Internet filtering is good, it can be bad and sometimes it is real ugly. Read on to find out what you need to know, including how to bypass it. Internet filtering, yet another one of those techie buzzwords that sounds like a good thing, but do you really know what it is? Filtering, filters, are usually a good thing. Filters remove unwanted items from a larger matrix of what is wanted, leaving a cleaner, purer, version of what came before. The dictionary definition reads like this, to pass (liquid, gas, air, sound, light) through a device to remove unwanted material. Synonyms include sieve, strain, clarify, purify and refine so there really is no fault in thinking well of Internet filtering software, Internet filter routers and web filtering software is a good thing. The sad reality is quite the opposite. Internet filtering is one of the many ugly faces, unseen and largely unheard of, Internet censorship. Now, don’t get me wrong. There are lots, and I mean a lot, of very good and positive uses for web filtering software but those are not what I’m talking about. To be clear, good uses include parental controls of home Internet access, preventing children from Internet abuses, in libraries and schools and filtering content in the work place. I know, it isn’t great when your work prevents you from going on social media or buying tickets to that awesome concert but face it, you are at work and shouldn’t be doing that kind of stuff anyway. Bad uses of filtering software occurs when ISPs, censors or governments use them as part of an Internet blocking campaign. The difference between good and bad filtering, in many ways, is in the scope of what is being filtered and for who the filtering is being done. On a small scale, such as in the home or work environment, the use is intended for the protection of young minds and corporate assets be it time or devices. On the larger scale, when it comes to countries actively filtering content en masse, the practice becomes oppressive and malicious. There are three main categories of filtering techniques; host based, server-side and content filtering at the ISP level. Host based filtering is when a system administrator installs filtering software on the local network and its devices. This is the type most often used in the home and office settings. Server-side filtering is used by larger businesses and other organizations at the gateway level. This software enables filtering of traffic as it enters the local area network giving a more complete protection. Filtering at the ISP level is the top-level method and a service now being offered by many Internet Service Providers. This technology enables businesses to utilize third party filtering services, or for governments to have tight control over web access. Most if not all search engines in use by the average web surfer come with ready to use content filters installed. They can be set to filter content returned in search results but are easily bypassed, all you have to do is go directly to the website in question. Browser based filters are the easiest to deploy and offer the least amount of additional safety features. They are third party browser extensions downloaded from the web and operating directly on your devices. E-mail filters are used to monitor and control email traffic. The filters can be used to target both the origination location of the emails and the content within, specifically attachments and executable files. Client Side filters are those purchased from a vendor and then installed directly onto devices in need. Examples include home and office web nanny type software. Content limited ISPs, or filtered ISPs, offer only limited access to the Internet that can provide the most additional protection available by filtering. This is most often the type of control used by governmental agencies to restrict or censor access to the Internet. Network based filtering is applied at the transport or application layer and can be used in both an outgoing and incoming basis. Incoming traffic can be filtered to prevent harmful websites and malware from accessing the network, outgoing traffic can be monitored to prevent loss of data and intellectual property. A very comprehensive review of tools and technology for Internet filtering is outlined by Murdoch and Anderson (2008) and ranges from technical filtering to domain deregistration and denial-of- service attacks. In addition, they also briefly discuss surveillance and non-technical censorship methods. Murdoch and Anderson (2008) articulate the following Internet content filtering mechanisms: Internet filtering works in a number of ways, each company using its own proprietary method. That being said, the general way in which filtering works is like this. A filtering company such as Norton Online Family, NetNanny, Cyber Patrol or Parental Internet Filter will develop a system of categories that all websites will be judged against. The criteria could be things like trigger words in the content, IP addresses or other digital markers found on data packets streaming across the web. The category and ranking system is then used to build profiles like Children, Adult or Work. Profiles can come pre-installed with the software or be manually created by the system admin or parent. An added benefit for network