<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>How To Survive The Claire Perry Internet &#187; Proxy</title>
	<atom:link href="/tag/proxy/feed/" rel="self" type="application/rss+xml" />
	<link>https://survivetheclaireperryinter.net</link>
	<description></description>
	<lastBuildDate>Fri, 16 Oct 2015 09:30:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8</generator>
	<item>
		<title>Introducing ASafe.Space</title>
		<link>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/</link>
		<comments>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/#comments</comments>
		<pubDate>Mon, 12 Jan 2015 19:11:24 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[Technical Implementation]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[David Cameron]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Mass Surveillance]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Safe Space]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[TOR]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=615</guid>
		<description><![CDATA[David Cameron recently said in a speech that he would deny potential Terrorists a safe space on the Internet to communicate; The obvious problem here is that everyone is a potential Terrorist so what David Cameron is actually promising that he intends to legislate against anyone having a means of communication that is secure from<br /><a class="moretag" href="/2015/01/12/introducing-asafe-space/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>David Cameron recently said in a speech that he would deny <em>potential</em> Terrorists a safe space on the Internet to communicate;</p>
<p><iframe src="https://embed.theguardian.com/embed/video/uk-news/video/2015/jan/12/david-cameron-spy-agencies-britain-video" width="560" height="315" frameborder="0" allowfullscreen></iframe></p>
<p>The obvious problem here is that <em>everyone</em> is a <em>potential</em> Terrorist so what David Cameron is actually promising that he intends to legislate against <em>anyone</em> having a means of communication that is secure from Government interference.</p>
<p>We&#8217;ve seen that GCHQ and the Police have abused <em>(or just plain broken)</em> laws in order to spy on Journalists, Lawyers and other innocents, the Government can not be trusted with these powers.</p>
<p>In response <a href="https://ASafe.Space">ASafe.Space</a> has been registered and will contain a few short guides on how to have a <a href="https://asafe.space/to/browse-the-internet/">safe space to browse the Internet</a>, <a href="https://asafe.space/to/communicate-over-instant-messaging/">communicate over Instant Messaging</a>, <a href="https://asafe.space/to/communicate-over-email/">Email</a> or <a href="https://asafe.space/to/communicate-with-pen-paper/">even Pen and Paper</a>.</p>
<p>Evading censorship and surveillance are one and the same, if the censor doesn&#8217;t know what you are saying or what you are reading they can&#8217;t stop you nor can they hold it against you.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2015/01/12/introducing-asafe-space/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Building a PIPCU Resistant Immunicity Style Proxy Using Tor</title>
		<link>https://survivetheclaireperryinter.net/2014/08/23/building-a-pipcu-resistant-immunicity-style-proxy-using-tor/</link>
		<comments>https://survivetheclaireperryinter.net/2014/08/23/building-a-pipcu-resistant-immunicity-style-proxy-using-tor/#comments</comments>
		<pubDate>Sat, 23 Aug 2014 14:18:44 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Censorship Reporting]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Technical Implementation]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[Law]]></category>
		<category><![CDATA[legal]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Sky]]></category>
		<category><![CDATA[TalkTalk]]></category>
		<category><![CDATA[Virgin]]></category>
		<category><![CDATA[webproxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=392</guid>
		<description><![CDATA[A Little History In June 2004 BT took the step of putting technical measures in place that allowed them to censor the Internet. At the time there was muffled dissent at the idea of creating and deploying such technology but those voices were silenced by accusations that opposition to CleanFeed was to support the abuse<br /><a class="moretag" href="/2014/08/23/building-a-pipcu-resistant-immunicity-style-proxy-using-tor/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<div class="well">
<h5><a href="#history">- A Little History </a></h5>
<h5><a href="#how">- How a PAC Proxy Works</a></h5>
<h5><a href="#use">- Using the Tor PAC Proxy</a></h5>
