(Photo: Flickr / faungg) |
Internet blockades are more the rule than the exception in non-democratic countries. But there are ways to get round them, even though no censorship circumvention tool is 100 percent safe. Rule number 1: you’re clever, but the authorities are cleverer.
- Tor
Developed by the Tor Project. Worldwide the best known circumvention and security tool.
Pros: Easily available and easy to use. Good technical support.
Cons: Makes connections slow.
- Psiphon
Developed by the University of Toronto’s CitizenLab. Connections run via different servers in different countries, making origins hard to trace. Works on the basis of invitation by Psiphon to counter abuse.
Pros: No need to download software. Handy for use in internet cafés.
Cons: Invitation is a built-in security shell, but also an obstacle for users who don’t know anyone to arrange an invitation for them. Psiphon has no official security certificate. Makes connections slow.
- Ultrasurf
Developed by Ultrareach, partner of the Global Internet Freedom Consortium. Works as a program in windows.
Pros: Easy to use. Leaves no trace when uninstalled.
Cons: Has a bad name because in the past it was said to have distributed viruses.
- YourFreedom
Developed by Reichert Network Solutions. Software is free, but possibilities are limited. Possible to pay for an upgrade.
Pros: Good technical support.
Cons: Possibilities of free version limited, especially for sending data.
- JAP
Developed by JonDonym, a commercial branch of the University of Dresden.
Pros: Portable, so suitable for use in internet cafés. Reliable service, open source code. Design faults can be corrected.
Cons: Still in the test phase. Makes connections slower.
- Gpass
Developed by World’s Gate Inc., partner of Global Internet Freedom Consortium. Not only provides secure connections but also enables encryption.
Pros: Multiple secure routes, easy to install.
Cons: Has to be installed on your computer from the Consortium website. Repressive governments block the site, making the software hard to get hold of.
- Google Cache, Reader en Translation:
Developed by Google. Handy for picking up information, not suitable for distribution from a security point of view.
Pros: Accessible from any location, as long as Google and Gmail are available.
Cons: Connection isn’t secure.
- GTunnel
Developed by Garden Networks for Information Freedom, has a long history in circumvention software for users in China.
Pros: Suitable for Microsoft Windows. User can send information using GTunnel via Tor or Skype. This double security makes internet traffic securer and more anonymous but also slower. This can be a disadvantage in countries where internet runs via dial-up connections.
Cons: Limited number of servers available, especially in Taiwan.
- Freegate
Developed by Dynamic Internet Technology (DIT). Works using a limited number of proxy servers in Taiwan and the US.
Pros: Easy to use and can be stored on a USB stick, so also suitable for internet cafés. Cons: More than one version of the same software available. Status unclear. Limited number of servers. Questionable security.
- Dynaweb
Developed by Dynamic Internet Technology (DIT). Originally for China, but now also used in Iran. Works on the basis of proxy servers.
Pros: Easy to use.
Cons: Proxy servers aren’t secure. Analysts can easily find out who’s using Dynaweb. No scientific data on Dynaweb’s effectiveness. Unclear what the developers do with users’ personal details.
- Hotspot Shield
Originally developed by AnchorFree. for users of unsecured WiFi connections, not specifically for people in countries with repressive governments. Hotspot Shield also carries unsolicited advertising.
Pros: Connection via VPN.
Cons: Download can always be traced on the computer, even after the software has been fully uninstalled – a risk if a computer is confiscated. Users receive personalised ads, advertisers are allowed to use cookies. Not suited for use in non-democratic countries.
No comments:
Post a Comment