2010 Circumvention Tool Usage Report
MetadataShow full item record
CitationHal Roberts, Ethan Zuckerman, Jillian York, Robert Faris, John Palfrey, 2010 Circumvention Tool Usage Report (2010).
AbstractCircumvention tools allow users to bypass Internet filtering to access content otherwise blocked by governments, workplaces, schools, or even the blocked sites themselves. There are a number of different types of these tools: blocking-resistant tools, simple web proxies, virtual private network (VPN) services, and open HTTP/SOCKS proxies. But every type of circumvention tool provides the same basic functionality — proxying user connections to provide access to otherwise blocked sites. In the following report, we use a variety of methods to evaluate the usage of the first three of these four types of tools to test two hypotheses. First, even though much of the media attention on circumvention tools has been given to a handful of tools — notably Freegate, Ultrasurf, Tor, and Hotspot Shield — we find that these tools represent only a small portion of overall circumvention usage and that the attention paid to these tools has been disproportionate to their usage, especially when compared to the more widely used simple web proxies. Second, even when including the more widely-used simple web proxies, we find that overall usage of circumvention tools is still very small in proportion to the number of Internet users in countries with substantial national Internet filtering.
Citable link to this pagehttp://nrs.harvard.edu/urn-3:HUL.InstRepos:5366727
- HLS Scholarly Articles