<h5><a href="#create">- Creating Your Local Tor Proxy</a></h5>
<h5><a href="#final">- Some Final Thoughts</a></h5>
</div>
<h2><a id="history"></a>A Little History</h2>
<p>In June 2004 BT took the step of <a href="http://www.theguardian.com/technology/2004/jun/06/childrensservices.childprotection">putting technical measures in place</a> that allowed them to censor the Internet.</p>
<p>At the time there was muffled dissent at the idea of creating and deploying such technology but those voices were silenced by accusations that opposition to CleanFeed was to support the abuse of children.</p>
<p>We warned that this was the start of a slippery slope.</p>
<p>In 2011 the MPA took BT to court in an attempt to block Newzbin, when the Honourable Justice Arnold understood that BT already had an Internet censorship system in place he ordered it to be used to block Newzbin</p>
<blockquote><p>In respect of its customers to whose internet service the system known as Cleanfeed is applied whether optionally or otherwise, [BT] shall within 14 days adopt the following technical means to block or attempt to block access by its customers to the website known as Newzbin2 currently accessible at www.newzbin.com, its domains and sub-domains and including payments.newzbin.com and any other IP address or URL whose sole or predominant purpose is to enable or facilitate access to the Newzbin2 website<small>Hon Justice Arnold</small></p>
</blockquote>
<p>On the back of the Newzbin success various other private entities took to the High Court to chase more ISPs and in February 2012 the Honourable Justice Arnold <a href="http://www.bailii.org/cgi-bin/markup.cgi?doc=/ew/cases/EWHC/Ch/2012/268.html">ruled</a></p>
<blockquote><p>&#8230; that both users and the operators of TPB infringe the copyrights of the Claimants (and those they represent) in the UK.<small>Hon Justice Arnold</small></p>
</blockquote>
<p>The result of this ruling was that BT, TalkTalk, Sky and others were required to <em>take measures to block or at least impede access by their customers to a peer-to-peer (&#8220;P2P&#8221;) file-sharing website called The Pirate Bay (&#8220;TPB&#8221;).</em></p>
<p>At the time the OpenRightsGroup issued the following statement;</p>
<blockquote><p>Blocking the Pirate Bay is pointless and dangerous. It will fuel calls for further, wider and even more drastic calls for internet censorship of many kinds, from pornography to extremism.<small>Jim Killock, Executive Director of the Open Rights Group</small></p>
</blockquote>
<p>So here we are in 2014, a decade after we originally predicted the slippery slope of Internet censorship and we have Court ordered censorship at the behest of foreign private entities, secret URL blocklists courtesy of the IWF, varying levels of Internet Filtering in homes, Internet filtering in coffee shops etc and now the City of London Police appear to be using organised Crime Legislation to intimidate and shut down proxies.</p>
<h2><a id="how"></a>How a PAC Proxy Works</h2>
<p>The PAC <em>(Proxy auto-config)</em> file format was originally designed by Netscape in 1996 for the Netscape Navigator 2.0 and is a text file that defines which URLs are to be routed over a proxy and optionally which proxy to use on a per URL basis.</p>
<p>A very basic PAC file could look like this;</p>
<pre>function FindProxyForURL(url, host) 
{    
    var list = new Array("wtfismyip.com","www.ipchicken.com");
    for(var i=0; i &lt; list .length; i++)
    {
        if (shExpMatch(host, list[i]))
        {
           return "SOCKS socks.survivetheclaireperryinter.net:9050";
        }
    }
    return "DIRECT";
}</pre>
<p>This PAC file defines two URLs <em>(wtfismyip.com and www.ipchicken.com)</em> and tells the browser that these URLs should be routed via the SOCKS proxy socks.survivetheclaireperryinter.net using port 9050. Any other URLs are routed directly <em>(as in not using a proxy)</em>.</p>
<p>The <a href="https://torproject.org">Tor Project</a> is one of the most powerful tools we have against Internet censorship and one of the features of a Tor relay is the ability to be used as a SOCKS proxy.</p>
<p>There are lots of Tor relays on the Internet that are configured not only as Bridges, pluggable transports, Exits &amp; relays but also as SOCKS servers. We will create a Tor relay to be coupled with a PAC file to selectively route certain URLs over The Onion Routing network to bypass censorship.</p>
<h2><a id="use"></a>Using the Tor PAC Proxy</h2>
<p>To test a Tor powered PAC proxy simply <a href="#config-browser">set your Browser Proxy settings</a> to; https://RoutingPacketsIsNotACrime.uk/pac.config?id=piratebay this will allow you to browse to thepiratebay.se via a Tor proxy in Russia.</p>
