翻訳と辞書
Words near each other
・ Internet bottleneck
・ Internet branding
・ Internet Brands
・ Internet Breakthrough Party of Japan
・ Internet broadcasting
・ Internet Broadway Database
・ Internet Browser (Nintendo 3DS)
・ Internet Cache Protocol
・ Internet café
・ Internet calendar
・ Internet call waiting
・ Internet Cat Video Festival
・ Internet celebrity
・ Internet censorship
・ Internet censorship and surveillance by country
Internet censorship circumvention
・ Internet censorship in Australia
・ Internet censorship in China
・ Internet censorship in Cuba
・ Internet censorship in France
・ Internet censorship in Germany
・ Internet censorship in Hong Kong
・ Internet censorship in India
・ Internet censorship in Iran
・ Internet censorship in Malawi
・ Internet censorship in Morocco
・ Internet censorship in New Zealand
・ Internet censorship in Pakistan
・ Internet censorship in Romania
・ Internet censorship in Russia


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Internet censorship circumvention : ウィキペディア英語版
Internet censorship circumvention

Internet censorship circumvention describes various processes used by Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material.
Circumvention is an inherent problem for those wishing to censor the Internet, because filtering and blocking do not remove content from the Internet and as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to otherwise censored material. However, circumvention may not be very useful to non-tech-savvy users and so blocking and filtering remain effective means of censoring the Internet for many users.〔(''Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet'' ), Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO), Paris, 2011, 103 pp., ISBN 978-92-3-104188-4〕
Different techniques and resources are used to bypass Internet censorship, including cached web pages, web mirrors, and archive sites, alternate DNS servers, proxy websites, virtual private networks, sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws.〔(''New Technologies Battle and Defeat Internet Censorship'' ), Global Internet Freedom Consortium, 20 September 2007〕 According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for increased level of privacy.〔
There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries individuals that gain access to otherwise restricted content may be violating the law, and if caught can be expelled from school, fired from jobs, jailed, or subject to other punishments and loss of access.〔("Risks" ), ''Internet censorship wiki'', accessed 2 September 2011〕
==Circumvention, anonymity, risks, and trust==

Circumvention and anonymity are different. Circumvention systems are designed to bypass blocking, but they do not usually protect identities. Anonymous systems protect a user's identity. And while they can contribute to circumvention, that is not their primary function. It is important to understand that open public proxy sites do not provide anonymity and can view and record the location of computers making requests as well as the websites accessed.〔
In many jurisdictions accessing blocked content is a serious crime, particularly content that is considered child pornography, a threat to national security, or an incitement of violence. Thus it is important to understand the circumvention technologies and the protections they do or do not provide and to use only tools that are appropriate in a particular context. Great care must be taken to install, configure, and use circumvention tools properly. Individuals associated with high profile rights organizations, dissident, protest, or reform groups should take extra precautions to protect their online identities.〔
Circumvention sites and tools should be provided and operated by trusted third parties located outside the censoring jurisdiction that do not collect identities and other personal information. Best are trusted family and friends personally known to the circumventor, but when family and friends are not available, sites and tools provided by individuals or organizations that are only known by their reputations or through the recommendations and endorsement of others may need to be used. Commercial circumvention services may provide anonymity while surfing the Internet, but could be compelled by law to make their records and users' personal information available to law enforcement.〔

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Internet censorship circumvention」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.