<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How To Survive The Claire Perry Internet &#187; Evasion</title>
	<atom:link href="/tag/evasion/feed/" rel="self" type="application/rss+xml" />
	<link>https://survivetheclaireperryinter.net</link>
	<description></description>
	<lastBuildDate>Fri, 16 Oct 2015 09:30:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8</generator>
	<item>
		<title>Introducing ASafe.Space</title>
		<link>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/</link>
		<comments>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/#comments</comments>
		<pubDate>Mon, 12 Jan 2015 19:11:24 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Technical Implementation]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[David Cameron]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Mass Surveillance]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Safe Space]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=615</guid>
		<description><![CDATA[David Cameron recently said in a speech that he would deny potential Terrorists a safe space on the Internet to communicate; The obvious problem here is that everyone is a potential Terrorist so what David Cameron is actually promising that he intends to legislate against anyone having a means of communication that is secure from<br /><a class="moretag" href="/2015/01/12/introducing-asafe-space/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>David Cameron recently said in a speech that he would deny <em>potential</em> Terrorists a safe space on the Internet to communicate;</p>
<p><iframe src="https://embed.theguardian.com/embed/video/uk-news/video/2015/jan/12/david-cameron-spy-agencies-britain-video" width="560" height="315" frameborder="0" allowfullscreen></iframe></p>
<p>The obvious problem here is that <em>everyone</em> is a <em>potential</em> Terrorist so what David Cameron is actually promising that he intends to legislate against <em>anyone</em> having a means of communication that is secure from Government interference.</p>
<p>We&#8217;ve seen that GCHQ and the Police have abused <em>(or just plain broken)</em> laws in order to spy on Journalists, Lawyers and other innocents, the Government can not be trusted with these powers.</p>
<p>In response <a href="https://ASafe.Space">ASafe.Space</a> has been registered and will contain a few short guides on how to have a <a href="https://asafe.space/to/browse-the-internet/">safe space to browse the Internet</a>, <a href="https://asafe.space/to/communicate-over-instant-messaging/">communicate over Instant Messaging</a>, <a href="https://asafe.space/to/communicate-over-email/">Email</a> or <a href="https://asafe.space/to/communicate-with-pen-paper/">even Pen and Paper</a>.</p>
<p>Evading censorship and surveillance are one and the same, if the censor doesn&#8217;t know what you are saying or what you are reading they can&#8217;t stop you nor can they hold it against you.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Filters Are For Coffee &#8211; Not The Internet</title>
		<link>https://survivetheclaireperryinter.net/2014/09/29/filters-are-for-coffee-not-the-internet/</link>
		<comments>https://survivetheclaireperryinter.net/2014/09/29/filters-are-for-coffee-not-the-internet/#comments</comments>
		<pubDate>Mon, 29 Sep 2014 20:14:00 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Censorship Reporting]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[Cafe Nero]]></category>
		<category><![CDATA[Costa Coffee]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Friendly WiFi]]></category>
		<category><![CDATA[O2]]></category>
		<category><![CDATA[O2 Wifi]]></category>
		<category><![CDATA[Overblocking]]></category>
		<category><![CDATA[Starbucks]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=568</guid>
		<description><![CDATA[Today is International Coffee Day so what better day to take the Open Rights Group tag line of &#8220;Filters Are For Coffee Not The Internet&#8221; and investigate the capabilities of the Internet filtering at various coffee locations. Costa Coffee / Cafe Nero &#8211; O2 Wifi DNS Spoofing: Partial MiTM SSL: No Deep Packet Inspection: Yes<br /><a class="moretag" href="/2014/09/29/filters-are-for-coffee-not-the-internet/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>Today is <a href="https://en.wikipedia.org/wiki/International_Coffee_Day">International Coffee Day</a> so what better day to take the Open Rights Group tag line of &#8220;Filters Are For Coffee Not The Internet&#8221; and investigate the capabilities of the Internet filtering at various coffee locations.</p>
<h2>Costa Coffee / Cafe Nero &#8211; O2 Wifi</h2>
<p><strong>DNS Spoofing:</strong> <span style="color: orange;">Partial</span><br />
<strong>MiTM SSL:</strong> <span style="color: green;">No</span><br />
<strong>Deep Packet Inspection:</strong> <span style="color: red;">Yes</span><br />
<strong>Destination IP Transit Interference:</strong> <span style="color: red;">Yes</span></p>
<p>O2 WiFi requires two-factor registration via a phone number and SMS claiming that it is a legal requirement. This is easily traversed with a disposable PAYG phone <em>(e.g. EE have a Nokia 106 for £4.99 &#8211; an excellent option for a burner phone).</em> Once you&#8217;ve completed the two-factor check <em>(the first being they record your MAC address)</em> you can start browsing.</p>
<p>The first thing to notice is that unlike their mobile offering the WiFi has several layers of filtering, some DNS queries are intercepted to send you to a block page and even if you resolve the A record out-of-band Squid will intercept and block.</p>
<p>If you manually query a 3rd party DNS server for the record in question then it appears to return normally.</p>
<p>This level of blocking however is hit and miss with domains such as the thepiratebay.se suffering the worst interference but others that are blocked by the default mobile filters <strong>aren&#8217;t</strong> blocked on the WiFi.</p>