<p>To create your own list of URLs to route via your Tor proxy start by navigating to <a href="https://routingpacketsisnotacrime.uk">https://RoutingPacketsIsNotACrime.uk</a> and identify which URLs you would like to route.</p>
<div class="alert bluth yellow"><button type="button" class="close" data-dismiss="alert">&times;</button>Note that the only URL selected by default is wtfismyip.com. To re-iterate, this is a technical demonstration of Censorship evasion and bypassing censorship is <strong>NOT</strong> illegal.</div>
<p>Add all of your URLs separated by a comma e.g. &#8220;google.com, yahoo.com, bing.com&#8221; then click &#8220;Save PAC File&#8221;.</p>
<p>Make note of your unique PAC file URL e.g. https://RoutingPacketsIsNotACrime.uk/pac.config?id=ABCDEF1234567890</p>
<p>Configure your browser to use your unique PAC file</p>
<p><a id="config-browser"></a><br />
<h4>Configure Internet Explorer</h4>
<ol>
<li>Go to Start then Control Panel. (Windows 8 users hover your mouse to the bottom right, click Settings, then click Control Panel)</li>
<li>Find Internet Options (sometimes under Network and Internet), then go to the Connections tab.</li>
<li>At the bottom, click the LAN settings button.</li>
<li>A new dialog will appear. Tick the box that says Use automatic configuration script.</li>
<li>In the address field, paste in your unique PAC file ID e.g. <strong>https://RoutingPacketsIsNotACrime.uk/pac.config?id=ABCDEF1234567890</strong></li>
<li>Press OK, then OK on the Internet Options dialog.</li>
</ol>
<h4>Configure Mozilla Firefox</h4>
<ol>
<li>In Mozilla Firefox, go to Options. In Windows, click the Firefox button then choose Options, or go to Tools, then Options. In Mac OS X, go to Firefox, then Preferences. In Linux, go to Tools, Options.</li>
<li>Go to the Advanced tab, then go to the Network tab.</li>
<li>Click Settings next to Configure how Firefox connects to the Internet.</li>
<li>Select Automatic proxy configuration URL.</li>
<li>In the text field, paste in your unique PAC file ID e.g. <strong>https://RoutingPacketsIsNotACrime.uk/pac.config?id=ABCDEF1234567890</strong></li>
<li>Press OK, then OK on the Options dialog.</li>
</ol>
<h4>Configure Google Chrome</h4>
<ol>
<li>In Google Chrome, click the menu button to the right of the URL bar, and choose Settings.</li>
<li>At the bottom, click the Show advanced settings</li>
<li>Under Network, click Change proxy settings.
<ol>
<li>On Windows, at the bottom click the LAN settings button. A new dialog will appear. Tick the box that says Use automatic configuration script.</li>
<li>On Mac OS X, tick Automatic Proxy Configuration.</li>
<li>On Linux, click Network proxy, select Automatic from the Method drop down menu.</li>
</ol>
</li>
<li>In the address field, paste in your unique PAC file ID e.g. <strong>https://RoutingPacketsIsNotACrime.uk/pac.config?id=ABCDEF1234567890</strong></li>
<li>Close the dialogs to save the settings. On Mac OS X, press Apply first.</li>
</ol>
</p><p>You&#8217;ll note that the PAC file specifies the proxy as localhost:9050, trying to visit the URLs in question won&#8217;t work until we setup the local Tor relay.</p>
<h2><a id="create"></a>Creating Your Local Tor Proxy</h2>
<p>If you want to help the Tor network grow and create your own proxy to use with the RoutingPacketsIsNotACrime PAC files then these instructions should get you started.</p>
<p>If you don&#8217;t already have a dedicated server consider visiting <a href="https://www.digitalocean.com/">DigitalOcean</a>, <a href="https://aws.amazon.com/ec2/">Amazon EC2</a> or for some really good deals check <a href="http://lowendbox.com/">LowEndBox.com</a>.</p>
<p>For various reasons I would suggest hosting the server outside of the UK but that is a choice for you to make.</p>
<h3>CentOS 6</h3>
<h4>Install EPEL</h4>
<pre>wget http://www.mirrorservice.org/sites/dl.fedoraproject.org/pub/epel/6/i386/epel-release-6-8.noarch.rpm
yum install epel-release-6-8.noarch.rpm</pre>
<h4>Edit iptables</h4>
<pre>vim /etc/sysconfig/iptables</pre>
<p>Allow the ORPort and the proxy port (in this case 9001 and 9150)</p>
<pre>*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 9001 -j ACCEPT
-A INPUT -m state --state NEW -m tcp -p tcp --dport 9150 -j ACCEPT
-A INPUT -j REJECT --reject-with icmp-host-prohibited
-A FORWARD -j REJECT --reject-with icmp-host-prohibited
COMMIT</pre>
<p>Save and quit</p>
<pre>/etc/init.d/iptables restart</pre>
<p>If your server has IPv6 then make similar changes to ip6tables</p>
<h4>Editing torrc</h4>
<pre>vim /etc/tor/torrc</pre>
