Internet Censorship Explained - Computerphile

Computerphile
15 Apr 201606:09

Summary

TLDRThis script delves into internet censorship, detailing the mechanisms of control over user-publisher communication. It explains how censors can halt information flow through DNS redirection, IP blocking, and application layer blocking. The discussion highlights the 'arms race' between censorship and resistance, with technology evolving to counteract control. It also touches on the importance of anonymity and privacy in resisting censorship, suggesting tools like TOR to maintain user privacy.

Takeaways

  • ๐ŸŒ Internet censorship involves controlling the dissemination of information by targeting the user, publisher, or the information itself.
  • ๐Ÿ” The censorship process can be broken down into blocking publication, discouraging access, or coercing users to avoid certain content.
  • ๐Ÿ’ป An example of censorship is blocking access to a website like 'youtube.com' by manipulating DNS queries or IP addresses.
  • ๐Ÿ”„ DNS redirection or sinkholing is a method where a censor-controlled server provides a false IP address for a domain, leading users away from the intended site.
  • ๐Ÿšซ IP blocking is a direct method where a censor prevents a user's connection to a specific IP address, effectively stopping access to a site.
  • ๐Ÿ” Application layer blocking allows censors to inspect content for keywords and disrupt connections carrying censored information.
  • ๐Ÿ‘ค The human element of censorship resistance involves ensuring privacy and anonymity for both publishers and users of information.
  • ๐Ÿ”‘ Censorship resistance systems aim to provide privacy, but users often need to combine these with additional anonymity services like TOR for better protection.
  • ๐Ÿ“ฐ Traditional censorship, like blocking content in newspapers, contrasts with digital censorship which involves more sophisticated technical methods.
  • ๐Ÿƒโ€โ™‚๏ธ The battle between censorship and resistance is an ongoing 'arms race', with technology for controlling and accessing information constantly evolving.
  • ๐Ÿฑโ€๐Ÿ‘ค The 'cat and mouse game' between censors and those resisting censorship involves continuous adaptation as each side develops new strategies and technologies.

Q & A

  • What are the main components of communication as it relates to internet censorship?

    -The main components of communication in the context of internet censorship are the user, the publisher, and the information being disseminated. The user is the individual seeking information, the publisher is the source providing the information, and the information itself is the content being shared between them.

  • How does internet censorship aim to control the flow of information?

    -Internet censorship aims to control the flow of information by either preventing the publication of certain content by publishers, discouraging users from accessing that information, or directly coercing users to not access it. The ultimate goal is to stop the dissemination of information deemed undesirable by the censor.

  • Can you explain the example given in the script about how censorship might occur if 'youtube.com' is blocked?

    -If 'youtube.com' is blocked, a user attempting to access it would normally type the URL into their browser, which would then query a DNS server for the corresponding IP address. A censor could interfere at this point by either claiming the domain does not exist or by providing a false IP address, leading to DNS Redirection or DNS Sinkholing.

  • What is DNS Redirection or DNS Sinkholing in the context of internet censorship?

    -DNS Redirection or DNS Sinkholing is a censorship technique where a censor-controlled DNS server provides a false IP address for a domain, redirecting the user to a different, often controlled, site instead of the originally requested one.

  • What is IP Blocking and how does it relate to internet censorship?

    -IP Blocking is a method of internet censorship where the censor prevents users from connecting to a specific IP address, effectively blocking access to a website or service. This is done at the IP layer, independent of the domain name system.

  • What is application layer blocking, and how does it differ from DNS or IP blocking?

    -Application layer blocking is a sophisticated form of censorship that involves inspecting the content of data packets for specific keywords or patterns that indicate undesirable information. Unlike DNS or IP blocking, which operate at lower levels of the network stack, application layer blocking can target specific content within the communication stream.

  • How can censorship resistance systems help protect user privacy and anonymity?

    -Censorship resistance systems can protect user privacy and anonymity by making it difficult for censors to trace the identity of users accessing certain information. By combining these systems with anonymity services like TOR, users can maintain a higher level of privacy and reduce the risk of coercion or identification.