<p>Thankfully all the usual bypass methods <em>(Tor, RoutingPacketsIsNotACrime.uk, SSH SOCKS5 tunnel and SSL)</em> work flawlessly despite the use of Squid and DNS interference.</p>
<p>Interestingly O2 have chosen to force Google to not allow SSL searching (so they can inspect the content and block stuff) which also means anyone else in the coffee shop can spy on your browsing. DuckDuckGo.com does still offer SSL searching and isn&#8217;t blocked.</p>
<h4>Breaking down an O2 Intercept</h4>
<p>The packet capture for this attempt to hit http://reddit.com/r/nsfw is <a href="/wp-content/uploads/2014/09/costa-1.pcapng">here</a>, the pertinent part of the HTTP transfer is below;</p>
<pre>GET /r/nsfw HTTP/1.1
User-Agent: curl/7.34.0
Host: reddit.com
Accept: */*

HTTP/1.1 200 OK
Date: Mon, 29 Sep 2014 10:28:51 GMT
X-Template: blacklisted
Content-Type: text/html
Content-Length: 195
Cache-Control: no-cache
X-Cache: MISS from Squid
Via: 1.1 Squid (squid/3.2.11)
Connection: keep-alive
&lt; !DOCTYPE html&gt;
&lt;html&gt;
&lt;head&gt;
    &lt;meta http-equiv="refresh" content="0; url=https://www.o2wifi.co.uk/pages/n4?bd=http://reddit.com:80/r/nsfw"/&gt;
    &lt;title&gt;&lt;/title&gt;
&lt;/head&gt;
&lt;body&gt;
&lt;/body&gt;
&lt;/html&gt;</pre>
<p>Despite getting the correct A records back from the nameservers in packet 5 we can see in packets 12 onwards that the O2 Squid server <em>(ironically the same software <a href="https://PacketFlagon.is">PacketFlagon.is</a> uses to <strong>bypass</strong> censorship!)</em> returns back some HTML with a meta refresh that instantly directs the browser to their block page.</p>
<p>As shown in <a href="/wp-content/uploads/2014/09/costa-get-intercept.pcapng">this packet capture</a> there is no IP/Host matching it is all done on the GET path and the Host header so Hosts files hacks won&#8217;t work either.</p>
<p>High Court blocks are solved using DNS and <a href="/wp-content/uploads/2014/09/costa-piratebay.pcapng">an attempt to resolve</a> thepiratebay.se returns 127.0.0.1.</p>
<p>Finally some other blocks such as the block of torproject.org are achieved by <a href="/wp-content/uploads/2014/09/costa-torproject-min.pcapng">just silently dropping the packets</a>.</p>
<div class="row pad-xs-5 pad-sm-10 pad-md-20 pad-lg-20" style="min-height:0; padding-top:0; padding-bottom:0;">
<div class="col-lg-12 col-md-12 col-sm-12" style="min-height:0; border-bottom:1px solid rgba(0,0,0,0.1); margin-top:10px; margin-bottom:10px; "></div>
</div>
<h2>Starbucks &#8211; BT / Friendly WiFi</h2>
<p>The people at Friendly WiFi appear to be quite zealous about blocking &#8220;pornography&#8221; and come out with ridiculous claims such as that by putting in their filtering one gets a &#8220;porn free city&#8221;</p>
<blockquote class="twitter-tweet" lang="en"><p>Thanks <a href="https://twitter.com/stephen_mosley">@stephen_mosley</a> for supporting our campaign to make Chester world&#39;s first  <a href="https://twitter.com/hashtag/pornfreecity?src=hash">#pornfreecity</a> <a href="https://twitter.com/chestertweetsuk">@chestertweetsuk</a> <a href="http://t.co/WlL4X1cOJv">pic.twitter.com/WlL4X1cOJv</a></p>
<p>&mdash; getmedigital.com (@getmedigital) <a href="https://twitter.com/getmedigital/status/514343530119323648">September 23, 2014</a></p></blockquote>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>Thankfully their blocks are almost as easy to bypass as O2&#8242;s. Interestingly, unlike O2, Starbucks and BT don&#8217;t believe they are required to legally know who is using their WiFi and no registration is required.</p>
<p><strong>DNS Spoofing:</strong> <span style="color: red;">Yes</span><br />
<strong>MiTM SSL:</strong> <span style="color: green;">No</span><br />
<strong>Deep Packet Inspection:</strong> <span style="color: red;">Yes</span><br />
<strong>Destination IP Transit Interference:</strong> <span style="color: green;">No</span></p>
<p>Websites that are blocked due to sub-content <em>(e.g. reddit.com/r/nsfw)</em> are blocked over HTTP but accessible over SSL. Interestingly thepiratebay.se is reachable over SSL e.g.</p>
<pre class="code">curl -k -v https://194.71.107.27 -H 'Host: thepiratebay.se'</pre>
<p>Using PAC files such as RoutingPacketsIsNotACrime.uk was hit and miss and requires some more investigation but other bypass options such as SSL, Tor and using an SSH SOCKS5 tunnel all worked without issue.</p>
<p>BT also force Google to downgrade search to a non-ssl version which means others could monitor your search terms.</p>
<h4>Breaking down a BT Intercept</h4>
<p>When trying to hit reddit.com/r/nsfw <a href="/wp-content/uploads/2014/09/bt-reddit-nsfw-min.pcap">this packet capture</a> shows a HTTP 302 is returned rather than the site we&#8217;re after.</p>
<pre>GET /r/nsfw HTTP/1.1
User-Agent: curl/7.34.0
Accept: */*
Host: reddit.com

HTTP/1.1 302 Found
Location: http://217.41.225.106/redirect/starbucks/index.html</pre>
<p>An attempt to reach thepiratebay.se resulted in a forged DNS reply for 193.113.9.167 that simply displays the words &#8220;Error &#8211; site blocked&#8221;</p>
<p>Interestingly as shown <a href="/wp-content/uploads/2014/09/bt-pirate-bay-dns-bypass-min.pcap">in this packet capture</a>, resolving the A record out-of-band and then passing a HTTP request through works fine!</p>
<h2>Bonus &#8211; EE Hotspot</h2>
<p>During my travels between coffee shops I stumbled across an EE hotspot which had a completely different set of filtering as it uses OpenDNS.</p>
<p><strong>DNS Spoofing:</strong> <span style="color: red;">Yes</span><br />
<strong>MiTM SSL:</strong> <span style="color: green;">No</span><br />
<strong>Deep Packet Inspection:</strong> <span style="color: green;">No</span><br />
<strong>Destination IP Transit Interference:</strong> <span style="color: green;">No</span></p>
<p>Much like O2 you are required to register using a phone and EE uses <a href="http://picopoint.com">www.picopoint.com</a> to do this.</p>
<p>The filtering is very lax with reddit.com/r/nsfw and the Pirate Bay being allowed through however shock sites like rotten.com resolve to 67.215.65.130 which results in an OpenDNS block page.</p>
