Popular Posts

Access Censored Websites

How to Access Censored Websites

One of the early nicknames for the Internet was the "information superhighway" because it was supposed to provide the average person with fast access to a practically limitless amount of data. For many users, that's exactly what accessing the Internet is like. For others, it's as if the information superhighway has some major roadblocks in the form of Internet censorship.

So What Do We Do ?
We Fight !

How to Access Censored/Blocked Websites On The Internet


Method 1 :Use A Proxy Website

You can access any blocked website on the Internet using a proxy server. 
This is the proxy that I use to access blocked websites :
Just type the URL of the blocked website and click "Surf".
And here are a list of proxy sites that you may also use:


Method 2: Use Tor (Recommended using)

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses. Read more>


  • Tor prevents anyone from learning your location or browsing habits.
  • Tor is free and open source for Windows, Mac, Linux/Unix, and Android

 

Method 3 : Use Psiphon

Psiphon is a censorship circumvention solution that allows users to access blocked sites in countries where the Internet is censored.

Psiphon turns a regular home PC into a personal, encrypted server capable of retrieving and displaying web pages anywher.

1. Begin by downloading and installing Psiphon.
2. Open and select the “Setup” tab as shown below.

3. “Update” your external IP address.

4. “Test” to make sure that port #443, which it is set to run on by default is available.
**NOTE: You can change the port number in the settings menu if you so desire.**

NOTE: You can choose to change the port it uses for whatever reason. Also, if your PC’s connects to the Internet via a router you need to “forward the port” selected here.

5. Next choose a name for your Psiphonode.

6. Finish the setup by selecting “OK.”

7. It’s then time to create user accounts, which we will do so by selecting the “Add” tab.

8. Start by creating a username and password. The remaining options are for your own informational purposes only and are not required to create a user account.

9. Lastly, select “Start” to begin running the program.

How Do I Connect as a User?
1. To connect as a user, or “Psiphonite,” start by typing the Internet address that the Psiphonode Administrator sends to you.
It will be as follows:
http://(IP address):(port)/(node name)
EX: http://78.125.52.425:443/NEWPORT
The Psiphonode Administrator will see the following after you successfully connect.

2. Type your username and password in the login boxes provided and then click “Submit.”

You should then be connected and able to navigate to pages and sites of your choice.
Here’s a few examples:

You can even bookmark pages if you so desire using the “Add Bookmark” button as shown below.

How Anonymous is Psiphon?
The traffic between the Psiphon Administrator and the the user is completely encrypted however, the Administrator can view the logs of the user’s web traffic. So don’t use it to check out anything you don’t want the the Administrator to see, i.e. porn and what not.
Can the Use of Psiphon Be Detected?
Unless the attacker has the private psiphon URL it cannot be easily determined that psiphon is being used.
From the site:
From a technical perspective traffic between the psiphonode and the psiphonite is identical to normal HTTPS (encrypted) traffic. Although many sites only use HTTPS during the login process many sites, such as email providers and banking services, use HTTPS for extended periods of time, as does psiphon. The differences are that psiphon uses self-signed certificates and connections to home computers, rather than signed certificates and domain names.
NOTE: There’s also a great slideshow available that will help better visualize how Psiphon works and what it’s capable of.

2 comments:

  1. Dear Admin,
    Can u mail me all the tools provided in your blog.download link is banned in my country and my vpn is also not working.

    ReplyDelete