Written by Sheila Dahan
On March 20, Twitter was banned in Turkey by the order of the Turkish Government, owing to the dissemination of an audio clip about the corruption of Turkish Prime Minister Recep Tayyip Erdoğan via Twitter. The authorities inundated Twitter with hundreds of court rulings ordering them to remove the content, but Twitter has yet to respond.
Twitter users reliant on local Internet providers who attempted to log onto Twitter were redirected to a page showing the court’s decision.
In response, users changed their DNS servers to international providers such as Google’s DNS service and OpenDNS. This appears to be a good method for bypassing the censorship. Following the ban, Twitter usage in Turkey increased 138%!
On March 22, the government blocked Twitter’s IP address in order to thwart those using international servers from accessing the site.
On March 29…
View original post 154 more words
If you want to use the internet while remaining completely anonymous, there are plenty of tools that you can use. Encrypted email programs, an operating system that never stores any files on your hard disk and which wipes all your RAM memory when you’ve finished, and a web browser that uses the Tor network of anonymizing proxies to ensure that your IP address is untraceable.
The bad news is that setting up an environment like this is hard work. The good news is that someone’s done all the hard work for you, so all that’s left is to download it onto a bootable DVD to get started.
View original post 425 more words
TOR allows anyone to very easily hide their true IP address when accessing a website. This makes it very difficult to ban troublesome users from accessing your site by using the common practice of blocking traffic based on IP address.
How TOR Works
TOR achieves anonymity for a user’s web traffic by bouncing all traffic randomly between other nodes in the network (other TOR users) before finally exiting the TOR network and reaching the final intended destination. Traffic only exists the TOR network from specifically designated exit nodes. Luckily for us, the TOR network infrastructure maintains a master list of all such exit nodes. The total number of all such exit nodes is relatively small (less than 100,000 currently).
By maintaining a copy of the list of all TOR exit nodes in our server’s memory, we are able to screen all incoming web traffic against that list to effectively block all…
View original post 132 more words