<p>Since the filtering is entirely DNS based out-of-band resolution, RoutingPacketsIsNotACrime, Tor and SSH SOCKS5 tunnels all work fine.</p>
<div class="row pad-xs-5 pad-sm-10 pad-md-20 pad-lg-20" style="min-height:0; padding-top:0; padding-bottom:0;">
<div class="col-lg-12 col-md-12 col-sm-12" style="min-height:0; border-bottom:1px dashed rgba(0,0,0,0.1); margin-top:10px; margin-bottom:10px; "></div>
</div>
<p>I&#8217;ve drank far too much coffee today and it&#8217;s a shame that public establishments feel it necessary to put censorship technology that performs excessive over-blocking <em>(how is torproject.org sexual?)</em> but at least it is still easy to bypass.</p>
<p><a href="/wp-content/uploads/2014/09/coffeecoffee.jpg" class="lightbox" ><img src="/wp-content/uploads/2014/09/coffeecoffee.jpg" alt="coffeecoffee" width="500" height="309" class="aligncenter size-full wp-image-579" /></a></p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/09/29/filters-are-for-coffee-not-the-internet/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The City of London PIPCU attempts to Block Proxies (and fails)</title>
		<link>https://survivetheclaireperryinter.net/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/</link>
		<comments>https://survivetheclaireperryinter.net/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/#comments</comments>
		<pubDate>Mon, 11 Aug 2014 19:57:15 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Reporting]]></category>
		<category><![CDATA[Collusion]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[City of London Police]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[PIPCU]]></category>
		<category><![CDATA[Proxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=380</guid>
		<description><![CDATA[The City of London Police Police Intellectual Property Crime Unit (PIPCU) arrested the operator of immunicity.org &#8220;on suspicion of running an ‘umbrella’ website providing access to other websites which have been subject to legal blocking orders.&#8221; So some private entities sued some other private entities to prevent their customers from accessing certain websites. This, as<br /><a class="moretag" href="/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>The City of London Police Police Intellectual Property Crime Unit (PIPCU) arrested the operator of <a href="http://immunicity.org/">immunicity.org</a> &#8220;on suspicion of running an ‘umbrella’ website providing access to other websites which have been subject to legal blocking orders.&#8221;</p>
<p>So some private entities sued some other private entities to prevent their customers from accessing certain websites. This, as far as I understand it, was a civil matter. How does the City of London Police gain the ability to <strong>arrest</strong> someone how was not party to either side of the civil matter.</p>
<blockquote><p>An arrest is the act of depriving a person of his or her liberty usually in relation to the purported investigation or prevention of crime.<small>Wikipedia</small></p>
</blockquote>
<p>Routing packets is <strong>NOT A CRIME</strong>. What the fuck do they think they are up to?</p>
<blockquote class="twitter-tweet" lang="en-gb"><p><a href="https://twitter.com/darkmobius">@darkmobius</a> suspected that the proxy server was providing access to sites subject to blocking orders for carrying illegal content.</p>
<p>— City Police PIPCU (@CityPolicePIPCU) <a href="https://twitter.com/CityPolicePIPCU/statuses/497750874446655488">August 8, 2014</a></p></blockquote>
<p>&nbsp;</p>
<p>Thankfully <a href="http://immunicity.co.uk/">http://immunicity.co.uk/</a> and <a href="http://immun.es/">http://immun.es/</a> have already launched to help fill the space and more <a href="/2014/03/11/installing-tor-on-windows-securely/">Tor Project relays</a> are spinning up every day but let&#8217;s not stop there, if we don&#8217;t complain then they will continue to arrest and harass operators of these servers.</p>
<p>I would encourage people to complain to the City of London Police directly by tweeting at <a href="https://twitter.com/citypolice">@CityPolice</a>, by phone at 020 7601 2222, directly on their website with either this form (<a href="http://www.cityoflondon.police.uk/contact-city-police/compliments-and-complaints/Documents/public_complaints.pdf">Public Complaints</a>) or this form (<a href="http://www.cityoflondon.police.uk/contact-city-police/compliments-and-complaints/Documents/expression_of_dissatisfaction.pdf">Expression of Dissatisfaction</a>) or by email; psd_public@cityoflondon.police.uk</p>
<p>If you have time then also make a complaint to the Independent Police Complaints Commission by calling on 0300 020 0096 or via the website: <a href="http://www.ipcc.gov.uk/complaints">http://www.ipcc.gov.uk/complaints</a> <em>(it probably wouldn&#8217;t hurt to tweet <a href="https://twitter.com/IPCCNews">@IPCCNews</a> as well).</em></p>
<p>As always check our <a href="/top-ways-to-evade-filters/">Top Ways to Avoid Filters</a> page for the latest information on the best way to avoid Internet filtering be it performed by the state, ISPs, special interest groups or because your current method was illegally shutdown by a police force overstepping the mark.</p>
<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>Update: September &#8211; Immunicity,co.uk has shutdown and immun.es is very unreliable.</div>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Using Anonymous Visa Cards to Create Untraceable Surveillance / Censorship Avoidance Proxies or Webhosts</title>
		<link>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/</link>
		<comments>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/#comments</comments>
		<pubDate>Fri, 11 Apr 2014 21:44:25 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[anonymous]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[financial]]></category>
		<category><![CDATA[Mastercard]]></category>
		<category><![CDATA[money laundering]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[VISA]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=231</guid>
