web whisperersWeb whisperers
Web whisperers
 
Research
ResearchResearch
Research
 
Social protests and online communities.pptx
Social protests and online communities.pptxSocial protests and online communities.pptx
Social protests and online communities.pptx
 

Recently uploaded

Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 

Recently uploaded (12)

Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 

Internet Censorship