FINDING · POLICY

Censorship operating at the infrastructure layer (hosting, DNS, ISPs) rather than the content layer produces opacity: blocklists must be kept secret lest they become menus of blocked content, accuracy cannot be examined, and harms are divided from those with incentive or expertise to oppose them. The consistent pattern in anti-censorship responses is to distribute, decentralize, encrypt, and obfuscate — making circumvention traffic indistinguishable from permitted use.

From 2011-seltzer-infrastructuresInfrastructures of Censorship and Lessons from Copyright Resistance · §2.1 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
keyword-filteringdns-poisoning
defenses
meta-resistancemimicry

Extracted by claude-sonnet-4-6 — review before relying.