		<description><![CDATA[It is still possible to anonymously purchase on-line resources which will be useful for those wishing to frustrate Internet surveillance, evade Internet censorship or blow the whistle on something without risking the exposure of their identity. Finding a pre-paid card that can be purchased in cash with no questions asked is trivially easy, any card<br /><a class="moretag" href="/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>It is still possible to anonymously purchase on-line resources which will be useful for those wishing to frustrate Internet surveillance, evade Internet censorship or blow the whistle on something without risking the exposure of their identity.</p>
<p>Finding a pre-paid card that can be purchased in cash with no questions asked is trivially easy, any card or gift shop is likely to have them interspersed with Starbucks gift cards etc.<br />
<a class="lightbox" href="/wp-content/uploads/2014/05/prepaid.jpg"><img class="aligncenter size-medium wp-image-249" alt="Prepaid Visa and Mastercards" src="/wp-content/uploads/2014/05/prepaid-300x225.jpg" width="300" height="225" /></a></p>
<p>For this example we&#8217;ll choose a £50 VISA card which once you get to the till will actually cost £53.95. Hand over your cash and walk out of the door.</p>
<p>As you leave swing by a Three, EE, O2 or Vodafone store and buy a pre-pay data SIM. Three have a 1Gb SIM for £7.50, buy it with cash and walk out of the store.</p>
<p>By now the VISA card will have activated and should be good to go.</p>
<p>For extra anonymity you may wish to visit a local pawn broker like Cash Converters or CEX and acquire a phone, tablet or laptop so that the IMEI you use with the newly purchased SIM is not one that has previously been tied to your identity.</p>
<p>Open up your VISA card and you&#8217;ll notice it has an expiry date, the CVV code on the signature strip and the usual 16 digit credit card number.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/04/card.jpg"><img class="aligncenter size-medium wp-image-264" alt="card" src="/wp-content/uploads/2014/04/card-300x225.jpg" width="300" height="225" /></a></p>
<p>Setup your 3G connection, optionally <a href="https://www.torproject.org/">install TOR</a> to bypass any ISP restrictions that may be present then navigate to your VPS provider of choice. I&#8217;d suggest <a href="https://digitalocean.com/">DigitalOcean.com</a> but there are many others.</p>
<p>Signing up for an account is easy, put in an email address and a password <em>(the email address will have to be a real one as it needs to be verified and it&#8217;s where your root passwords are sent but try signing up to something like HushMail.com)</em>.<br />
<a class="lightbox" href="/wp-content/uploads/2014/01/signup.jpg"><img class="aligncenter size-medium wp-image-128" alt="signup" src="/wp-content/uploads/2014/01/signup-300x241.jpg" width="300" height="241" /></a></p>
<p>Once logged in you&#8217;ll be asked to verify your billing details;<br />
<a class="lightbox" href="/wp-content/uploads/2014/01/logged_in.png"><img class="aligncenter size-medium wp-image-129" alt="logged_in" src="/wp-content/uploads/2014/01/logged_in-300x166.png" width="300" height="166" /></a></p>
<p>Now it&#8217;s likely that your use of TOR and a prepaid VISA card will trigger anti-fraud protections; the account will be locked and a support ticket will be raised asking you to identify yourself<br />
<a class="lightbox" href="/wp-content/uploads/2014/05/verify.jpg"><img class="aligncenter size-medium wp-image-251" alt="verify" src="/wp-content/uploads/2014/05/verify-300x163.jpg" width="300" height="163" /></a></p>
<p>The people at DigitalOcean are very good and if you adequately explain your motivations <em>(be it running a website you&#8217;d rather not have your name attached too, as a proxy for privacy etc)</em> they are likely to accommodate you without requiring copies of ID or a credit card number tied to your identity. <strong>DO NOT ABUSE THEIR TRUST</strong>.</p>
<p>Within a few minutes the account will be unlocked and you can launch your virtual machine.</p>
<p>If you login to the VISA pre-pay system you&#8217;ll be able to see if the pre-authorisation passed and that you&#8217;ll be able to continue paying for your server resources.<br />
<a class="lightbox" href="/wp-content/uploads/2014/04/balance.jpg"><img class="aligncenter size-medium wp-image-267" alt="balance" src="/wp-content/uploads/2014/04/balance-300x121.jpg" width="300" height="121" /></a></p>
<p>You can now host your whistle-blowing blog, a critique of public policy or just <a href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">use it as a proxy</a> safe in the knowledge that there is virtually no trace back to your true identity.</p>
<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>Do not abuse this ability to do hateful or illegal things, the VPS provider may not be able to identify you but they will shut you down and may even choose to shutdown all other accounts that appear to be of a similar profile to yours. Your actions could prevent someone who genuinely needs this anonymity.</div>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Lord asks &#8220;Shouldn&#8217;t Filters (that don&#8217;t work) be compulsory?&#8221;</title>
		<link>https://survivetheclaireperryinter.net/2014/01/17/lord-asks-shouldnt-filters-that-dont-work-be-compulsory/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/17/lord-asks-shouldnt-filters-that-dont-work-be-compulsory/#comments</comments>
		<pubDate>Fri, 17 Jan 2014 13:52:41 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Reporting]]></category>
		<category><![CDATA[BBC]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Overblocking]]></category>
		<category><![CDATA[webproxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=195</guid>
