Skip to content

Commit

Permalink
Add WIP templates
Browse files Browse the repository at this point in the history
  • Loading branch information
zolagonano committed Aug 20, 2024
1 parent 33982a0 commit f819a73
Show file tree
Hide file tree
Showing 7 changed files with 17 additions and 5 deletions.
7 changes: 6 additions & 1 deletion src/SUMMARY.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,9 +2,14 @@

- [Introduction](./introduction.md)
- [Censorship Circumvention Tools]()
- [Deep Packet Inspection(DPI)](./censorship_techniques/deep_packet_inspection.md)
- [DNS Spoofing](./censorship_techniques/dns_spoofing.md)
- [IP Filtering](./censorship_techniques/ip_filtering.md)
- [Traffic Analysis](./censorship_techniques/traffic_analysis.md)
- [Censorship Circumvention Protocols]()
- [Censorship-Resistant Networks]()
- [Tor Network](./tor_network.md)
- [Tor Network](./censorship_resistant_networks/tor_network.md)
- [Censorship Techniques]()
- [Censorship Analysis Tools]()
- [Contribution Guidelines](./contribution_guidelines.md)
- [Appendix A: Concepts](./appendix_a.md)
3 changes: 3 additions & 0 deletions src/appendix_a.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
## Clearnet

WIP
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,9 @@ Tor works by routing traffic through a series of volunteer nodes. This series of

## How it works to bypass censorship

Because of the Tor network's layered routing and exit nodes (which route the Tor network's traffic to the [clearnet]()), Tor can act as a 3-layered VPN, meaning you will send your data to an entry node, and the data will be sent to the clearnet by an exit node that is very likely to have free access to the internet.
Because of the Tor network's layered routing and exit nodes (which route the Tor network's traffic to the [clearnet](/appendix_a.md#clearnet)), Tor can act as a 3-layered VPN, meaning you will send your data to an entry node, and the data will be sent to the clearnet by an exit node that is very likely to have free access to the internet.

The problem is that the Tor network's traffic is detectable by firewalls and can be censored. Also, the entry nodes are known and can be censored using [IP filtering]() or [DNS Spoofing]() techniques. Because of this problem, Tor features some circumvention tools to bypass blocked access to the Tor network.
The problem is that the Tor network's traffic is detectable by firewalls and can be censored. Also, the entry nodes are known and can be censored using [IP filtering](/censorship_techniques/ip_filtering.md) or [DNS Spoofing](/censorship_techniques/dns_spoofing.md) techniques. Because of this problem, Tor features some circumvention tools to bypass blocked access to the Tor network.

These circumvention tools are called "pluggable transports" or "bridges." They cannot usually be used directly to obfuscate normal traffic, and they must be used along with the Tor network (they can be used to obfuscate other traffic by some tweaks and modifications). [^3]

Expand All @@ -24,8 +24,8 @@ These circumvention tools are called "pluggable transports" or "bridges." They c

Tor network's communications are encrypted and secure, meaning your ISP (Internet Service Provider) cannot decrypt the content of the messages and data passing through. But they can detect that you are using Tor if it is not used with a pluggable transport such as Obfs4 or Snowflake, due to a few reasons:

- [Traffic analysis]() can be used to detect and block Tor connections based on unique characteristics of Tor network's packets, such as packet sizes (Tor has a fixed length for its cell sizes), timing, and encrypted patterns.
- [Deep Packet Inspection (DPI)]() can be used to inspect the fully encrypted data and find specific patterns associated with Tor network's communications.
- [Traffic analysis](/censorship_techniques/traffic_analysis.md) can be used to detect and block Tor connections based on unique characteristics of Tor network's packets, such as packet sizes (Tor has a fixed length for its cell sizes), timing, and encrypted patterns.
- [Deep Packet Inspection (DPI)](/censorship_techniques/deep_packet_inspection.md) can be used to inspect the fully encrypted data and find specific patterns associated with Tor network's communications.
- Tor has a public list of its entry nodes and exit nodes, which can be easily blocked by firewalls.

Also, if the Tor network is used to access the clearnet, meaning the destination of requests is not inside the Tor network (for example, duckduckgo.com is a clearnet, or normal internet website, and duckduckgogg42xjoc72x3sjasowoarfbgcmvfimaftt6twagswzczad.onion is a Tor network website), the exit node will be able to see the data that it is passing to the destination. But this is less of a problem now that most websites use HTTPS for encryption, leaving only some small metadata for exit nodes to see. And also, when they see the data, they cannot know where it came from.
Expand Down
1 change: 1 addition & 0 deletions src/censorship_techniques/deep_packet_inspection.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
WIP
1 change: 1 addition & 0 deletions src/censorship_techniques/dns_spoofing.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
WIP
1 change: 1 addition & 0 deletions src/censorship_techniques/ip_filtering.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
WIP
1 change: 1 addition & 0 deletions src/censorship_techniques/traffic_analysis.md
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
WIP

0 comments on commit f819a73

Please sign in to comment.