Radio Free China

Human Rights and Religious Freedom News


*FREE Anonymizer Operation: Anti-Censorship *If you live in an area of the world that is censoring the internet you may want to get UltraSurf. The website where you can download this software for free describes it as:

UltraSurf is the flagship software product from UltraReach Internet Corp. for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely.


*Handbook for bloggers and cyber-dissidents from Reporters Without Borders is FREE!

In response to state-directed Internet filtering and monitoring regimes, many forms of circumvention technologies have emerged to allow users to bypass filtering restrictions. There are numerous projects to develop technologies that would enable citizens and civil society networks to secure themselves against, or work around, Internet censorship and surveillance. These tools as are referred to as “circumvention technologies.” In general, circumvention technologies work by routing a user’s request from a country that implemented filtering through an intermediary machine that is not blocked by the filtering regime. This computer then retrieves the requested content for the censored user and transmits the content back to the user. Sometimes, these technologies may be specifically designed for a particular filtering situation or customized for a specific country. Other times, users may simply adapt existing technologies for circumvention purposes even though that may not be the original purpose of the technology.


*Tor: An anonymous Internet communication system

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.


*List of web proxies *PGP email encryption and ZPhone web phone secure voice

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: