FINDING · POLICY

Users lacking technical circumvention skills bypassed blocking via social relays: technically savvy friends or contacts in unblocked regions copied blocked content into email or reposted it on social network profiles, allowing censored information to reach users who had no direct access to proxies or anonymizers. This informal bypass required no circumvention software on the recipient's end.

From 2011-shklovski-onlineOnline Contribution Practices in Countries that Engage in Internet Blocking and Censorship · §Reliance on social ties · 2011 · CHI

Implications

Tags

censors
generic
techniques
ip-blockingdns-poisoning
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.