J. Hall, Michael D. Aaron, Amelia Andersdotter, Ben Jones, Nick Feamster, Mallory Knodel
{"title":"全球审查技术调查","authors":"J. Hall, Michael D. Aaron, Amelia Andersdotter, Ben Jones, Nick Feamster, Mallory Knodel","doi":"10.17487/rfc9505","DOIUrl":null,"url":null,"abstract":"This document describes the technical mechanisms used by censorship regimes around the world to block or impair Internet traffic. It aims to make designers, implementers, and users of Internet protocols aware of the properties being exploited and mechanisms used to censor end-user access to information. This document makes no suggestions on individual protocol considerations, and is purely informational, intended to be a reference.","PeriodicalId":21471,"journal":{"name":"RFC","volume":"13 1","pages":"1-34"},"PeriodicalIF":0.0000,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Survey of Worldwide Censorship Techniques\",\"authors\":\"J. Hall, Michael D. Aaron, Amelia Andersdotter, Ben Jones, Nick Feamster, Mallory Knodel\",\"doi\":\"10.17487/rfc9505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This document describes the technical mechanisms used by censorship regimes around the world to block or impair Internet traffic. It aims to make designers, implementers, and users of Internet protocols aware of the properties being exploited and mechanisms used to censor end-user access to information. This document makes no suggestions on individual protocol considerations, and is purely informational, intended to be a reference.\",\"PeriodicalId\":21471,\"journal\":{\"name\":\"RFC\",\"volume\":\"13 1\",\"pages\":\"1-34\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"RFC\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.17487/rfc9505\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"RFC","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17487/rfc9505","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This document describes the technical mechanisms used by censorship regimes around the world to block or impair Internet traffic. It aims to make designers, implementers, and users of Internet protocols aware of the properties being exploited and mechanisms used to censor end-user access to information. This document makes no suggestions on individual protocol considerations, and is purely informational, intended to be a reference.