Internet Censorship Explained – Computerphile

Governments can censor access to the web, but how do they restrict access? Sheharbano Khattak, Research Assistant at the University of Cambridge Computer Laboratory takes us through the methods.

EXTRA BITS: https://youtu.be/nqbyS_Z74nc


This video was filmed and edited by Sean Riley.

Computer Science at the University of Nottingham: http://bit.ly/nottscomputer

Computerphile is a sister project to Brady Haran’s Numberphile. More at http://www.bradyharan.com


Giới thiệuThúy Navi

Thúy Navi 26 tuổi đam mê du lịch, công nghệ,đang sống và làm việc tại Hà Nội. Founder,Blogger tại Website: http://www.internetviettelnhatrang.com/

45 Bình luận

  1. "They can't just block the IP of Twitter…"

    I live in China, yes they can. lulsigh

    It'd be nice to see a follow up episode about how China censors the internet. They use many, many types of censorship. Most countries (from what I've read/watched) seem to just use 1 or 2 methods and it's very well known how they do it, even to the local population. Just like in the video, maybe you try to go to a blocked site, and it will redirect you to a site saying that the content is immoral or something. China never does this, instead you get a "this website does not exist", but additionally you may find your internet starts being crappy for 15 minutes to over an hour. This happens to me when sometimes I turn on my VPN, then it drops, trying to reconnect to different servers does nothing, but funnily enough the regular Chinanet works fine. If I continue to try reconnecting, it will continue to be crappy, but if I leave it for 20 minutes, it will connect fine after.

    Sorry for the wall of text. This interests me a lot for many reasons, one of which is that I live with this everyday.

  2. I am from Tunisia and before the revolution internet was heavily censored (youtube was blocked too). They blocked most of the known VPN and proxy servers, google search results for VPN, proxy or anything related returned a 404 error, facebook pages that talked about politics or posted links to a vpn software were censored too, even emails and attached files were monitored too.
    The only way to circumvent censorship was to ask a friend from another country to send you a new vpn program that is not known yet by the government to use, if you were brave enough of course

  3. A lot of talk about freedom here. Freedom has 2 parts though, the latter seldom being used as a slogan.

    Freedom to do whatever we want (e.g. DDOS attacks, run foldingathome at work) and freedom from whatever we want (e.g. censorship, harassment).

    Not claiming to be an expert here; just heard it sociology class.

  4. I think it is dangerous to imply Google or Facebook as information hosts to be hard to censor, because they are both US corporations and have to abide by whatever National Security Letter they receive (without telling the general public about it). So had Edward Snowden used one of these services to pass on his sensitive information, he hadn't succeeded, and the world would have lost an important opportunity for establishing more freedom in those its areas that are already labeled 'free'. So, decentralizing information, and making it as redundant as possible, hosting it not only on one site or service, but on many, and having different users host the same information on all the possible sites and services that can host information would be the most important thing. Additionally, decentralizing the network even more by having people operate home servers at their home which can be used to host sensitive and important information as well, is also a very important step.

  5. Hey, have you guys ever considered making a "Computer: Explained" type of series. Get academics to explain all about what is a computer…The math, the logic, the parts that act with each other, the display and audio, the code..like a go-to series to explain fully how a computer works.

    I'd leave the series thinking "Wow, I understand exactly how and what my computer is". It's such an asked question, and I think you guys can really do it.

  6. Yeah about that 3rd method (app based blocking), there's what they call "app signature" on firewall units, and sysadmins use that for all kinds of things other than blocking, like traffic shaping or monitoring. People can also submit new signatures to firewall manufacturers, and those that get approved are added to the database.

Trả lời

Email của bạn sẽ không được hiển thị công khai.