How to bypass a blocked sites?

click fraud protection

the spring of 2014 in Russia began to apply the law to censor the Internet, which gives the right to a number of agencies without a court order to block as individual web pages and entire sites.At the moment, the Russian Federation denied access to dozens of information resources.But immediately after the adoption of this law, and there were ways of how to bypass a blocked site.It was suggested that a lot of them - from simple, accessible to any user, to technically complex, but giving bonuses.

Services Google

view banned sites can be and with the help of some services Google.If you go to the page Google translator, inserted into the transfer window link to a blocked page and press the enter key, then open the desired page.For correct display of the content it is desirable to choose the method of view "Original".

You can also use "Google" -kesh.It's enough to open the Google homepage and copy it in the search box desired link, adding it to the left "cache:" without quotes, then press Enter.

serious disadvantage of this method is the inability to view the blocked images, as well as interactive content sites.If you suddenly get blacklisted and social networks will be a question about how to get around blocking "VKontakte", for example, the service "Google" will not help.They are only suitable for viewing text in static pages.

Opera browser in turbo mode

The easiest way to visit forbidden sites in Russia - enable turbo mode in the browser Opera.In this case, the traffic will not go directly, but through the server Opera.Initially, this technology was created to speed up the loading of web pages and save bandwidth, but proved to be effective and to overcome censorship.Mobile browsers Opera and Chrome also support turbo mode.

The disadvantages of this method include the fact that the turbo mode does not hide the ip address of the user.As image compression can degrade their quality.There

turbo mode and "Yandex" has-browser is, but for obvious reasons, it is unlikely he is effective as a tool to combat censorship.

anonymizer

anonymizer - are special websites designed, as you might guess from the name, for anonymous surfing.With their help, you can also implement Bypass sites or get to those Internet resources, which have been banned.Some anonymizer also provide an opportunity to choose a country through which traffic will go.In this case, the site to which you refer, will take you for a user in a given country.

anonymizers work scheme is very simple.You just need to go to a website and enter the address of the page you want in the on-site field.

anonymizer can be fraught with danger - the owner of the service has the ability to intercept transmitted user data, including passwords and logins on websites.To protect your personal information, we recommend using aninimayzerami that support the secure connection (SSL).

Another disadvantage of these services - advertising banners.However, there are also ad-free anonymizer.

Plug-ins for browsers

Chrome and Firefox allow to install additional plug-ins that extend the functionality of the browser.There are plugins for circumvention.

One of the most effective, yet simple plug-in - it Stealthy .When using it, just click the mouse button to send traffic through a proxy server.When the proxy mode is enabled, the plugin icon will be green when turned off - red.

plugin friGate a bit more complicated to use.He directs traffic through a proxy only to those sites that made his list.The plugin has a list of the default, as well as an opportunity to add to the new sites.The advantage of this expansion is a high speed data transmission.

There was already a plugin developed specifically for the visit is the resources that are made in their "black list" Roskomnadzor.Blocking sites that Office is carried out by sending a Russian provider ip addresses of Internet resources, access to which should be closed.Plugin NoZapret collects data on the blocked addresses from the site "Antizapret.info" and then on the basis of their self-generated list of sites that will be open through the proxy.All other connections will be carried out directly.This plugin is convenient because it does not require manual adjustment and ensures fast data loading.

should be remembered that the use of these plug-ins do not provide complete anonymity online, but only allows you to bypass restrictions imposed by the authorities in individual countries.Furthermore, as in the case of web proxy owner proxy through which traffic may optionally intercept private data members.

"Torbrauzer"

Tor - a distributed network, providing users with a high level of anonymity.Track actual location of the one who comes to your site through Tor, it is practically impossible, since the traffic goes encrypted through several nodes.

In order to use this technology, you need to download from the official website and install Tor Browser Bundle .There are variants of the browser for the operating systems Windows, Mac OS and Linux.Tor Browser for Android is called Orbot .

advantage of using "Torbrauzera" is that it allows you to bypass filtering of sites, and to carry out really anonymous surfing.The technology also allows you to create a Tor hidden sites which can be accessed only through a network of Tor.For more information on these sites can be found by visiting the Hidden Wiki - hidden directory services, which itself is only available through the "Torbrauzer."

Have Tor network, and serious shortcomings.Firstly, it is a low data rate.The fact that the network nodes are supported by enthusiasts, however throughput nodes may vary greatly.It is natural that the traffic passing through several random sites, it is often quite slow.

Another danger lies in the possibility of scanning the traffic masters of end nodes, from which information is transmitted, in contrast to the intermediate nodes in an unencrypted form.To prevent theft of passwords should be possible to work with those sites that support the https-protocol.

VPN

Virtual Private Network, or VPN, - a technology that allows you to skip all the traffic from all applications via a remote server, usually located in another country.The data between the user computer and the remote server is encrypted and can not be intercepted by the ISP.

main feature of VPN is that the proxy server sends all traffic completely.If you use multiple browsers, you do not need to configure each of them separately - bypassing the lock sites will be carried out automatically.

There are several types of VPN.So do not be superfluous to elaborate on their features.

PPTP - this protocol has been used for a long time.It is supported by all popular platforms and operating systems.Configure the router to transmit traffic through the VPN, you can view without installing additional software.The disadvantage of this protocol is not sufficiently strong encryption.In addition, there may be problems with PPTP-connection via 3G-modem.

