Thursday, June 25, 2009

How to protect iran protesters from identetification by web publications?

To open a server as often as possible, is a bad idea, because this will also occupy a huge amount of traffic on the Internet. Its important to download as slow as possible to avoid badwith wasting.

In operating system there are limitation how much transaction can be done at one time. If this limit is reached, all other connects must be wait, until one transfer is ready.

I suggest to use linux to download the the entire web page to your hard disk. You install for example kunbuntu on your computer. Log in, and open a terminal window. You get:

yourname@yourcomputer:~>

now type

yourname@yourcomputer:~> mkdir websites

yourname@yourcomputer:~> cd websites

yourname@yourcomputer:~> wget -k -K -E -R wmv --limit-rate 1 -U "Mozilla/5.0 (en-US; rv:1.9.0.11) Firefox/3.0.11" -r http://www.gerdab.ir/home.php

This will download the entire(!) web page to your computer with the famous speed of one byte per second. This command will run until next regular elections in Iran. If the limit of concurrent users are reaches, the entire side is dead without any malfunction every were else. Nobody says, that you must download some content fast!

To make it harder to defend the server, you may change the application identification to something else you know as valid browser.

How Webmaster can wipe out censorship from the face of the earth!

It is actually quite simple, to eliminate the scourge of censorship from the face of the earth. Only enough important Webmaster with useful or essential services must Participate. I think about search engines, banks, auction houses, dealers, ...


  • Provide your web site at https, if that was not the case.

  • Build your website in such a way, that important functions are running on the https. This means, when someone blocked the port 443 it has no longer make sense to work. This can be for example the login like in Ebay, the query function like in Google or the search and purchase like in Amazon.

  • Set up a TOR client.

  • Configure your https server so that is https://www.yourbuisness.com/http://www.sometarget.com the content of http://www.sometarget.com from the Tor network.



From the point of view of a dictator this is no longer distinguishable from one access to the website https://www.yourbuisness.com. Because of the usage of the TOR network any attempt to punish access of prohibited websites is impossible. Only if something is prohibited in any country where TOR servers are on the track, you can follow the trace of the user. Correlation analysis can not work! The Dictator only has the choice to block access to https://www.yourbuisness.com. or to endure the hole. If enough big Websites do this by her own decision or president Obama creates a law to do this on big websites, and censorship will wipe out in Iran, China and everywhere where Internet exists!

The only remaining method of censorship would be the type of Dictators Pol Pot and Kim Jong-Ils. Only the economic disadvantages are so huge that on a permanent basis will not work, because in the future, the support for each product will come over the Internet.