Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

Prologue
Executive Summary
Conclusions
Introduction
The need for Internet Freedoms
Report Methodology
Selecting the right tool
Blocking and Censorship
Introduction to phenomenon
Technical methods used to block
Technical methods used to circumvent
Possible actions against circumvention
Circumvention Tools Technical Evaluation
Summary19
Dynaweb
Freegate
GTunnel
Gpass
Google (Reader, Translation, Cache)
Hotspot shield
Psiphon
Ultrasurf
Your Freedom
In-Country Survey Results
Importance of Speed Versus Security
Acquiring tools
Republic of Azerbaijan
Burma
China
Iran
Findings and Recommendations
Findings
Recommendations
Glossary
Appendix 1
Methodology
Technical Assessment Methodology
Survey Methodology
Appendix II
Survey Questionnaire
0 of .
Results for:
No results containing your search query
P. 1
97

97

Ratings: (0)|Views: 26|Likes:
Published by Didier Georges

More info:

Published by: Didier Georges on Jan 11, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

02/07/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 36 are not shown in this preview.
You're Reading a Free Preview
Pages 40 to 76 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->