  • What is the 'cat and mouse game' mentioned in the script in relation to censorship and censorship resistance?

    -The 'cat and mouse game' refers to the ongoing struggle between censors who attempt to control and restrict information and those who develop and use censorship resistance technologies. As censorship methods evolve, so do the countermeasures, creating a continuous cycle of adaptation and response.

  • Why is it challenging for censors to control information on social media platforms like Twitter and Facebook?

    -Controlling information on social media platforms is challenging for censors because of the vast amount of user-generated content and the fact that these platforms are hosted by major companies like Google and Twitter. Blocking these platforms entirely would result in significant collateral damage and affect many innocent users.

  • What does the term 'arms race' imply in the context of censorship and censorship resistance?

    -The term 'arms race' in this context implies the continuous competition between the development of censorship techniques and the creation of new censorship resistance technologies. As one side advances, the other must innovate to counteract the new measures, creating a cycle of escalating technological advancements.

  • How can users protect themselves from coercion by censors when accessing the internet?

    -Users can protect themselves from coercion by using a combination of censorship resistance systems and anonymity services. This includes using VPNs, proxy servers, and privacy-focused browsers, as well as being aware of the legal implications and risks associated with accessing censored content.

Outlines

00:00

๐ŸŒ Internet Censorship and Its Mechanisms

The paragraph introduces the concept of internet censorship by breaking down communication into three components: the user, the publisher, and the information being shared. It explains that censorship involves measures to prevent the dissemination of information, either by blocking publication, discouraging access, or coercing users. An example is provided where 'youtube.com' is blocked, and the process of how a user's browser interacts with DNS servers to resolve domain names is detailed. The paragraph further explains how censorship can occur at different levels: DNS redirection or sinkholing, IP blocking, and application layer blocking where content is scrutinized for keywords that trigger censorship. The discussion also touches on the human element of censorship resistance, emphasizing the importance of privacy and anonymity for users and publishers to avoid being traced.

05:03

๐Ÿ”„ The Censorship Resistance Arms Race

This paragraph delves into the dynamic struggle between censorship and censorship resistance, likening it to an 'arms race'. It points out the challenges faced by censors in controlling information on social media platforms like Twitter and Facebook, which host vast amounts of user-generated content. The paragraph highlights the difficulty for censors to block entire platforms without causing significant collateral damage due to the widespread use and reliance on these services. It also suggests that as censors enhance their methods, censorship resistance systems must evolve to counter these measures, creating a continuous cycle of adaptation and response. The paragraph concludes by hinting at the ongoing development of new strategies and technologies in this ongoing battle between censorship and resistance.

Mindmap

Keywords

๐Ÿ’กInternet censorship

Internet censorship refers to the control or suppression of what can be accessed, published, or viewed on the internet by governments or other entities. In the video, it is discussed as a series of steps that censors may take to prevent the dissemination of information, such as blocking websites or discouraging access to certain content. The example of 'youtube.com' being blocked illustrates how censorship can occur at various levels of internet communication.

๐Ÿ’กUser

A user, in the context of the video, is an individual who seeks to access information or services online. The video explains that the 'who' in communication is the user, who interacts with the publisher to access information. The censorship mechanisms can directly target users, coercing them to not access certain information.

๐Ÿ’กPublisher

A publisher, as mentioned in the script, is the entity that provides information to the user. In the context of internet censorship, publishers can be affected when censors attempt to stop the publication of certain information. The video uses 'abc.com' as an example of a publisher whose domain might be targeted by censorship efforts.

๐Ÿ’กDNS server

A DNS (Domain Name System) server is responsible for translating domain names into IP addresses that computers use to identify each other on the network. The video explains how a censor can interfere with this process by either claiming a domain does not exist or by redirecting the DNS query to a different IP address, a technique known as DNS Redirection or DNS Sinkholing.

๐Ÿ’กIP Blocking

IP Blocking is a censorship technique where access to specific IP addresses is denied. The video describes this as a method where a censor can prevent a user from connecting to a certain IP address, such as '1.2.3.4', which is associated with the publisher's website.

