เชิงอรรถและอ้างอิง ของ การหลีกเลี่ยงการตรวจพิจารณาทางอินเทอร์เน็ต

  1. 1 2 The Citizen Lab (2007), CONSIDERATIONS FOR THE CIRCUMVENTION USER: who do you know?, p. 10
  2. 1 2 The Citizen Lab (2007), CONSIDERATIONS FOR THE CIRCUMVENTION USER: identity, p. 13
  3. Dutton, William H.; Dopatka, Anna; Law, Ginette; Nash, Victoria, Division for Freedom of Expression, Democracy and Peace, United Nations Educational, Scientific and Cultural Organization (UNESCO) (2011). "Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet". UNESCO.CS1 maint: Uses authors parameter (link)
  4. "New Technologies Battle and Defeat Internet Censorship" (PDF). Global Internet Freedom Consortium. 2007-09-20.
  5. The Citizen Lab (2007), where there is a problem, there is a solution, p. 9
  6. "Risks". Internet censorship wiki. 2011-09-02.
  7. "How Facebook's Tor service could encourage a more open web". The Guardian. 2014-12-05.
  8. The Citizen Lab (2007), CONSIDERATIONS FOR THE CIRCUMVENTION USER: what, where, how, p. 7
  9. 1 2 The Citizen Lab (2007), CONSIDERATIONS FOR THE CIRCUMVENTION USER: safety & security, p. 12
  10. The Citizen Lab (2007), CONSIDERATIONS FOR THE CIRCUMVENTION USER: what do you know?, p. 11
  11. "Everyone's Guide to By-passing Internet Censorship: For Citizens Worldwide" (PDF). The Citizen Lab, The University of Toronto. 2007-09. Check date values in: |date= (help)
  12. "Circumventing Network Filters Or Internet Censorship Using Simple Methods, VPNs, And Proxies". Not As Cool As It Seems. 2009-12-016. Check date values in: |date= (help)
  13. 1 2 The Citizen Lab (2007), Tricks of the Trade, p. 28
  14. 1 2 Callanan, Cormac; Dries-Ziekenheiner, Hein; Escudero-Pascual, Alberto; Guerra, Robert (2011). "Leaping Over the Firewall: A Review of Censorship Circumvention Tools" (PDF). Freedom House. Google (Reader, Translation, Cache), p. 35-36.CS1 maint: Uses authors parameter (link)
  15. 1 2 3 4 "How to: Circumvent Online Censorship". Electronic Frontiere Foundation. 2017-08-10.
  16. "Google DNS Speed". Google.
  17. "Announcement on public-dns-announce". Groups.google.com. 2011-06-09.
  18. "OpenDNS IPv6 Sandbox". OpenDNS.
  19. "OpenDNS > Support > Knowledge Base > Additional (3rd and 4th) OpenDNS Addresses". OpenDNS. สืบค้นเมื่อ 2011-09-21.
  20. "What is FamilyShield?". OpenDNS.
  21. The Citizen Lab (2007), WEB-BASED CIRCUMVENTION SYSTEMS, p. 17
  22. "Welcome to Proxy.org". proxy.org. สืบค้นเมื่อ 2018-07-10.
  23. "Opera accused of censorship, betrayal by Chinese users". CNet Asia. 2009-11-22. Archived from the original on 2013-11-03.
  24. Crawford, Douglas (July 2017). "Five Best VPN Services in 2017". BestVPN.CS1 maint: Uses authors parameter (link)
  25. "Military Thumb Drives Expose Larger Problem". MSNBC. 2006-04-13.
  26. "About alkasir". alkasir. สืบค้นเมื่อ 2011-09-16.
  27. "Anonymizer". Anonymizer, Inc. สืบค้นเมื่อ 2011-09-16.
  28. Zukerman, Erez. "Anonymizer Universal Shields You From Content-Targeting". PCWorld. สืบค้นเมื่อ 2014-01-25.CS1 maint: Uses authors parameter (link)
  29. "Secrecy for All, as Encryption Goes to Market". The New York Times. 2000-05-18.