<p>A minimal torrc for use with a PAC file style proxy would look similar to the below (although you should read all the options to understand what you are doing);</p>
<pre>SocksPort xx.xx.xx.xx:9150
ORPort 9001
Nickname TheNameOfYourRelay
ContactInfo YourContactDetails
ExitPolicy reject *:*</pre>
<p>xx.xx.xx.xx should be a routeable IP <em>(e.g. not 127.0.0.1)</em> of your server, if you want to keep your relay server partially private you might want to add PublishServerDescriptor 0 to your config too.</p>
<div class="alert bluth yellow"><button type="button" class="close" data-dismiss="alert">&times;</button>There is no security here, if someone port scanned your server then they would see that it is an open proxy and could use it to do nasty things that people will blame you for!<br /> If your Tor relay is on a public IP <em>(e.g. not 10.0.0.0/8, 172.16.0.0/12 or 192.168.0.0/16)</em><em> then you may want to restrict the IPTables allow rule to only allow your source IP addresses</em></div>
<h4>Start Tor &amp; Confirm it is working</h4>
<pre>/etc/init.d/tor start
tail -f /var/log/messages</pre>
<p>You should see something along the lines of;</p>
<pre>socks Tor[31452]: Self-testing indicates your ORPort is reachable from the outside. Excellent. Publishing server descriptor.
socks Tor[31452]: Bootstrapped 85%: Finishing handshake with first hop.
socks Tor[31452]: Bootstrapped 90%: Establishing a Tor circuit.
socks Tor[31452]: Tor has successfully opened a circuit. Looks like client functionality is working.
socks Tor[31452]: Bootstrapped 100%: Done.
socks Tor[31452]: Performing bandwidth self-test...done.</pre>
<h4>Done!</h4>
<p>Assuming you have chosen the URLs you wanted in the previous section <em>(<a href="#use">Using the Tor PAC Proxy</a>)</em> you can now browse to the URLs that were previously censored as they are now being routed over Tor. Any non-restricted URLs will route over your normal Internet connection.</p>
<h3>Windows</h3>
<p>Follow our tutorial on <a href="/2014/03/11/installing-tor-on-windows-securely/">Securely Installing Tor on Windows</a> to get the full Tor Browser bundle up and running.</p>
<p>Once installed and started Tor will be running on localhost:9150 <em>(do not close the Tor Browser as this will also close the relay)</em></p>
<h4>Done!</h4>
<p>Assuming you have chosen the URLs you wanted in the previous section <em>(<a href="#use">Using the Tor PAC Proxy</a>)</em> you can now browse to the URLs that were previously censored as they are now being routed over Tor. Any non-restricted URLs will route over your normal Internet connection.</p>
<h2><a id="final"></a>Some Final Thoughts <em>(and quotes)</em></h2>
<p>Internet Censorship is abhorrent, we shouldn&#8217;t stand by and let the Government, Police or lawyers dictate what we can read. The slippery slope is getting steeper every day so we all need to help stop it.</p>
<blockquote><p>When bad men combine, the good must associate; else they will fall, one by one, an unpitied sacrifice in a contemptible struggle.<small>Edmund Burke</small></p>
</blockquote>
<blockquote><p>I always wondered why somebody doesn&#8217;t do something about that. Then I realized I was somebody.<small>Lily Tomlin</small></p>
</blockquote>
<blockquote><p>Withholding information is the essence of tyranny. Control of the flow of information is the tool of the dictatorship.<small>Bruce Coville</small></p>
</blockquote>
<blockquote><p>Who is more to be pitied, a writer bound and gagged by policemen or one living in perfect freedom who has nothing more to say?<small>Kurt Vonnegut</small></p>
</blockquote>
<blockquote><p>Once a government is committed to the principle of silencing the voice of opposition, it has only one way to go, and that is down the path of increasingly repressive measures, until it becomes a source of terror to all its citizens and creates a country where everyone lives in fear.<small>Harry S. Truman</small></p>
</blockquote>
<blockquote><p>Free societies&#8230;are societies in motion, and with motion comes tension, dissent, friction. Free people strike sparks, and those sparks are the best evidence of freedom&#8217;s existence.<small>Salman Rushdie</small></p>
</blockquote>
<blockquote><p>All men dream: but not equally. Those who dream by night in the dusty recesses of their minds wake in the day to find that it was vanity: but the dreamers of the day are dangerous men, for they may act their dreams with open eyes, to make it possible.<small>T.E. Lawrence</small></p>
</blockquote>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/08/23/building-a-pipcu-resistant-immunicity-style-proxy-using-tor/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The City of London PIPCU attempts to Block Proxies (and fails)</title>