๐Ÿ’กApplication layer blocking

Application layer blocking is a sophisticated form of censorship that involves inspecting the content of data packets for specific keywords or patterns that indicate undesirable information. If such content is detected, the censor can disrupt the communication by sending TCP reset packets or dropping the packets, as mentioned in the video.

๐Ÿ’กAnonymity

Anonymity, as discussed in the video, is the state of being unidentifiable within a set of users. It is crucial in censorship resistance as it helps ensure that users cannot be traced or coerced. The video suggests that anonymity services like TOR can be combined with censorship resistance systems to enhance user privacy.

๐Ÿ’กCoercion

Coercion, in the context of the video, refers to the act of forcing users or publishers to comply with censorship demands. It can involve direct pressure or threats, and the video suggests that comprehensive censorship resistance systems should aim to protect users from such coercion.

๐Ÿ’กCensorship resistance

Censorship resistance encompasses the strategies and tools used to counteract internet censorship. The video describes it as an ongoing 'arms race' between the technology used for information control and the technology used to circumvent these controls. Examples include the development of new platforms and the use of anonymity services.

๐Ÿ’กSocial media

Social media platforms like Twitter and Facebook are mentioned in the video as examples of modern challenges for censorship. These platforms host a vast amount of user-generated content, making it difficult for censors to control the flow of information without causing significant disruption to other services.

๐Ÿ’กCat and mouse game

The 'cat and mouse game' is a metaphor used in the video to describe the dynamic between censors and those who resist censorship. It implies a continuous cycle of one side implementing new controls and the other side developing new ways to bypass these controls, reflecting the evolving nature of the struggle over internet freedom.

Highlights

The main components of communication are the user, the publisher, and the information.

Internet censorship involves stopping the publication or access to information.

Censors may coerce users directly to prevent access to certain information.

A simple example of censorship is the blocking of youtube.com.

DNS queries are a point where censors can intervene in internet access.

Censors can control DNS servers to redirect or block domain name resolutions.

IP Blocking is another method censors use to prevent access to specific websites.

Application layer blocking allows censors to inspect content for keywords and disrupt connections.

Censorship resistance involves publishers and users maintaining privacy and anonymity.

Anonymity services like TOR can be combined with censorship resistance systems.

Censorship in traditional media, such as newspapers, has evolved with technology.

Censorship resistance software is part of an ongoing 'arms race' with censorship techniques.

Social media platforms complicate censorship due to the volume of user-generated content.

Blocking major platforms like Twitter or Google would cause significant collateral damage.

Censorship resistance systems must adapt as censors employ more sophisticated techniques.

The battle between censorship and resistance is likened to a cat and mouse game.

Transcripts

play00:00

Well, we are going to talk about internet censorship.

play00:02

So the main components of a communication are usually

play00:06

Who is talking to whom, and what are they talking about?

play00:11

So usually the who portion is called the user,

play00:15

The Whom portion is called the publisher,

play00:18

Which provides some information to the user.

play00:21

and, the what part,

play00:23

Is the information Itself.

play00:28

So... internet censorship,

play00:30

Comprises of...

play00:32

A range of steps that the censor might take

play00:35

to either stop the publication of information, on the publisher's side.

play00:39

Or discourage the access to that information or the link that connects the user to the publisher.

play00:45

Or directly coerce users to not access that information.

play00:48

But the key point is to stop the information from being disseminated.

play00:56

I'll give you a very simple example of how censorship takes place,

play00:59

Which would kind of gives us also an Idea

play01:01

Of what are the different mechanisms available.

play01:04

If youtube.com has been blocked,

play01:06

and I am a user

play01:08

Usually the set of steps that would take place is that I would type "youtube.com" into my browser,

play01:15

Then behind the scenes my browser would generate a query to a DNS server.

play01:21

okay it was "youtube.com" but now it's "abc.com"

play01:24

so it will generate a DNS Query to the local DNS Server asking

play01:28

"what is the IP address to which I should map abc.com?"