  30. Greenemeier, Larry. "Identity-Crisis Prevention". Information Week. สืบค้นเมื่อ 2014-01-25.CS1 maint: Uses authors parameter (link)
  31. Simmons, Dan (2005-09-12). "The cost of online anonymity". BBC News. สืบค้นเมื่อ 2014-01-25.CS1 maint: Uses authors parameter (link)
  32. Marciniak, Sean (2014-01-25). "Web Privacy Services Complicate Work of Federal Investigators". The Wall Street Journal.CS1 maint: Uses authors parameter (link)
  33. Dembart, Lee (2001-10-22). "the end user / A voice for the consumer: Private I(dentity)". The New York Times.CS1 maint: Uses authors parameter (link)
  34. "Terror's Confounding Online Trail". The New York Times. 2001-10-22.
  35. Marshall, James. "CGIProxy". สืบค้นเมื่อ 2011-09-17.CS1 maint: Uses authors parameter (link)
  36. The Citizen Lab (2007), WEB-BASED CIRCUMVENTION SYSTEMS: CGIproxy, p. 18
  37. "Flash proxies". Applied Crypto Group in the Computer Science Department at Stanford University. สืบค้นเมื่อ 2013-03-21.
  38. "A portable router that conceals your Internet traffic". Ars Technica. 2014-08-14.
  39. 1 2 "Tor FAQ: I want to use Chrome/IE/Opera/etc with Tor". Tor Projects. สืบค้นเมื่อ 2018-06-19. In short, using any browser besides Tor Browser with Tor is a really bad idea. Our efforts to work with the Chrome team to add missing APIs were unsuccessful, unfortunately. Currently, it is impossible to use other browsers and get the same level of protections as when using Tor Browser.
  40. 1 2 "Tor FAQ: What programs can I use with Tor?". Tor Projects. สืบค้นเมื่อ 2018-06-19. Most people use Tor Browser, which includes everything you need to browse the web safely using Tor. Using other browsers is dangerous and not recommended. There are plenty of other programs you can use with Tor, but we haven't researched the application-level anonymity issues on all of them well enough to be able to recommend a safe configuration.
  41. 1 2 "About D.I.T." Dynamic Internet Technology. 2011-09-16.
  42. Freedom House (2011), Freegate, p. 32
  43. 1 2 Berkman Center (2007), DynaWeb Freegate Report, p. 36-42
  44. The Citizen Lab (2007), WEB TUNNELING SOFTWARE: Free: Freegate, p. 20
  45. Freedom House (2011), Dynaweb, p. 30
  46. "FreeGate". Global Internet Freedom Consortium. Archived from the original on 2014-06-02.
  47. "What is Freenet?". The Freenet Project. Archived from the original on 2011-09-16. สืบค้นเมื่อ 2011-09-16.
  48. "Predators, police in online struggle". The Dickinson Press.
  49. "Man jailed indefinitely for refusing to decrypt hard drives loses appeal". Ars Technica. 2017-03-20. A child-porn investigation focused on... [the suspect] when the authorities were monitoring the online network, Freenet.
  50. "I2P Anonymous Network". I2P Project. สืบค้นเมื่อ 2011-09-16.
  51. The Citizen Lab (2007), ANONYMOUS COMMUNICATIONS SYSTEMS: I2P, p. 27
  52. "Revocable Anonymity", Stefan Köpsell, Rolf Wendolsky, Hannes Federrath, in Proc. Emerging Trends in Information and Communication Security: International Conference, Günter Müller (Ed.), ETRICS 2006, Freiburg, Germany, 6-9 June 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, pp.206-220
  53. "JonDonym abuse resistence (sic) and law enforcement". Archived from the original on 2016-03-14. สืบค้นเมื่อ 2017-01-07.
  54. "Report on the Legal Proceedings against the Project" (PDF). AN.ON Project.
  55. "AN.ON still guarantees anonymity". สืบค้นเมื่อ 2003-08-19.
  56. Dingledine, Mathewson & Syverson (2004-08-13), 7 Attacks and Defenses: Active Attacks
  57. Freedom House (2011), JAP, p. 38-39
  58. The Citizen Lab (2007), ANONYMOUS COMMUNICATIONS SYSTEMS: JAP ANON, p. 25
  59. Berkman Center (2007), JAP Report, p. 66-71
  60. "About Psiphon". Psiphon, Inc. สืบค้นเมื่อ 2011-04-04.
