Chief Technical Officer of American non-profit organization Center for
Democracy & Technology, whose mission is to promote an open, modern
and free internet , Runa Sandvik Tuesday, April 29 in Moscow said on
regulated Internet and ways to circumvent the ban by using the anonymous
network Tor.Leading
meetings, chief editor Andrei Soldatov Agentura.Ru started with the
fact that the methods introduced in the Russian Internet regulation
resemble Chinese . In particular , he noted that the Russian security services insist on
banning the use of project Tor, allowing you to stay anonymous on the
Internet as much as possible .According
Sendvik , Tor originated as a research project in 2000 in the research
laboratory of the Navy - " Center for High Performance Computing Systems
." Now military intelligence is funding the project , but most of the money allocated by the state, through grants . Initially, the project worked 2 man now - 20 people.In
the project there is no central coordination Tor , experts engaged in
the development of open source and correcting errors in it. The project is managed by volunteers , to sites they do not have access . As
planned by the network was the most decentralized and independent, it
was physically impossible to monitor what is happening in it.
Tor, clarified Sandvik operates as follows : the data goes through proxy servers randomly. When you boot the system automatically Tor client randomly selects from more than five thousand three sites that the user will use the current session. Every 10 minutes the computer changes the current proxy on three new , giving priority to the fastest .Now operates approximately 5.3 thousand units by half a million users who surf the Internet all over the world . Most of the servers are in the U.S. and Germany , but nothing prevents install it anywhere in the world , said Sandvik . By Tor users increased during the "Arab Spring ", when many governments have tried to limit access to the Internet .Using Tor is not intended in any country of the world. Problems with the law , explained the representative NGOs usually occur because the purpose for which used an anonymous network . Restrictions that are associated with using Tor, also can be circumvented. An example of this is Iran , which prohibits the use of a VPN (virtual private network) and proxy servers , but in any kiosk you can buy a USB flash drive with a login and password to the VPN.
China has blocked all servers and Tor Project website where you can download the software. In response bridge nodes were created , ie servers closed ip- addresses. To connect to it you need to know about their existence , but on the other hand, the Chinese authorities did not know how to block them .Russian , Chinese , Iranian and Syrian intelligence services use technology DPI ( technology accumulation of statistical data , as well as checking and filtering network packets based on their contents ), which allows us to calculate how to use the traffic. Its use including blocking Tor.According to Sandvik , and there is a way to bypass it . You can choose how to display traffic Tor, if it is applied to technology DPI. It can recognize data two ways of packaging of the possible five , so that the chances of the compound is high enough to remain anonymous .Tor constantly receives requests from law enforcement agencies with requests to explain how the system works because it is used in illegal purposes , the employee told the Center for Democracy & Technology. "We have conducted seminars , and told that there is bona fide and malicious users , explaining what information is available , and what we can not afford , as it is not neither we nor anyone else ," - said Sandvik . According to her, in Germany and Switzerland were precedents when exiting nodes owners accused of using their Tor servers for illegal activities. Sandvik also recommended not to store server at home , in case the search was not seized other property.
Tor, clarified Sandvik operates as follows : the data goes through proxy servers randomly. When you boot the system automatically Tor client randomly selects from more than five thousand three sites that the user will use the current session. Every 10 minutes the computer changes the current proxy on three new , giving priority to the fastest .Now operates approximately 5.3 thousand units by half a million users who surf the Internet all over the world . Most of the servers are in the U.S. and Germany , but nothing prevents install it anywhere in the world , said Sandvik . By Tor users increased during the "Arab Spring ", when many governments have tried to limit access to the Internet .Using Tor is not intended in any country of the world. Problems with the law , explained the representative NGOs usually occur because the purpose for which used an anonymous network . Restrictions that are associated with using Tor, also can be circumvented. An example of this is Iran , which prohibits the use of a VPN (virtual private network) and proxy servers , but in any kiosk you can buy a USB flash drive with a login and password to the VPN.
China has blocked all servers and Tor Project website where you can download the software. In response bridge nodes were created , ie servers closed ip- addresses. To connect to it you need to know about their existence , but on the other hand, the Chinese authorities did not know how to block them .Russian , Chinese , Iranian and Syrian intelligence services use technology DPI ( technology accumulation of statistical data , as well as checking and filtering network packets based on their contents ), which allows us to calculate how to use the traffic. Its use including blocking Tor.According to Sandvik , and there is a way to bypass it . You can choose how to display traffic Tor, if it is applied to technology DPI. It can recognize data two ways of packaging of the possible five , so that the chances of the compound is high enough to remain anonymous .Tor constantly receives requests from law enforcement agencies with requests to explain how the system works because it is used in illegal purposes , the employee told the Center for Democracy & Technology. "We have conducted seminars , and told that there is bona fide and malicious users , explaining what information is available , and what we can not afford , as it is not neither we nor anyone else ," - said Sandvik . According to her, in Germany and Switzerland were precedents when exiting nodes owners accused of using their Tor servers for illegal activities. Sandvik also recommended not to store server at home , in case the search was not seized other property.
0 comments:
Post a Comment