		<link>https://survivetheclaireperryinter.net/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/</link>
		<comments>https://survivetheclaireperryinter.net/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/#comments</comments>
		<pubDate>Mon, 11 Aug 2014 19:57:15 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Reporting]]></category>
		<category><![CDATA[Collusion]]></category>
		<category><![CDATA[Block]]></category>
		<category><![CDATA[City of London Police]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[PIPCU]]></category>
		<category><![CDATA[Proxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=380</guid>
		<description><![CDATA[The City of London Police Police Intellectual Property Crime Unit (PIPCU) arrested the operator of immunicity.org &#8220;on suspicion of running an ‘umbrella’ website providing access to other websites which have been subject to legal blocking orders.&#8221; So some private entities sued some other private entities to prevent their customers from accessing certain websites. This, as<br /><a class="moretag" href="/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>The City of London Police Police Intellectual Property Crime Unit (PIPCU) arrested the operator of <a href="http://immunicity.org/">immunicity.org</a> &#8220;on suspicion of running an ‘umbrella’ website providing access to other websites which have been subject to legal blocking orders.&#8221;</p>
<p>So some private entities sued some other private entities to prevent their customers from accessing certain websites. This, as far as I understand it, was a civil matter. How does the City of London Police gain the ability to <strong>arrest</strong> someone how was not party to either side of the civil matter.</p>
<blockquote><p>An arrest is the act of depriving a person of his or her liberty usually in relation to the purported investigation or prevention of crime.<small>Wikipedia</small></p>
</blockquote>
<p>Routing packets is <strong>NOT A CRIME</strong>. What the fuck do they think they are up to?</p>
<blockquote class="twitter-tweet" lang="en-gb"><p><a href="https://twitter.com/darkmobius">@darkmobius</a> suspected that the proxy server was providing access to sites subject to blocking orders for carrying illegal content.</p>
<p>— City Police PIPCU (@CityPolicePIPCU) <a href="https://twitter.com/CityPolicePIPCU/statuses/497750874446655488">August 8, 2014</a></p></blockquote>
<p>&nbsp;</p>
<p>Thankfully <a href="http://immunicity.co.uk/">http://immunicity.co.uk/</a> and <a href="http://immun.es/">http://immun.es/</a> have already launched to help fill the space and more <a href="/2014/03/11/installing-tor-on-windows-securely/">Tor Project relays</a> are spinning up every day but let&#8217;s not stop there, if we don&#8217;t complain then they will continue to arrest and harass operators of these servers.</p>
<p>I would encourage people to complain to the City of London Police directly by tweeting at <a href="https://twitter.com/citypolice">@CityPolice</a>, by phone at 020 7601 2222, directly on their website with either this form (<a href="http://www.cityoflondon.police.uk/contact-city-police/compliments-and-complaints/Documents/public_complaints.pdf">Public Complaints</a>) or this form (<a href="http://www.cityoflondon.police.uk/contact-city-police/compliments-and-complaints/Documents/expression_of_dissatisfaction.pdf">Expression of Dissatisfaction</a>) or by email; psd_public@cityoflondon.police.uk</p>
<p>If you have time then also make a complaint to the Independent Police Complaints Commission by calling on 0300 020 0096 or via the website: <a href="http://www.ipcc.gov.uk/complaints">http://www.ipcc.gov.uk/complaints</a> <em>(it probably wouldn&#8217;t hurt to tweet <a href="https://twitter.com/IPCCNews">@IPCCNews</a> as well).</em></p>
<p>As always check our <a href="/top-ways-to-evade-filters/">Top Ways to Avoid Filters</a> page for the latest information on the best way to avoid Internet filtering be it performed by the state, ISPs, special interest groups or because your current method was illegally shutdown by a police force overstepping the mark.</p>
<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>Update: September &#8211; Immunicity,co.uk has shutdown and immun.es is very unreliable.</div>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/08/11/the-city-of-london-pipcu-attempts-to-block-proxies-and-fails/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Bypassing EE&#8217;s Content Lock system without a credit card or identifying yourself</title>
		<link>https://survivetheclaireperryinter.net/2014/05/20/bypassing-ees-content-lock-system-without-a-credit-card-or-identifying-yourself/</link>
