{"id":16054,"date":"2013-07-04T18:43:40","date_gmt":"2013-07-04T22:43:40","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/fresh-proxies-list-flies-under-the-radar-of-chinese-censorship\/"},"modified":"2013-07-04T18:43:40","modified_gmt":"2013-07-04T22:43:40","slug":"fresh-proxies-list-flies-under-the-radar-of-chinese-censorship","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/fresh-proxies-list-flies-under-the-radar-of-chinese-censorship\/","title":{"rendered":"Fresh Proxies List Flies Under the Radar of Chinese Censorship"},"content":{"rendered":"<p><p>      Dallas, Texas (PRWEB) July 03, 2013    <\/p>\n<p>      idcloak says the IP addresses in its newly released Fresh      Proxies list will successfully bypass the Great Wall of      China and give Chinese netizens unfettered access to the net.    <\/p>\n<p>      According to idcloaks lead researcher, Robin Welles, IP      proxies are effective because they connect the browser      directly to the remote server, doing away with the      complications of a mediating website. One complication of      site-based proxies is that they usually contain the word      proxy or unblock in their web page or URL and that      betrays their function to filters. The result: censors see      them and shut them out.    <\/p>\n<p>      Its not easy to get around the Great Firewall; says      Welles, as it employs several filter mechanisms      simultaneously to prevent circumvention. The Golden Shield      also has 30,000 staff manually holding it up, so you have the      human element to contend with as well. All this means only      the newest proxies have a chance of breaking out of Chinas      censorship.    <\/p>\n<p>      A proxy works by allowing a user to connect to a      foreign-based server and only then requesting banned web      content, from a YouTube or Facebook      IP address, for example. Assuming the user has chosen an      HTTPS (encrypted) proxy, the requested data is then returned      to their device discretely and under the censorship radar.    <\/p>\n<p>      The location of the proxy server is also extremely important,      Welles explains, Of course, censorship circumvention only      works if the user connects to a proxy based outside the      censorship zone. But they shouldnt send their requests too      far. Connecting to a server on the other side of the world      makes browsing slow to unacceptable levels. The idcloak list      offer a wide variety of IP      geolocation options to help users find this balance.    <\/p>\n<p>      idcloak maintains the list continuously to make sure all      displayed proxies are operational. The database is live,      which means it is continuously subject to checks, with new      proxies being added and old ones taken away daily. This      ensures the presented list is always a current snapshot of      all major working proxies in the world.    <\/p>\n<p>      For further information about idcloaks work in censorship      circumvention, web privacy and security, visit <a href=\"http:\/\/www.idcloak.com\" rel=\"nofollow\">http:\/\/www.idcloak.com<\/a>.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.prweb.com\/releases\/2013\/7\/prweb10893369.htm\" title=\"Fresh Proxies List Flies Under the Radar of Chinese Censorship\">Fresh Proxies List Flies Under the Radar of Chinese Censorship<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Dallas, Texas (PRWEB) July 03, 2013 idcloak says the IP addresses in its newly released Fresh Proxies list will successfully bypass the Great Wall of China and give Chinese netizens unfettered access to the net. According to idcloaks lead researcher, Robin Welles, IP proxies are effective because they connect the browser directly to the remote server, doing away with the complications of a mediating website <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/fresh-proxies-list-flies-under-the-radar-of-chinese-censorship\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-16054","post","type-post","status-publish","format-standard","hentry","category-censorship"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/16054"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=16054"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/16054\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=16054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=16054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=16054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}