  61. "Psiphon Content Delivery Software". Launchpad. สืบค้นเมื่อ 2011-09-16.
  62. . doi:10.1515/popets-2015-0009. Missing or empty |title= (help)
  63. "Psiphon End-User License Agreement". Psiphon. สืบค้นเมื่อ 2018-07-10.
  64. Fifield, D; Lan, C; Hynes, R; Wegmann, P; Paxson, V (2015-05-15). "Blocking-resistant communication through domain fronting". Proceedings on Privacy Enhancing Technologies 2015. doi:10.1515/popets-2015-0009.CS1 maint: Uses authors parameter (link)
  65. "Frequently Asked Questions: Is my Psiphon for Windows authentic?". Psiphon. สืบค้นเมื่อ 2018-07-10.
  66. "Frequently Asked Questions: How do I uninstall Psiphon for Windows?". Psiphon. สืบค้นเมื่อ 2018-07-10.
  67. Muppala, Purnabhishek (2016-09-07). "How does psiphon work and what does it do?". Quora.CS1 maint: Uses authors parameter (link)
  68. "Privacy Policy". Psiphon. สืบค้นเมื่อ 2018-07-10.
  69. "Frequently Asked Questions: Can my ISP see what I'm doing on the Internet while I'm using Psiphon?". Psiphon. สืบค้นเมื่อ 2018-07-10.
  70. "Tor: Overview". The Tor Project, Inc. สืบค้นเมื่อ 2011-09-16.
  71. "Tor Network Status". สืบค้นเมื่อ 2016-01-14.
  72. Glater, Jonathan D. (2006-01-25). "Privacy for People Who Don't Show Their Navels". The New York Times. สืบค้นเมื่อ 2011-05-13.
  73. "Tor FAQ: I want to run another application through Tor". Tor Projects. สืบค้นเมื่อ 2018-06-19. If you are trying to use some external application with Tor, step zero should be to reread the set of warnings for ways you can screw up. Step one should be to try to use a SOCKS proxy rather than an HTTP proxy. Typically Tor listens for SOCKS connections on port 9050. Tor Browser listens on port 9150.
  74. 1 2 Alin, Andrei (2013-12-02). "Tor Browser Bundle Ubuntu PPA". Web Upd8. สืบค้นเมื่อ 2014-04-28.
  75. Knight, John (2011-09-01). "Tor Browser Bundle-Tor Goes Portable". Linux Journal. สืบค้นเมื่อ 2014-04-28.
  76. Freedom House (2011), Tor, p. 41-42
  77. The Citizen Lab (2007), ANONYMOUS COMMUNICATIONS SYSTEMS: Tor, p. 26
  78. "About UltraReach". Ultrareach Internet Corp. 2011-09-16.
  79. 1 2 The Citizen Lab (2007), WEB TUNNELING SOFTWARE: Free: UltraReach, p. 19
  80. Freedom House (2011), Ultrasurf, p. 43
  81. Roberts, Hal; Zuckerman, Ethan; Palfrey, John. "2007 Circumvention Landscape Report". Berkman Center of Law and Society, Harvard University. 7 Ultrareach Report, pp. 43-47. สืบค้นเมื่อ 2009-03-05.CS1 maint: Uses authors parameter (link)
  82. Freedom House (2011), Summary, pp. 28-29
  83. Freedom House (2011), Simplified Flowchart providing guidelines on how to select the appropriate tool, p. 16

ใกล้เคียง

การหลั่งน้ำอสุจิ การหลีกเลี่ยงการตรวจพิจารณาทางอินเทอร์เน็ต การหลอกลวงตัวเอง การหลั่งนอกช่องคลอด การหลอมนิวเคลียส การหลีกเลี่ยงการเสีย การหลั่งใน การหลับ การหลบหนีและการถูกขับไล่ของชาวเยอรมัน (ค.ศ. 1944–1950) การหลอมละลายนิวเคลียร์