		<comments>https://survivetheclaireperryinter.net/2014/05/20/bypassing-ees-content-lock-system-without-a-credit-card-or-identifying-yourself/#comments</comments>
		<pubDate>Tue, 20 May 2014 08:00:30 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Overblocking]]></category>
		<category><![CDATA[Bypass]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[webproxy]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=315</guid>
		<description><![CDATA[When you buy a service from EE it will be filtered at their moderate level by default, the other options are Strict and Off. Strict is designed to be safe for children and Off is for Adults. Of course even if you were to request that all filtering to be turned off it is still<br /><a class="moretag" href="/2014/05/20/bypassing-ees-content-lock-system-without-a-credit-card-or-identifying-yourself/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>When you buy a service from EE it will be filtered at their <a href="http://ee.co.uk/help/safety-and-security/my-digital-life/content-lock-and-orange-safeguard">moderate level</a> by default, the other options are <em>Strict</em> and <em>Off</em>.<br />
<em>Strict</em> is designed to be safe for children and <em>Off</em> is for Adults.</p>
<p>Of course even if you were to request that all filtering to be turned off it is still possible that you&#8217;ll fall foul of an incorrect IWF filter and be presented with the following page;<br />
<a class="lightbox" href="/wp-content/uploads/2014/05/ee-illegal.jpg"><img class="aligncenter size-medium wp-image-317" alt="ee-illegal" src="/wp-content/uploads/2014/05/ee-illegal-300x289.jpg" width="300" height="289" /></a></p>
<p>Putting the IWF and their secret blocklists aside there are many reasons you may not want to disclose information to EE or handover a credit card <em>(you might not have one for instance)</em> but still need to get past their filters that will block a <a href="http://www.cliterati.co.uk/">female centric &#8220;adult&#8221;</a> site that <a href="http://www.cliterati.co.uk/2014/05/censorship-and-the-porn-panic/">blogs about Censorship</a> due to the content of the copy but will quite happily let you visit LiveLeak.com and watch people get killed.</p>
<p>The good news is that the EE Content Lock is quite easy to circumnavigate.</p>
<p><strong>DNS Spoofing:</strong> <span style="color: green;">No</span><br />
<strong>MiTM SSL:</strong> <span style="color: green;">No</span><br />
<strong>Deep Packet Inspection:</strong> <span style="color: red;">Yes</span><br />
<strong>Destination IP Transit Interference:</strong> <span style="color: green;">No</span><br />
-<br />
<strong>Unique Reason for Block:</strong> <span style="color: red;">No</span><br />
<strong>Categorised Block:</strong> <span style="color: red;">No</span><br />
<strong>Ability to report incorrect block:</strong> <span style="color: red;">No</span></p>
<p>The goto advice is always to <a href="https://torproject.org">download Tor</a> as it will not only bypass all filtering but it will also help mask those who need to use Tor to aid in protecting their privacy.</p>
<p>If you aren&#8217;t comfortable with installing software such as Tor then you could follow our guide on <a href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">Creating a SOCKS5 Proxy</a> which also works perfectly.</p>
<p>Finally the EE Content Lock system cannot MiTM SSL so even for blocked URLs such as <a href="http://reddit.com/r/nsfw">http://reddit.com/r/nsfw</a> <em>(note that reddit.com isn&#8217;t blocked but /r/nsfw is!)</em> can be accessed by using SSL.<br />
Unfortunately reddit relies heavily on Akamai so the SSL certificate will be incorrect and you really shouldn&#8217;t get in the habit of accepting incorrect SSL.</p>
<p>Whilst this post proves it is trivial to bypass Government co-erced filtering it is likely that there will soon be a call to make filtering mandatory and criminalising attempts at bypassing them.</p>
<p>The best way to prevent this is to <a href="https://www.writetothem.com/">write to your MP</a> and tell them that you don&#8217;t believe that any form of filtering has any place on the Internet.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/05/20/bypassing-ees-content-lock-system-without-a-credit-card-or-identifying-yourself/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Using Anonymous Visa Cards to Create Untraceable Surveillance / Censorship Avoidance Proxies or Webhosts</title>
		<link>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/</link>
		<comments>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/#comments</comments>
