enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. VPN blocking - Wikipedia

    en.wikipedia.org/wiki/VPN_blocking

    VPN blocking. VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems. Often used by large organizations such as national governments or corporations, it can act as a tool for computer security or Internet censorship by preventing the use of VPNs to bypass ...

  3. Internet censorship in Iran - Wikipedia

    en.wikipedia.org/wiki/Internet_censorship_in_Iran

    Following the 2009 election protests, Iran ratified the Computer Crimes Law (CCL) in 2010. [30] The CCL established legal regulations for internet censorship. Notable provisions of the CCL include the following: Article 10, which effectively prohibits internet users and companies from using encryption or protecting data in a manner that would "deny access of authorized individuals to data ...

  4. Government censorship of Telegram - Wikipedia

    en.wikipedia.org/wiki/Government_censorship_of...

    Iranian MP Mahmoud Sadeghi noted that during the two weeks that Telegram was blocked in January 2018, 30 million Iranians (75% of Telegram's users in Iran) did not start using local messaging apps, but instead turned to VPN services to circumvent the block, rendering the blockade ineffective. [49] Telegram was blocked by the government on 1 May ...

  5. Telegram in Iran - Wikipedia

    en.wikipedia.org/wiki/Telegram_in_Iran

    Telegram in Iran. The Telegram instant messaging service has had more than 50 million users in Iran. [1] Following the disruptions caused by the Iranian government in the Viber [2][3] and Line services, the Iranian people were attracted to Telegram. [4] Security was the most important reason that led to its popularity.

  6. Internet censorship circumvention - Wikipedia

    en.wikipedia.org/wiki/Internet_censorship...

    Internet censorship circumvention. Internet censorship circumvention, also referred to as going over the wall (Chinese: 翻墙; pinyin: fān qiáng) [1][2] or scientific browsing (Chinese: 科学上网; pinyin: kēxué shàngwǎng) [3] in China, is the use of various methods and tools to bypass internet censorship. There are many different ...

  7. Internet censorship - Wikipedia

    en.wikipedia.org/wiki/Internet_censorship

    Internet Protocol (IP) address blocking: Access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server , all websites on the same server will be blocked. This affects IP-based protocols such as HTTP , FTP and POP .

  8. Shadowsocks - Wikipedia

    en.wikipedia.org/wiki/Shadowsocks

    Shadowsocks is a free and open-source encryption protocol project, widely used in China to circumvent Internet censorship. It was created in 2012 by a Chinese programmer named "clowwindy", and multiple implementations of the protocol have been made available since. [7][8] Shadowsocks is not a proxy on its own, but (typically) is the client ...

  9. Tor (network) - Wikipedia

    en.wikipedia.org/wiki/Tor_(network)

    This is an accepted version of this page This is the latest accepted revision, reviewed on 28 September 2024. Free and open-source anonymity network based on onion routing This article is about the software and anonymity network. For the software's organization, see The Tor Project. For the magazine, see Tor.com. Tor The Tor Project logo Developer(s) The Tor Project Initial release September ...