		<description><![CDATA[On the same day that the BBC reports that &#8220;Children can turn off Net Filters&#8221; a LibDem Lord has asked whether the choice of filtering should be taken out of parents (read everyone&#8217;s) hands and be made compulsory Within weeks of the filters that everyone predicted would herald a slippery slope to mandatory filtering with<br /><a class="moretag" href="/2014/01/17/lord-asks-shouldnt-filters-that-dont-work-be-compulsory/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>On the same day that the BBC reports that &#8220;<a href="http://www.bbc.co.uk/news/technology-25759345">Children can turn off Net Filters</a>&#8221; a LibDem Lord has asked whether the choice of filtering should be taken out of parents <em>(read everyone&#8217;s)</em> hands <a href="http://www.theyworkforyou.com/lords/?id=2014-01-16a.393.2#g398.0">and be made compulsory</a></p>
<blockquote><p>I also welcome the recognition by the <a title="http://en.wikipedia.org/wiki/Prime_Minister_of_the_United_Ki ngdom" href="http://www.theyworkforyou.com/glossary/?gl=264">Prime Minister</a> and the <a title="Secretary of State was originally the title given to the two officials who..." href="http://www.theyworkforyou.com/glossary/?gl=23">Secretary of State</a> for Culture, Media and Sport of the need for adequate filtering to protect young people from online abuse. However, as was discussed in this House only recently with the Online Safety Bill of the noble Baroness, Lady Howe, should we not be making filtering compulsory? Is it enough simply to leave it up to parents to make the choice about appropriate safety features?<small>Lord Clement-Jones</small></p>
</blockquote>
<p>Within weeks of the filters that everyone predicted would herald a slippery slope to mandatory filtering with ever encroaching levels of censorship going online we&#8217;ve already started to slide.</p>
<p>Now more than ever you need to start teaching your friends and family <a href="/">how to survive the Claire Perry Internet</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/17/lord-asks-shouldnt-filters-that-dont-work-be-compulsory/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Building a SOCKS5 Proxy with a Digital Ocean Server to Bypass UK Internet Filters</title>
		<link>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/#comments</comments>
		<pubDate>Fri, 10 Jan 2014 07:05:14 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[not free]]></category>
		<category><![CDATA[Proxy DNS Query]]></category>
		<category><![CDATA[proxy resolve dns]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[socks list proxy]]></category>
		<category><![CDATA[TalkTalk]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[Virgin]]></category>
		<category><![CDATA[webproxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=125</guid>
		<description><![CDATA[If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try Fedora or Ubuntu. If you don&#8217;t want to run Linux permanently but do want to try this method then a Live Boot CD of Fedora or Ubuntu (or any other Linux OS of your choice)  would be an ideal method.<br /><a class="moretag" href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>This article is for use on a Linux/Mac computer <em>(desktop / laptop etc)</em>. A Windows guide will be available at a later date.</div>
<p>If you don&#8217;t currently run Linux on your desktop I would strongly suggest it. Try <a href="https://fedoraproject.org/en_GB/get-fedora">Fedora</a> or <a href="http://www.ubuntu.com/">Ubuntu</a>. If you don&#8217;t want to run Linux permanently but do want to try this method then a <a href="https://en.wikipedia.org/wiki/Live_CD">Live Boot CD</a> of Fedora or Ubuntu <em>(or any other Linux OS of your choice)</em>  would be an ideal method.</p>
<p>Servers in datacenters are extremely unlikely to experience filtering so by tunnelling your connection through to a server you can browse the Internet without worrying if your connection is being restricted or surveilled.</p>
<p>IMAGE</p>
<h2>Signing up with Digital Ocean</h2>
<p>Navigate to <a href="https://www.digitalocean.com/">www.DigitalOcean.com</a> and click the Signup button at the top of the page. Enter an email address and a password. You may want to use an anonymous email provider such as Hushmail.com to protect your privacy and a strong password you&#8217;ve not used anywhere else. <strong>Important:</strong> The email address must be real as your server password will be emailed to you.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/signup.jpg"><img class="aligncenter size-medium wp-image-128" alt="signup" src="/wp-content/uploads/2014/01/signup-300x241.jpg" width="300" height="241" /></a>Once logged in you&#8217;ll have access to the initial control panel;<a class="lightbox" href="/wp-content/uploads/2014/01/logged_in.png"><img class="aligncenter size-medium wp-image-129" alt="logged_in" src="/wp-content/uploads/2014/01/logged_in-300x166.png" width="300" height="166" /></a></p>
<p>Click get started which will take you to the billing page, you can either use a credit card<em> (you may want to use an anonymous Visa / Mastercard, search online for keywords such as prepaid, anonymous etc)</em> or PayPal.</p>
<p>Once your payment is processed and cleared <em>(check <a href="https://cloud.digitalocean.com/billing">billing</a> for tracking your pre-paid balance if using PayPal) </em> or refresh the <a href="https://cloud.digitalocean.com/droplets">droplets</a> page to see the below;<a class="lightbox" href="/wp-content/uploads/2014/01/paid.jpg"><img class="aligncenter size-medium wp-image-130" alt="paid" src="/wp-content/uploads/2014/01/paid-300x175.jpg" width="300" height="175" /></a></p>
<p>Click <strong>Create Droplet</strong>!</p>
<p>Choose a friendly name for the server <em>(aka Droplet)</em>, this name is not important feel free to use how-to.survivetheclaireperryinter.net if you want to. Leave the Size option alone <em>(or if a larger size is selected change to to 512Mb/20Gb/1Tb as this is only $5 / £3 a month).</em> For lower latency and a reduced chance of NSA eavesdropping choose an Amsterdam datacenter <em>(not necessary but recommended)</em>.<a class="lightbox" href="/wp-content/uploads/2014/01/details1.jpg"><img class="aligncenter size-medium wp-image-131" alt="details1" src="/wp-content/uploads/2014/01/details1-286x300.jpg" width="286" height="300" /></a></p>
<p>Scroll down for more settings. For the purposes of this tutorial choose CentOS and then the latest CentOS version <em>(currently 6.4)</em> then click <strong>Create Droplet</strong>. <a class="lightbox" href="/wp-content/uploads/2014/01/details2.jpg"><img class="aligncenter size-medium wp-image-133" alt="details2" src="/wp-content/uploads/2014/01/details2-300x265.jpg" width="300" height="265" /></a></p>
<p>After a few seconds of watching the following screen your server will be created and you should have received an email with your root password.<a class="lightbox" href="/wp-content/uploads/2014/01/building.jpg"><img class="aligncenter size-medium wp-image-134" alt="building" src="/wp-content/uploads/2014/01/building-300x54.jpg" width="300" height="54" /></a></p>
<p>Behold your new server, make note of the IP address at the top near the word active. In this case the IP address is <strong>95.85.54.190</strong><a class="lightbox" href="/wp-content/uploads/2014/01/complete.jpg"><img class="aligncenter size-medium wp-image-135" alt="complete" src="/wp-content/uploads/2014/01/complete-300x102.jpg" width="300" height="102" /></a>Check your inbox and you should have an email with the IP address, the user name <em>(root)</em> and your password. It&#8217;s very important you don&#8217;t write a blog post and publish your username and password because bad things will happen to your server<a class="lightbox" href="/wp-content/uploads/2014/01/email.jpg"><img class="aligncenter size-medium wp-image-136" alt="email" src="/wp-content/uploads/2014/01/email-300x197.jpg" width="300" height="197" /></a></p>
<p>&nbsp;</p>
<p>Now we&#8217;re ready to create a proxy.</p>
<h2>Testing the Proxy / Tunnel</h2>
<p>Assuming you are logged into your Linux computer load up a terminal.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_1.png"><img class="aligncenter size-medium wp-image-137" alt="terminal_1" src="/wp-content/uploads/2014/01/terminal_1-300x215.png" width="300" height="215" /></a>Type the following;</p>
<pre class="bash">ssh -D 8080 root@95.85.54.190</pre>
<p> Replace the IP address with your own. You&#8217;ll be informed that the authenticity of the host can&#8217;t be established which is true because you don&#8217;t know what the RSA key fingerprint is. You can choose to accept it and continue or be paranoid and bail. If you chose to continue you will be prompted for you password that was sent by email.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_2.png"><img class="aligncenter size-medium wp-image-142" alt="terminal_2" src="/wp-content/uploads/2014/01/terminal_2-300x215.png" width="300" height="215" /></a></p>
<p>Load up another terminal <em>(or a tab)</em> and type the following;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>You should see the following output indicating that your ISP is <strong>Digital Ocean</strong>.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_3.png"><img class="aligncenter size-medium wp-image-140" alt="terminal_3" src="/wp-content/uploads/2014/01/terminal_3-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You could immediately configure your browser etc to use these settings but you should try and be a bit more thorough.</p>
<h2>Configuring the Proxy / Tunnel for long term use</h2>
<p>Exit all of the terminals opened in the previous step which will close all tunnels and SSH sessions and we&#8217;ll get started on making this a little more secure.</p>
<p>First things first is to change the root password from the one that was emailed to you. Load up a terminal and ssh in;</p>
<pre class="bash">ssh <a href="mailto:root@95.85.54.190">root@95.85.54.190</a></pre>
<p>Once logged in change the password with the passwd command. Ensure you use a different password to anything else you have.<a class="lightbox" href="/wp-content/uploads/2014/01/terminal_4.png"><img class="aligncenter size-medium wp-image-147" alt="terminal_4" src="/wp-content/uploads/2014/01/terminal_4-300x215.png" width="300" height="215" /></a>The root user is the most powerful user on a Linux server and can delete anything and everything so you really don&#8217;t want to be using it for everyday tasks. For creating the tunnel we want to use a non-privileged user. To do this simply type the following <em>(feel free to replace the name tunnel with your name or anything, it&#8217;s just a username and isn&#8217;t important)</em>;</p>
<pre class="bash">useradd tunnel</pre>
<p>Now change the password for this user by passing the username to the passwd command used earlier, make sure you use a strong password and one that isn&#8217;t that same as any of your others;</p>
<pre class="bash">passwd tunnel</pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_5.png"><img class="aligncenter size-medium wp-image-148" alt="terminal_5" src="/wp-content/uploads/2014/01/terminal_5-300x215.png" width="300" height="215" /></a></p>
<p>Load up a new tab on your local machine and try logging in as your new user;</p>
<pre class="bash">ssh tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/terminal_6.png"><img class="aligncenter size-medium wp-image-149" alt="terminal_6" src="/wp-content/uploads/2014/01/terminal_6-300x215.png" width="300" height="215" /></a></p>
<p>&nbsp;</p>
<p>You&#8217;re now ready to setup a tunnel/SOCKS proxy you can use with your browser.</p>
<p>Exit all your terminals again and this time issue the command;</p>
<pre class="bash">ssh -D 8080 tunnel@<a href="mailto:root@95.85.54.190">95.85.54.190</a></pre>
<p>In a new terminal check that the proxy is working by issuing the CURL command again;</p>
<pre class="bash">curl --socks5-hostname 127.0.0.1:8080 http://wtfismyip.com/json</pre>
<p>For this example I&#8217;m going to use Firefox but feel free to try it out with others. In the address bar type <strong>about:config</strong>, you&#8217;ll be presented with the following screen;</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_dragons.jpg"><img class="aligncenter size-medium wp-image-150" alt="firefox_dragons" src="/wp-content/uploads/2014/01/firefox_dragons-300x92.jpg" width="300" height="92" /></a></p>