		<pubDate>Fri, 11 Apr 2014 21:44:25 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Censorship Evasion]]></category>
		<category><![CDATA[Filter bypass]]></category>
		<category><![CDATA[Filter Evasion]]></category>
		<category><![CDATA[Surveillance Avoidance]]></category>
		<category><![CDATA[anonymity]]></category>
		<category><![CDATA[anonymous]]></category>
		<category><![CDATA[bypass bt filter]]></category>
		<category><![CDATA[Evasion]]></category>
		<category><![CDATA[financial]]></category>
		<category><![CDATA[Mastercard]]></category>
		<category><![CDATA[money laundering]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[sky broadband shield]]></category>
		<category><![CDATA[talktalk dns server]]></category>
		<category><![CDATA[talktalk homesafe]]></category>
		<category><![CDATA[VISA]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=231</guid>
		<description><![CDATA[It is still possible to anonymously purchase on-line resources which will be useful for those wishing to frustrate Internet surveillance, evade Internet censorship or blow the whistle on something without risking the exposure of their identity. Finding a pre-paid card that can be purchased in cash with no questions asked is trivially easy, any card<br /><a class="moretag" href="/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>It is still possible to anonymously purchase on-line resources which will be useful for those wishing to frustrate Internet surveillance, evade Internet censorship or blow the whistle on something without risking the exposure of their identity.</p>
<p>Finding a pre-paid card that can be purchased in cash with no questions asked is trivially easy, any card or gift shop is likely to have them interspersed with Starbucks gift cards etc.<br />
<a class="lightbox" href="/wp-content/uploads/2014/05/prepaid.jpg"><img class="aligncenter size-medium wp-image-249" alt="Prepaid Visa and Mastercards" src="/wp-content/uploads/2014/05/prepaid-300x225.jpg" width="300" height="225" /></a></p>
<p>For this example we&#8217;ll choose a £50 VISA card which once you get to the till will actually cost £53.95. Hand over your cash and walk out of the door.</p>
<p>As you leave swing by a Three, EE, O2 or Vodafone store and buy a pre-pay data SIM. Three have a 1Gb SIM for £7.50, buy it with cash and walk out of the store.</p>
<p>By now the VISA card will have activated and should be good to go.</p>
<p>For extra anonymity you may wish to visit a local pawn broker like Cash Converters or CEX and acquire a phone, tablet or laptop so that the IMEI you use with the newly purchased SIM is not one that has previously been tied to your identity.</p>
<p>Open up your VISA card and you&#8217;ll notice it has an expiry date, the CVV code on the signature strip and the usual 16 digit credit card number.</p>
<p><a class="lightbox" href="/wp-content/uploads/2014/04/card.jpg"><img class="aligncenter size-medium wp-image-264" alt="card" src="/wp-content/uploads/2014/04/card-300x225.jpg" width="300" height="225" /></a></p>
<p>Setup your 3G connection, optionally <a href="https://www.torproject.org/">install TOR</a> to bypass any ISP restrictions that may be present then navigate to your VPS provider of choice. I&#8217;d suggest <a href="https://digitalocean.com/">DigitalOcean.com</a> but there are many others.</p>
<p>Signing up for an account is easy, put in an email address and a password <em>(the email address will have to be a real one as it needs to be verified and it&#8217;s where your root passwords are sent but try signing up to something like HushMail.com)</em>.<br />
<a class="lightbox" href="/wp-content/uploads/2014/01/signup.jpg"><img class="aligncenter size-medium wp-image-128" alt="signup" src="/wp-content/uploads/2014/01/signup-300x241.jpg" width="300" height="241" /></a></p>
<p>Once logged in you&#8217;ll be asked to verify your billing details;<br />
<a class="lightbox" href="/wp-content/uploads/2014/01/logged_in.png"><img class="aligncenter size-medium wp-image-129" alt="logged_in" src="/wp-content/uploads/2014/01/logged_in-300x166.png" width="300" height="166" /></a></p>
<p>Now it&#8217;s likely that your use of TOR and a prepaid VISA card will trigger anti-fraud protections; the account will be locked and a support ticket will be raised asking you to identify yourself<br />
<a class="lightbox" href="/wp-content/uploads/2014/05/verify.jpg"><img class="aligncenter size-medium wp-image-251" alt="verify" src="/wp-content/uploads/2014/05/verify-300x163.jpg" width="300" height="163" /></a></p>
