Episoder
-
TLS used to expose data like Server Name Indication during the handshake. Encrypted Client Hello (ECH) fixes that by encrypting handshake info, defeating SNI-based blocking. This episode covers how ECH works, its adoption push, and how censors might react. It also explores the privacy vs. visibility debate between users and network operators focused on security.
-
Shifting into the encryption era, you introduce DNS over HTTPS (DoH) and explain how it attempts to shield DNS queries from on-path observers. This episode investigates the controversies around DoH—whether centralization of DNS resolvers shifts power to big tech, and whether it genuinely thwarts censorship or simply moves the choke point to another layer (e.g., government regulation of public DoH endpoints).
-
Mangler du episoder?
-
This episode explores how DNS, traditionally in plaintext, exposes user intentions and becomes a target for censorship via spoofing, redirection, or injection. It covers classic DNS-based blocking tactics and examines how the fragmented, distributed nature of the DNS ecosystem influences censorship approaches.
-
Here, you map out the “where” of censorship: ISPs, internet exchange points (IXPs), backbone providers, and government-run or regulated network segments. The focus is on how each actor can enforce blocking or filtering, and what legal or political frameworks empower them. Real-world examples (e.g., national firewalls) highlight the many ways organizations leverage these choke points to monitor or restrict content.
-
This episode explores how unencrypted (plaintext) traffic historically enabled governments, ISPs, and entities to monitor and control internet communications. You'll learn foundational concepts—such as internet structure, traffic routing, and administrative interventions—to illustrate why plaintext channels (e.g., classic DNS) facilitate censorship and surveillance.
-
Some governments take censorship further by shutting down the internet entirely. We analyze case studies from Myanmar, Ethiopia, and Sudan, examining economic and social impacts, resistance strategies, and expert insights on the growing trend of shutdowns as a political tool.
Created with NotebookLM.
-
We examine popular circumvention methods—VPNs, Tor, and encrypted DNS (DoH/DoT)—and how governments counter them. What makes these tools effective? What are their limitations? Insights from Feldstein reveal the ongoing battle between censors and those fighting for open internet access. Created with NotebookLM.
-
Censorship isn’t just about blocking—sometimes, it’s about disruption. This episode covers DDoS attacks, how states and non-state actors deploy them, and their impact on independent media. We discuss mitigation techniques, collateral effects, and whether DDoS remains a viable tool for online suppression. Created with NotebookLM.
-
We dive into Deep Packet Inspection (DPI), TCP resets, and packet filtering—tools used to inspect and block content. As HTTPS adoption grows, how does it challenge censorship? We examine how encrypted protocols make DPI less effective and discuss the arms race between censors and developers of secure communication tools. Created with NotebookLM.
-
We explore early censorship techniques like IP blocking and DNS manipulation, alongside economic levers such as data taxes and ISP restrictions. How did these methods evolve, and how effective were early circumvention strategies? Historical case studies set the stage for more advanced filtering techniques in later episodes. Created with NotebookLM.
-
This episode introduces internet censorship, exploring its motivations—political, economic, and cultural. We discuss its impact on societies and individuals, the tools governments use, and a preview of future episodes on filtering, circumvention, and shutdowns. Created with NotebookLM.