<p>&nbsp;</p>
<p>Assuming you are going to be careful click the button.</p>
<p>In the Search bar at the top type <strong>proxy</strong>, then look for the strings <strong>network.proxy.socks</strong> and <strong>network.proxy.socks_port</strong>, type in the values from the command above (127.0.0.1 and 8080). If your ISP filters DNS then you may want to toggle <strong>network.proxy.socks_remote_dns</strong> too <em>(don&#8217;t forget to change your name servers!)</em>.</p>
<p>Finally change <strong>network.proxy.type</strong> to <strong>1</strong>.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/01/firefox_about_config.png"><img class="aligncenter size-medium wp-image-151" alt="firefox_about_config" src="/wp-content/uploads/2014/01/firefox_about_config-300x216.png" width="300" height="216" /></a>To test, simply load up a new Firefox tab and attempt to access a blocked page.</p>
<p>So there you have it, an easy way to get past any Web filtering and as an added bonus since your traffic is encrypted between your computer and your server in Amsterdam neither your ISP nor the UK Government can monitor it.</p>
<div class="alert bluth yellow"><button type="button" class="close" data-dismiss="alert">&times;</button>Traffic egressing the server can still be tracked and recorded. With the right combination of warrants and traffic capture at the Digital Ocean datacenter coupled with your home ISP logs illegal activity can still be traced back to you! Only use this to method to bypass filters,</div>
<p>Upcoming articles include creating a dedicated Raspberry PI proxy for use with multiple devices <em>(phones, tablets, Windows PCs etc)</em> and setup guides for other server providers. Make sure you follow <a href="https://twitter.com/stcpi">@STCPI</a> on Twitter for updates!</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Basic DNS Filter Evasion: HOSTS file</title>
		<link>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/#comments</comments>
		<pubDate>Wed, 08 Jan 2014 13:53:18 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[DNS]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[Windows]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=94</guid>
		<description><![CDATA[Background: Various ISPs such as Sky and BT use DNS manipulation to spoof responses that forwards requests to their proxy server instead of the correct response. Taking BT as an example a request for a blocked site has been seen to return an IP from within this netblock instead; inetnum: 213.120.234.0 - 213.120.235.255 netname: BT-UKIP-IPV4-INFRASTRUCTURE<br /><a class="moretag" href="/2014/01/08/basic-dns-filter-evasion-hosts-file/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<h2>Background:</h2>
<p>Various ISPs such as Sky and BT use DNS manipulation to spoof responses that forwards requests to their proxy server instead of the correct response.</p>
<p>Taking BT as an example a request for a blocked site has been seen to return an IP from within this netblock instead;</p>
<p><code>inetnum: 213.120.234.0 - 213.120.235.255<br />
netname: BT-UKIP-IPV4-INFRASTRUCTURE<br />
descr: POP<br />
country: GB<br />
admin-c: BS1474-RIPE<br />
tech-c: BS1474-RIPE<br />
status: ASSIGNED PA<br />
remarks: Please send abuse notification to abuse@bt.net<br />
remarks: New netname<br />
mnt-by: BTNET-MNT<br />
mnt-lower: BTNET-MNT<br />
mnt-routes: BTNET-MNT<br />
source: RIPE # Filtered<br />
</code></p>
<p>Sky commonly reports back with IPs from;</p>
<p><code>inetnum: 90.207.238.128 - 90.207.238.191<br />
netname: SKY-IRONMAN-VIRTUALISATION-LAN<br />
descr: Sky Network Services<br />
country: GB<br />
admin-c: BBH-RIPE<br />
tech-c: BBH-RIPE<br />
status: ASSIGNED PA<br />
mnt-by: BSKYB-BROADBAND-MNT<br />
source: RIPE # Filtered<br />
</code></p>
<p>Initial research indicates that even attempting to use 3rd Party DNS servers on some ISPs elicits a spoofed response which indicates that these ISPs are intercepting and monitoring ALL DNS queries you make. This presents a variety of concerns such as the accuracy of SPF, DNS-SEC or TXT responses but that&#8217;s a topic for another time.</p>
<h2>Circumnavigation:</h2>
<p>If you discover that you are getting faked responses and are unable to reach the correct webserver follow the steps below.</p>
<ul>
<li>Get the A Record
<ul>
<li>Navigate to a website such as <a href="http://www.dnsstuff.com/tools">http://www.dnsstuff.com/tools</a></li>
<li>Look for the DNS Lookup tool<br />
<a class="lightbox" style="line-height: 1.5;" href="/wp-content/uploads/2014/01/dns_lookup.png"><img class="alignnone size-medium wp-image-98" alt="dns_lookup" src="/wp-content/uploads/2014/01/dns_lookup-300x196.png" width="300" height="196" /></a></li>
<li>In the text box enter the URL you are trying to reach <em>(e.g. www.google.com)</em></li>
<li>Select <strong>A</strong> from the record type</li>
<li>Submit the request and make a note of the <strong>IP address</strong> returned.</li>
</ul>
</li>
<li>Edit the Hosts file
<ul>
<li>Windows
<ul>
<li>Start notepad.exe as an Administrator</li>
<li>Open C:\Widnows\System32\drivers\etc\hosts</li>
<li>Add the URL and the IP address in the format shown below;<br />
<code>173.194.34.67 www.google.com</code></li>
<li>Save the file ensuring that a file suffix <strong>isn&#8217;t</strong> appended</li>
</ul>
</li>
<li>Linux / Mac
<ul>
<li>Open /etc/hosts as the superuser with your editor of choice (vim!)</li>
<li>Add the URL and the IP address in the format shown below;<br />
<code>173.194.34.67 www.google.com</code></li>
<li>Save the file ensuring that a file suffix <strong>isn&#8217;t</strong> appended</li>
</ul>
</li>
</ul>
</li>
<li>Testing
<ul>
<li>Load up a cmd prompt (Ctrl + R, type cmd, press return)</li>
<li>Type <code>nslookup www.google.com</code></li>
<li>Ensure you receive the IP address you entered in the hosts file</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<p>If the ISP is using BGP filtering methods, Deep Packet Inspection <em>(DPI)</em> or a transparent proxy then this still may not work as they&#8217;ll detect traffic going to the blocked IP subnet and act accordingly.</p>
<p>Keep an eye on our <a href="/top-ways-to-evade-filters/">How to Evade Blocks</a> page and follow <a href="http://twitter.com/STCPI">@STCPI</a> on Twitter for more methods to discover and evade Internet censorship.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/08/basic-dns-filter-evasion-hosts-file/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>GoAwayCameron Chrome Plugin Released</title>
		<link>https://survivetheclaireperryinter.net/2013/12/20/goawaycameron-chrome-plugin-released/</link>
		<comments>https://survivetheclaireperryinter.net/2013/12/20/goawaycameron-chrome-plugin-released/#comments</comments>
		<pubDate>Fri, 20 Dec 2013 09:50:50 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Activism]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=43</guid>
		<description><![CDATA[An enterprising Computer Student from Singapore going by the name @nubela on Twitter has released a Chrome plugin that allows people to evade some of the ISP filters. On his websites goawaycameron.co.uk he has published a mini FAQ and a getting started guide; Well here&#8217;s to hoping it, and the reasons for needing it, go viral!<br /><a class="moretag" href="/2013/12/20/goawaycameron-chrome-plugin-released/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>An enterprising Computer Student from Singapore going by the name <a href="https://twitter.com/nubela">@nubela</a> on Twitter has released a Chrome plugin that allows people to evade some of the ISP filters.</p>
<p>On his websites <a href="http://goawaycameron.co.uk">goawaycameron.co.uk</a> he has published a mini FAQ and a getting started guide;</p>
<blockquote><p><strong>Will this work outside of UK?</strong></p>
<p>Yes! This will work anywhere, and with any websites that are blocked by firewall, universities, workplaces, nanny filters, or well, censorship.</p>
<p><strong>What is &#8220;Go away Cameron&#8221;?</strong></p>
<p>&#8220;Go away Cameron&#8221;, or GAC, is a chrome extension that automates a private and smart proxy service to route your access around censorship so you can regain your access to your favourite blocked sites in UK.</p>
<p><strong>Is it legal?</strong></p>
<p>GAC is essentially a smart proxy service. And I don&#8217;t believe a proxy service is illegal.</p>
<p><strong>Are you harvesting info?</strong></p>
<p>No, no logs are stored.</p>
<p><strong>Can you trace who I am?</strong></p>
<p>No, I can&#8217;t even do that. Other from your IP address, which isn&#8217;t logged as well. But how can you know for sure? See my answer to the last question.</p>
<p><strong>Is it safe?</strong></p>
<p>It is even safer than you using any unknown Hotspot Shield, or surfing websites through the random web proxy (which you already am and needs no setting up in case you don&#8217;t know, thats how they block you from the websites). In fact, it is even FASTER. Because the server uses better international routing than your homeline internet. And most of the blocked websites are international.</p>
<p><strong>Why do you need the permission to &#8220;access data on all websites?&#8221;</strong></p>
<p>Because blocked sites lie on arbitrary urls! And I don&#8217;t have, nor will I ever can have, an exhuastive list of UK banned sites. What I can do is to merely detect whether the website returns you an error message saying UK blocked it. (This is when the extension kicks in). I think I have an at most 10line code that checks for this. I welcome you to check the code for this.</p>
<p><strong>Why do you need the permission to &#8220;access tabs and browsing activity?&#8221;</strong></p>
<p>Because I apply a private proxy (not public, so even safer) to your browser temporarily for you to be able to view the banned website. But because it is private, it needs to enter the username and password to the proxy. Which I don&#8217;t want you to manually enter, so I hijack the process and manually enter it for you. So thats why I need this permission so I can make it seamless for you. I promise I do nothing more than that.</p>
<p><strong>What is your intention for making this?</strong></p>
<p>3 reasons. One, It was a holiday project as I was learning Twitter bootstrap. Two, I enjoy my internet freedom, and urge all of you to never give that up, let alone to any government agencies. Three, I did have some blind hopes for it going viral.</p>
<p><small>@nubela</small></p>
</blockquote>
<p>Well here&#8217;s to hoping it, and the reasons for needing it, go viral!</p>
<p style="text-align: center;"><a href="http://https://chrome.google.com/webstore/detail/go-away-cameron/ckiahbcmlmkpfiijecbpflfahoimklke?hl=en" class="btn bluth blue btn- " target="_self">Install Go Away Cameron for Chrome</a></p>
<p style="text-align: left;"><strong>Update:</strong></p>
<p style="text-align: left;">Mainstream news have picked up on the story:<br />
<a href="http://www.wired.co.uk/news/archive/2013-12/23/go-away-cameron">http://www.wired.co.uk/news/archive/2013-12/23/go-away-cameron</a><br />
<a href="http://www.telegraph.co.uk/technology/internet-security/10534618/Go-Away-Cameron-browser-extension-bypasses-UK-porn-filters.html">http://www.telegraph.co.uk/technology/internet-security/10534618/Go-Away-Cameron-browser-extension-bypasses-UK-porn-filters.html</a><br />
<a href="http://www.techradar.com/news/internet/-go-away-cameron-chrome-extension-nullifies-pm-s-porn-blockade-1210457">http://www.techradar.com/news/internet/-go-away-cameron-chrome-extension-nullifies-pm-s-porn-blockade-1210457</a><br />
<a href="http://metro.co.uk/2013/12/20/go-away-cameron-browser-extension-lets-users-bypass-uk-porn-filters-4238809/">http://metro.co.uk/2013/12/20/go-away-cameron-browser-extension-lets-users-bypass-uk-porn-filters-4238809/</a></p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2013/12/20/goawaycameron-chrome-plugin-released/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
