Some of the censorship schemes in place are actually quite trivial. And in some cases the issue is not one of controlling information but saving face. Tor provides a reasonably effective bypass system, probably as good as you can expect on an online scheme. The resistance in Cuba uses USB thumb drives to transport information. Looking at ways to improve the use of such drives is likely to produce a more effective counter-censorship scheme. On Fri, Mar 19, 2010 at 11:37 AM, Stephane Bortzmeyer <bortzmeyer@xxxxxx> wrote: > On Fri, Mar 19, 2010 at 09:59:44PM +0800, > MtFBwU <may.4thbwu@xxxxxxxxx> wrote > a message of 232 lines which said: > >> What if we break our data to many parts first, the transfer the >> debris nobody will notice, finally assemble them back to the >> original in the other end? > > It is used in several protocols, some of them widely implemented > <http://en.wikipedia.org/wiki/BitTorrent_(protocol)> on the Internet. > >> For example a censorship system would cut off a connection if a >> keyword TEST is triggered > > Such a censorship system would be quite stupid. We would not even need > complicated protocols to workaround it, just using synonyms or > euphemisms would suffice. > > _______________________________________________ > Ietf mailing list > Ietf@xxxxxxxx > https://www.ietf.org/mailman/listinfo/ietf > -- -- New Website: http://hallambaker.com/ View Quantum of Stupid podcasts, Tuesday and Thursday each week, http://quantumofstupid.com/ _______________________________________________ Ietf mailing list Ietf@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf