Exit InternationalExit International20102010
AustralianAustralian
““Safe Suicide” Safe Suicide”
Workshop TourWorkshop Tour
How to BypassHow to BypassThe Proposed Australian The Proposed Australian
Censorship Firewalls.Censorship Firewalls.
A Brief Class Presented ByA Brief Class Presented By
David CampbellDavid CampbellFrom From ClearComputers.com.auClearComputers.com.au
Goals of This ClassGoals of This Class
1.1. Understanding how Understanding how websites get to your websites get to your computer screen.computer screen.
2.2. Understanding how Understanding how the Australian the Australian government plans to government plans to censor the internet.censor the internet.
3.3. Developing skills to Developing skills to subvert Government subvert Government Censorship today, Censorship today, and in the future.and in the future.
LEGAL NOTELEGAL NOTE What you will be shown today is What you will be shown today is
legal within Australia.legal within Australia.
It is illegal in China and most other It is illegal in China and most other countries that have been countries that have been highlighted as good examples of highlighted as good examples of censorship by the Minister for censorship by the Minister for Broadband, Stephen Conroy.Broadband, Stephen Conroy.
Please share this information with Please share this information with your friends and family, while you your friends and family, while you can.can.
How are websites How are websites delivered to your delivered to your
computer?computer?
IT’S COMPLICATEDIT’S COMPLICATEDIt would take days to explain completely. It would take days to explain completely.
What you will be shown today is a very What you will be shown today is a very basic concept of how it works to help you basic concept of how it works to help you
to understand firewalls and proxies.to understand firewalls and proxies.
CONNECTING TO THE NETCONNECTING TO THE NET
Connect to an Internet Service Connect to an Internet Service ProviderProvider
This ISP connects you to the This ISP connects you to the internet.internet.
The internet is not controlled by The internet is not controlled by any one country or organisation.any one country or organisation.
Internet provides connectivity for Internet provides connectivity for thousands of services, websites thousands of services, websites and email for example.and email for example.
FINDING OTHER FINDING OTHER COMPUTERSCOMPUTERS
Websites are provided by Websites are provided by other computers on the other computers on the internetinternet
URL’s refer to computers all URL’s refer to computers all over the globe that are over the globe that are catalogued by ISP’scatalogued by ISP’s
Often the same website will Often the same website will have several URL’s especially have several URL’s especially if it is controversial or if it is controversial or popularpopular
STANDARD WEB TRAFFICSTANDARD WEB TRAFFICRegular website data travels down only 1 or 2 ports, of the thousands Regular website data travels down only 1 or 2 ports, of the thousands
available on the internet.available on the internet.
Port 80 for Standard Port 443 for SecurePort 80 for Standard Port 443 for Secure
But we can force websites
To funnel down alternate
Ports in encrypted tunnels
How does the How does the Australian Australian
governmentgovernment plan to plan to
censorcensor the the internet?internet?
A SECRET URL A SECRET URL BLACKLISTBLACKLIST
The Australian Government are proposing The Australian Government are proposing that the internet is censored via a secret that the internet is censored via a secret
list of websites that it has deemedlist of websites that it has deemed““Refused Classification”Refused Classification”
This requires every single website you This requires every single website you visit to be logged and checked against a visit to be logged and checked against a blacklist before allowing or disallowing blacklist before allowing or disallowing
access.access.
Note: It is illegal to spy on users in Note: It is illegal to spy on users in Australia without a court order under Australia without a court order under
the Telecommunications (Interception) the Telecommunications (Interception) Act 1979.Act 1979.
Refused ClassificationRefused Classification
““Refused Classification material is a wide Refused Classification material is a wide ranging category of content which includes ranging category of content which includes
material deemed to offend against the material deemed to offend against the standards of morality, decency and propriety standards of morality, decency and propriety
generally accepted by [hypothetical] generally accepted by [hypothetical] reasonable adults, in the opinion of some or all reasonable adults, in the opinion of some or all
of the members of the government of the members of the government appointed Classification Boards.” - ACMAappointed Classification Boards.” - ACMA
Most “RC” content is perfectly legal to posses Most “RC” content is perfectly legal to posses and access under state and commonwealth law and access under state and commonwealth law
It is also completely legal in most other western It is also completely legal in most other western societies.societies.
SECRET LIST LEAKEDSECRET LIST LEAKED
The initial blacklist was leaked from ACMAThe initial blacklist was leaked from ACMA
(organisation charged with maintaining the (organisation charged with maintaining the blacklist)blacklist)
It was It was full of falsely blacklisted websitesfull of falsely blacklisted websites
Some of the things found personally on the list:Some of the things found personally on the list: Advice on dental careAdvice on dental care Hundreds of legal adult entertainment sitesHundreds of legal adult entertainment sites Vacation kennels for animal careVacation kennels for animal care Euthanasia research websitesEuthanasia research websites Online Poker and Casino’sOnline Poker and Casino’s Homosexual RightsHomosexual Rights Medical stem cell researchMedical stem cell research
Q: What have the following Q: What have the following websites got in common?websites got in common?
• www.Panty-ass.comwww.Panty-ass.com
• www.Peacefulpill.comwww.Peacefulpill.com
• www.PickyourPerversion.cowww.PickyourPerversion.commA: They are sequential entries on the A: They are sequential entries on the
Australian Government planned website Australian Government planned website blacklistblacklist
How to subvert How to subvert the firewall!the firewall!
How to get around firewallsHow to get around firewalls
There are two main ways to get There are two main ways to get blacklisted websites around a blacklisted websites around a firewallfirewall
The easiest way is via a The easiest way is via a Web Web Based ProxyBased Proxy..
The advanced way is via a The advanced way is via a VPN VPN tunneltunnel
What is a PROXY?What is a PROXY? A proxy is a third-party computerA proxy is a third-party computer
A proxy works by retrieving the A proxy works by retrieving the website you need and forwarding website you need and forwarding it on to you around the firewallit on to you around the firewall
Proxies can encrypt standard Proxies can encrypt standard content and forward it over a content and forward it over a secure connectionsecure connection
BLOCKED WEBSITEBLOCKED WEBSITE
PROXY
FIREWALL
Web Based ProxiesWeb Based ProxiesWeb based proxies require no more Web based proxies require no more
technical skill than using a regular technical skill than using a regular website.website.
Side NoteSide Note They can give mixed results.They can give mixed results. Complex websites can display incorrectly.Complex websites can display incorrectly. Confidential information can be open to the Confidential information can be open to the
proxy owner.proxy owner.
Finding Free Web Finding Free Web ProxiesProxies
Easily found with search websites like Easily found with search websites like www.google.comwww.google.com
The best search phrase would beThe best search phrase would be“Free Web Proxy”“Free Web Proxy”
Other websites like Other websites like www.proxy.orgwww.proxy.org track track and maintain lists of free proxies, this is a and maintain lists of free proxies, this is a good place to start.good place to start.
Judge the results carefully.Judge the results carefully. Most proxies will look confusing at first.Most proxies will look confusing at first. Take your time and look for somewhere to Take your time and look for somewhere to
input a URL or address and a go button.input a URL or address and a go button.
Using Web ProxiesUsing Web Proxies Locate a text box within the web proxy Locate a text box within the web proxy
page to enter a url or website addresspage to enter a url or website address Once this is entered, a tap on the enter or Once this is entered, a tap on the enter or
return key should be the equivalent of return key should be the equivalent of pressing “Go”pressing “Go”
You should take note of available options You should take note of available options or look for an options button.or look for an options button.
Web Based Proxy OptionsWeb Based Proxy Options
Encode URL is an important option for Encode URL is an important option for dodging URL based blacklistsdodging URL based blacklists
Remove scripts can make it load faster and Remove scripts can make it load faster and cleanercleaner
Allow cookies may be necessary for websites Allow cookies may be necessary for websites that require logins.that require logins.
Advanced VPN TunnelsAdvanced VPN Tunnels VPN Tunnels are generally pay servicesVPN Tunnels are generally pay services They provide websites to your computer They provide websites to your computer
without additional advertising mess.without additional advertising mess. Websites display correctlyWebsites display correctly Data is more private and secureData is more private and secure Recommended for more experienced Recommended for more experienced
usersusers I use and recommend I use and recommend www.privacy.iowww.privacy.io
A VPN (Virtual Private Network) A VPN (Virtual Private Network) account allows access to the account allows access to the Net through secure encrypted Net through secure encrypted connection to VPN’s own connection to VPN’s own servers servers
1.1.First connect normally to the First connect normally to the internet internet
2. Connect a second time to our 2. Connect a second time to our VPN ServerVPN Server
How?How?VPN routes your traffic through VPN VPN routes your traffic through VPN servers via a secure encrypted tunnel servers via a secure encrypted tunnel (Virtual Private Network)(Virtual Private Network)
This allows you to bypass filtering This allows you to bypass filtering mechanisms in place by an ISP (as per mechanisms in place by an ISP (as per Senator Conroy’s planned filter) Senator Conroy’s planned filter) Whenever you visit a web site, send Whenever you visit a web site, send email, chat, FTP, make internet phone email, chat, FTP, make internet phone calls etc., your IP (internet protocol) calls etc., your IP (internet protocol) address is not shown – this means no one address is not shown – this means no one – including the government knows which – including the government knows which sites you are really visitingsites you are really visiting
Internet Service ProvidersInternet Service Providers
Internet Service Provides keep log files that Internet Service Provides keep log files that shows the times your IP address is used and shows the times your IP address is used and where you are connected to. where you are connected to. Some ISPs save these log files indefinitelySome ISPs save these log files indefinitelyISPs may give these files to authorities (eg. If ISPs may give these files to authorities (eg. If called on by a court order) called on by a court order) With VPN your ISP log shows only an encrypted With VPN your ISP log shows only an encrypted connection to a server – Senator Conroy will connection to a server – Senator Conroy will not know you are accessing your secure Yudu not know you are accessing your secure Yudu website for login to the website for login to the Peaceful Pill Peaceful Pill eHandbookeHandbookAll internet traffic directed via a VPN has the All internet traffic directed via a VPN has the same IP address – you can see the problem for same IP address – you can see the problem for Senator Conroy!Senator Conroy!
VPNs to Explore include:VPNs to Explore include:
• Banana VPN • Happy VPN • Liberty VPN • Black Logic • Steganos • Relakks
Virtual Private Networks are Virtual Private Networks are currently illegal in:currently illegal in:
CubaCubaIranIran
LibyaLibyaNorth KoreaNorth Korea
SudanSudanSyriaSyria
Will Australia be next?Will Australia be next?
For further InformationFor further Information
[email protected]@exitinternational.net