<p>The people at DigitalOcean are very good and if you adequately explain your motivations <em>(be it running a website you&#8217;d rather not have your name attached too, as a proxy for privacy etc)</em> they are likely to accommodate you without requiring copies of ID or a credit card number tied to your identity. <strong>DO NOT ABUSE THEIR TRUST</strong>.</p>
<p>Within a few minutes the account will be unlocked and you can launch your virtual machine.</p>
<p>If you login to the VISA pre-pay system you&#8217;ll be able to see if the pre-authorisation passed and that you&#8217;ll be able to continue paying for your server resources.<br />
<a class="lightbox" href="/wp-content/uploads/2014/04/balance.jpg"><img class="aligncenter size-medium wp-image-267" alt="balance" src="/wp-content/uploads/2014/04/balance-300x121.jpg" width="300" height="121" /></a></p>
<p>You can now host your whistle-blowing blog, a critique of public policy or just <a href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">use it as a proxy</a> safe in the knowledge that there is virtually no trace back to your true identity.</p>
<div class="alert bluth red"><button type="button" class="close" data-dismiss="alert">&times;</button>Do not abuse this ability to do hateful or illegal things, the VPS provider may not be able to identify you but they will shut you down and may even choose to shutdown all other accounts that appear to be of a similar profile to yours. Your actions could prevent someone who genuinely needs this anonymity.</div>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/04/11/using-anonymous-visa-cards-to-create-untraceable-surveillance-censorship-avoidance-proxies-or-webhosts/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Are BT &amp; Sky Adopting Filters to Reboot Phorm?</title>
		<link>https://survivetheclaireperryinter.net/2014/01/15/are-bt-sky-adopting-filters-to-reboot-phorm/</link>
		<comments>https://survivetheclaireperryinter.net/2014/01/15/are-bt-sky-adopting-filters-to-reboot-phorm/#comments</comments>
		<pubDate>Wed, 15 Jan 2014 07:55:44 +0000</pubDate>
		<dc:creator><![CDATA[Op]]></dc:creator>
				<category><![CDATA[Collusion]]></category>
		<category><![CDATA[Blocks]]></category>
		<category><![CDATA[BT]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Phorm]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Sky]]></category>

		<guid isPermaLink="false">https://survivetheclaireperryinter.net/?p=175</guid>
		<description><![CDATA[Several years ago the UK Internet was tied up in an opt-in / opt-out battle about ISP proxies tracking your movements on-line to monetize advertising. Now we have a new opt-in/opt-out battle but this time it is about ISP proxies tracking your movements on-line to prevent you seeing things you&#8217;re not allowed to see. Could<br /><a class="moretag" href="/2014/01/15/are-bt-sky-adopting-filters-to-reboot-phorm/">Continue reading...</a>]]></description>
				<content:encoded><![CDATA[<p>Several years ago the UK Internet was tied up in an opt-in / opt-out battle about ISP proxies tracking your movements on-line to monetize advertising.</p>
<p>Now we have a new opt-in/opt-out battle but this time it is about ISP proxies tracking your movements on-line to prevent you seeing things you&#8217;re not allowed to see.</p>
<p>Could it be that the reasons the big ISPs rolled over so easily and implemented filters is that it provides them with a treasure trove of information about your browsing habits?</p>
<p>Notice how Phorm sit&#8217;s within the ISP network, masquerades as target domains and presents different content.<br />
<a class="lightbox" href="/wp-content/uploads/2014/01/phorm.png"><img class="aligncenter size-full wp-image-179" alt="phorm" src="/wp-content/uploads/2014/01/phorm.png" width="723" height="600" /></a></p>
<p>ISP filtering does similar things, they either spoof DNS responses to force you to goto their static block page or they manipulate routing within their network to route traffic destined for a remote host to a host within their network.</p>
<p>Technically there is nothing stopping them from doing other things with your traffic at this point. Are we to believe that having already silently tested Phorm on unsuspecting customers are they not capable of using this new found, Government instigated power to make some more money at the cost of your freedom and privacy?</p>
<p>Learning <a href="/top-ways-to-evade-filters/">how to avoid Filters</a> using <a href="/2014/01/10/building-a-socks5-proxy-with-a-digital-ocean-server/">tactics such as SSH Tunnels</a> will render their filtering and monitoring moot.</p>
<p>Fight back.</p>
]]></content:encoded>
			<wfw:commentRss>https://survivetheclaireperryinter.net/2014/01/15/are-bt-sky-adopting-filters-to-reboot-phorm/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