play01:31

now, either the DNS server would already know the IP address corresponding to abc.com

play01:36

Or it would ask other DNS servers, recursively, on the internet,

play01:40

and somehow find the IP address corresponding to abc.com

play01:44

Once it has that IP address it will return that IP Address

play01:48

to the user

play01:49

Then the user's browser will use that IP adress

play01:53

to connect to abc.com

play01:56

which is at 1.2.3.4

play01:59

and send an HTTP Get Request

play02:03

for some index page.

play02:05

and if it all works well,

play02:07

then abc.com will respond with the corresponding webpage

play02:11

now as you can see this involves interaction between different entities.

play02:15

What a censor can do,

play02:16

is that it can block the user's connection at this point

play02:20

so when the user asks for the IP adress corresponding to abc.com

play02:23

the censor controlled DNS server could either say that this domain does not exist.

play02:28

or it can say that oh,

play02:30

the IP address corresponding to this domain name is 4.4.4.4

play02:36

which is something which is under the control of the censor

play02:39

this is called DNS Redirection or DNS Sinkholing

play02:42

then, at the IP layer,

play02:44

Say, if it doesn't block the connection at this layer,

play02:47

then in the next step

play02:48

what a censor can potentially do is that it can block,

play02:52

user's attempt to connect to 1.2.3.4

play02:55

which is called IP Blocking

play02:57

and then there's this concept of application layer blocking

play03:00

which dosen't involve the domain name, or the IP Address

play03:04

but rather a sophisticated censor might be able to look at the content,

play03:08

that is traveling over this channel between the user, and abc.com

play03:13

and if it finds some offensive keywords

play03:16

which are indicative that this connection is

play03:19

carrying some information which should be censored

play03:22

then based on that keyword

play03:25

it will send TCP.. it can potentially send TCP

play03:28

reset packets to both sides

play03:31

or do something else to just,

play03:32

drop packets to just disrupt the communication

play03:35

[offscreen] Break the Connection, OKay

play03:37

do people get into trouble when they try in to get in these sites? What's it?

play03:41

is that something that can be traced, when if...

play03:43

yes

play03:44

yeah. So...

play03:46

when we talk about the human element of censorship resistance

play03:51

this involves publishers of information and also the users of information

play03:55

and...

play03:56

that basically goes into the area of privacy.

play04:00

and anonymity

play04:01

so basically anonymity ensures

play04:04

that the users of a censorship resistance system

play04:07

may not be traceable.

play04:09

and...

play04:10

what you just mentioned is called coercion of users or coercion of publishers

play04:14

and ideally one of the goals of a comprehensive censorship resistance systems

play04:20

is to afford that kind of privacy to users

play04:23

but usually they don't do that and that's usually something

play04:27

that users have to take care of themselves by

play04:30

by combining their use of censorship resistance systems with anonymity services like TOR

play04:36

[Off screen] I know that a long time ago people would block out things

play04:39

in newspapers or blockout things in images and that would be a form of censorship.

play04:43

So how does it work then when people are censoring in these levels we've just talked about

play04:47

and yet there's censorship resistance software out there, what's going on, what will be the next "thing"?

play04:53

I think it's like an arms race, right? because the technology

play04:57

that is used to disseminate and retrieve information is constantly evolving

play05:02

so now we have social media websites like Twitter,

play05:06

Facebook, which have loads and loads of users generated content

play05:10

so on the one end it's very difficult for a censor

play05:13

to retain that control of information

play05:15

because now there is this whole bulk of information

play05:19

to go through

play05:21

and then also because this content is hosted by sites like

play05:25

Google or Twitter

play05:26

so they can't just block the IP address of Twitter

play05:30

and block the IP address of Google

play05:32

because that would incur alot of collateral damage

play05:35

the false positives that we previously talked about.

play05:39

but when the censor ups their game

play05:42

then the censorship resistance systems also take the next step up

play05:46

so there's basically a cat and mouse game which is in play here.

Rate This
โ˜…
โ˜…
โ˜…
โ˜…
โ˜…

5.0 / 5 (0 votes)

Related Tags
Internet CensorshipCensorship ResistanceDNS RedirectionIP BlockingContent ControlUser PrivacyAnonymityCensorship TacticsFreedom of SpeechDigital Rights