{"draft":"draft-irtf-pearg-censorship-10","doc_id":"RFC9505","title":"A Survey of Worldwide Censorship Techniques","authors":["J. L. Hall","M. D. Aaron","A. Andersdotter","B. Jones","N. Feamster","M. Knodel"],"format":["HTML","TEXT","PDF","XML"],"page_count":"34","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Privacy Enhancements and Assessments Research Group","abstract":"This document describes technical mechanisms employed in network\r\ncensorship that regimes around the world use for blocking or\r\nimpairing Internet traffic. It aims to make designers, implementers,\r\nand users of Internet protocols aware of the properties exploited and\r\nmechanisms used for censoring end-user access to information. This\r\ndocument makes no suggestions on individual protocol considerations,\r\nand is purely informational, intended as a reference. This document\r\nis a product of the Privacy Enhancement and Assessment Research Group\r\n(PEARG) in the IRTF.","pub_date":"November 2023","keywords":["network censorship","network blocking","network throttling","traffic impairment","censorship circumvention"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC9505","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc9505"}