administrators and parents is the ability to see what kind of traffic is being blocked and who has requested it. The information can then be used to discipline the employee or child in question. When it comes to purchasing a filter they are designed for specific uses such as Business, Library & School and Home/Office. Despite the many benefits of filtering there are times when the system fails. In some cases websites that have not yet been categorized or are too new to have been indexed will slip through. This is not usually a big problem but does offer the odd chance for a kid to some too much skin, or for an employee to waste a little too much time. Another time in which they fail is when content is miss-categorized and blocked without cause. Take for example a health article that might be mislabeled as pornography. This is a minor irritation only though, an administrator password is usually all it takes to bypass content restrictions. The legality and moral questions imposed by the use of content filters are being argued to this day. On the one hand, control of improper, erroneous and offensive content is something to be desired. On the other, any form of suppression, regardless the intended good, has repercussions that can affect the freedoms of people across the planet. The US Supreme Court, on more than one occasion, has ruled in favor of free speech and against government or public censorship of the web. At this point there are at least issues with Internet filtering technology, and they are not too closely related. The first has to do with using filter technology as a method of Internet Security, it’s not a great one. The second to do with the rampant use of filtering technology around the world, specifically when talking about countries that actively and heavily censor Internet use. The good news, believe it or not, is that bypassing these two issues is very, very easy. Even better, the solution for each is the solution for both, that is, their solution is one and the same: VPN. The unintended benefit is that a VPN will probably get you past a work or family imposed filter too, especially if it is installed on the gateway or firewall. VPN, virtual private network, is the most advanced form of Internet security available today and one that is underutilized by the average web surfer. As a technology, VPN has been around for more than 30 years. As a viable source of Internet security for the average consumer, only a few years. The technology is a blending of two security protocols, one coming from the private sector and the other from the very people who created the Internet, the US government. It was first intended as a means of safely connecting remote users to a home network but its application and deployment come with a host of unintended, and very useful, consequences. One of these is to bypass content filtering software on a variety of levels. The way it does this is the same way it provides security, by creating untraceable undetectable undecipherable connections. The short explanation is this: VPNs work from within enabled devices to encrypt and re-packet the data payloads, effectively hiding all identifying markers, and send them across the web using dedicated servers. The tunnels as they are called make it impossible for filter programs to detect your traffic much less ID it for censoring purposes. The security benefit is simple, if no one can detect your Internet connections then no one knows you’re on the Internet and if no one knows you’re on the Internet then they can’t target you for scams, fraud, data theft, hacking or malware. The bottom line, VPN fills in all the gaps left by antivirus software, firewalls and filters with the added bonus of completing your Internet security scheme. Le VPN is the leading provider of VPN technology for the retail market with solutions for individuals, small businesses and families. Their network of over 700 dedicated servers in 100+ locations support 3 protocols and any device or operating system. The need for VPN is clear, the choice is clear, why wait, get Le VPN before it’s too late. *Article updated on August 31st, 2018.* Save 70% on a 2-year plan NO LOGS 100+ LOCATIONS P2P ALLOWED Easy To Use 30-Day Money Back Friendly Support Bitcoin Accepted Ultra High SpeedsInternet Filtering For Dummies
Some Common Types of Internet Content Filtering Are:
Search Engine
Browser based
E-mail
Client Side
Content Limited ISPs
Network Based
Tools And Technology For Internet Filtering
How Internet Filtering Works
Bypassing Internet Filtering Technology
NEW SEASON, NEW SALE!
Written by Vuk Mujović @VukMujovic
Vuk Mujović is the founder of MacTíre Consulting, an analyst, data management expert, and a long-term writer on all things business & tech. He authored blogs, articles, and opinion pieces aimed to help both companies and individuals achieve growth without compromising their security. Vuk is a regular guest author to Le VPN Blog since January 2018, where he gives his expert opinion on the topics related to cybersecurity, privacy, online freedom, and personal data protection. He also often shares his tips and best practices in relation to internet security and digital safety of private individuals and small businesses, including some additional applications of using a VPN service.