L2TP - protocol that allows tunneling only.Therefore, as generally used in conjunction with IPSec - such sheaf and also provides encryption.However, if you care only a question of how to bypass the blocking of sites, encryption is optional.This kind of VPN does not require the installation of special software.

OpenVPN - the most common type of virtual private networks.It provides strong encryption of transmitted information.Overcomes NAT and corporate firewalls when properly configured.To work with OpenVPN must be installed on the computer any additional software.

Most VPN-paid services.Free VPN or have a limit on the amount of transmitted and received traffic, or show ads on the page you are viewing.The rate paid services have also, of course, much higher.

open proxy

the Internet there are sites which regularly publishes current lists of open proxies.They are a list of ip addresses and ports.These data should be made to the network settings of the browser by hand before this proxy setting.There are also plug-ins for browsers, simplifying work with proxy lists.

Open proxies can be anonymous or transparent.By using anonymous proxy sites that are accessed by the user will not know his real ip address and location.When using transparent information about where a user goes online, stays open.But in any case, blocking sites provider will successfully overcome.

use of open proxy lists - rather inconvenient way to bypass censorship.There are several reasons.

  • First, speed of loading pages over a public proxy is usually very low.
  • Secondly, such proxies become unstable and quickly closed.
  • Third, open proxies can be created by hackers to capture passwords and other personal information of unsuspecting users.

Public DNS-servers

Another effective way to freely visit blocked sites - use of alternative public DNS-servers.Default processing of requests to Internet resources occurs on the DNS-server provider.And if it is installed to block the sites included in the black list, instead of a banned site the user will be shown a screen blanking.

public use of DNS-servers allows you to ignore the established provider lock.To start using this tool, once is enough to change the network settings of the operating system.

most popular to date, an alternative server - a Google Public DNS.His primary and secondary addresses for the DNS-query:

  • 8.8.8.8
  • 8.8.4.4

of Google, in addition to solving the problem of how to bypass the blocking of sites, also promises to accelerate Internet surfing and better protect users againstAction computer scams.

Network I2P

decentralized network I2P is designed for reliable protection of the anonymity of the user.This technology is also called the "deep Web," because within the I2P network, there are websites, peer networks, instant messengers and other services that it is technically impossible to censor.Immune network is ensured by encryption and tunneling of all domestic traffic.The client program handles not only the information requested by the user, but also serves as an intermediate node for transit traffic to other network participants.As a result, neither the provider nor government regulators can not track the final destination of encrypted packets.

The increasing censorship on the internet in Russia has led to the fact that some popular sites got mirrors on the network I2P.An example is the free library "Flibusta", open the site in I2P and Tor.

Another possibility to visit forbidden sites in Russia via I2P - is the use of gateways from an anonymous network to the regular Internet.A serious drawback of these gateways - very low download speed.It is expected that with increasing number of users I2P data transfer rate will also rise both within the network and in communication with the outside Internet.

SSH-tunneling

If you have your own server located outside of Russia, the question on how to bypass a blocked provider, can be solved by using SSH-tunneling.The remote server in this case is used as a normal SOCKS-Proxy.

To use this method, the need to buy or take a long-term lease a foreign server.You can hire the services of a service Amazon EC2, allowing use of a dedicated server in hourly mode, as low as three cents per hour.

Configuring the tunnel to the remote server is simple.Suffice it to the console, enter the command type:

ssh -D localhost: port username @ Server_IP_Address

where:

  • port - an open port on your computer;
  • username - your username on the remote server;
  • Server_IP_Address - host of the remote server.

After that, the network settings of the browser to choose the use of SOCKS-proxy and specify the desired port and localhost as address.

Other ways

Arsenal workarounds locks so broad that a detailed description of each of them can take more than a dozen paragraphs.Anyway, they all boil down to the transfer of foreign traffic through the server, resulting in the provider used by Russia to block a list of sites is useless.Here is a small list of the most interesting ways.

  • JAP - long-known program for anonymity on the web.Skip the traffic through the chain of proxy servers.It has a paid mode that increases the speed of surfing.

  • Ultrasurf - a project developed in China to circumvent state censorship.It requires software installation.The default is set to use in Internet Explorer.
  • TunnelBear - paid app for mobile devices.Uses VPN.It has a free version, limited to 500 megabytes of traffic per month.It requires setting.
  • Onion Pi - a portable device that directs all traffic through the Tor network and share a Wi-Fi access.Allows anonymously surf the Internet from a computer that does not have any programs for anonymous surfing.This can be useful if you have to work with someone else or office computer.

Future prospects

Obviously, in the event that users will bypass the massively imposed state restrictions on access to Internet resources, censors additional measures are taken to ensure the blocking of banned sites.Methods of limiting the network activity of the citizens may be purely technical, as well as police.

may be blocked by the most popular proxy servers and exit points network Tor.Maybe a ban on using a VPN individuals.However, it is practically impossible to limit the use I2P and products such program JAP.SSH-tunneling, too, will remain a reliable way to get around bans.

effective censorship of the Internet is possible only in case of a complete shutdown of the country from the World Wide Web, just as it is done in North Korea.In all other cases, you can always find ways to get to the desired information.