Examples of commonly used tools include Lantern and Psiphon, which combine various approaches to bypass multiple types of safeguards.
[1][2] The drawback of this method is that many censors block the IP address of restricted domains in addition to the DNS, rendering the bypass ineffective.
Other tools circumvent the tunnel network traffic to proxies from other jurisdictions that do not fall under the same censorship laws.
[5] Estimates of adoption of circumvention tools vary substantially and are disputed, but are widely understood to be in the tens of millions of monthly active users.
[6][7][8][9] Barriers to adoption can include usability issues,[10] difficulty finding reliable and trustworthy information about circumvention,[11] lack of desire to access censored content,[12] and risks from breaking the law.
[4] There are many methods available that may allow the circumvention of Internet filtering, which can widely vary in terms of implementation difficulty, effectiveness, and resistance to detection.
The BitDNS discussion began in 2010 with a desire to achieve names that are decentralized, secure and human readable.
The Docker Registry Image Repository is a centralized storage, application stateless, and node scalable HTTP public service and has a performance bottleneck in the multinational upload and download scenario.
[2] For example, the mobile Opera Mini browser uses a proxy-based approach employing encryption and compression in order to speed up downloads.
[22] Domain fronting: Circumvention software can implement a technique called domain fronting, where the destination of a connection is hidden by passing the initial requests through a content delivery network or other popular site which censors may be unwilling to block.
According to GlobalWebIndex in 2014 there were over 400 million people using virtual private networks to circumvent censorship or for increased level of privacy, although this number is not verifiable.
[5] Tor and other circumvention tools have adopted multiple obfuscation techniques that users can use depending on the nature of their connection, which are sometimes called "Pluggable Transports".
The following are some detailed examples: Datacasting allows transmission of Web pages and other information via satellite broadcast channels bypassing the Internet entirely.
This requires a satellite dish and suitable receiver hardware but provides a powerful means of avoiding censorship.
Because the system is entirely receive-only for the end user, a suitably air-gapped computer can be impossible to detect.
[30] A sneakernet is the transfer of electronic information, especially computer files, by physically carrying data on storage media from one place to another.
[6] Measures and estimates of circumvention tool adoption have reported widely divergent results.
[42] The day after the block, the total number of posts made in Turkey was up 138%, according to Brandwatch, an internet measurement firm.
Open public proxy sites do not provide anonymity and can view and record the location of computers making requests as well as the websites accessed.
Individuals associated with high-profile rights organizations, dissident, protest, or reform groups should take extra precautions to protect their online identities.
[4] Circumvention sites and tools should be provided and operated by trusted third parties located outside the censoring jurisdiction that do not collect identities and other personal information.
Once configured, an HTTP proxy tool allows the user transparently to use his normal browser interface.