Introducing the updated Proton. More services, one privacy mission. Learn more

Introducing the updated Proton. Learn more

What is internet censorship, and how does it work?

Posted on March 16th, 2022 by in Articles & News.

 

The internet was founded on the idea that it would be a free and open space for expression. Unfortunately, internet censorship is becoming more common worldwide. But while technology provides the tools for Internet censorship, it also offers ways to fight back. We explain what internet censorship is, how it works, and how to defeat it.

What is internet censorship?
Where does censorship happen?
What is censored?
Internet censorship examples from 2021
Internet censorship around the world
What countries have no internet censorship?
How does internet censorship work?
The best way to defeat censorship online

What is internet censorship?

Simply put, internet censorship is the control or suppression of what content can be published, communicated, or accessed on the internet. 

Where does censorship happen?

Censorship can be applied at any of several points when you are browsing the internet. Anytime you try to access a website, your internet traffic will be handled by your:

  • Device (e.g., your smartphone, your work laptop, etc.)
  • Local network (e.g., your home WiFi, your work WiFi, etc.)
  • Internet service provider (ISP)
  • Search engine of choice

This is not a complete list of all the places censorship can be applied, but it represents the most common examples enforced by governments.

How an internet connection works

Censors can place blocks on content at any one of these steps.

  • Blocks on your device: Software can be installed on a device that enforces blocks locally on your device. This can include parental controls, network security software, or malware.
  • Blocks on your local network: The person running your local network can implement blocks as well. You typically see these types of blocks on university or workplace WiFi networks.
  • Blocks at the ISP and national level: An ISP connects your device to the rest of the internet, meaning it has broad power to block specific websites or the entire internet. A government can force ISPs to carry out censorship for it, effectively blocking the censored content for everyone in that country. 
  • Blocks implemented by search engines: Since many people rely on search engines to find the content they are looking for, governments can also require these search engines to block certain queries or only return government-approved results.

What is censored?

This depends entirely on who is applying the censorship. You might apply child controls on your child’s phone to block pornography, your work WiFi might block torrenting services, and your national ISP might block access to foreign websites that are suspected of propaganda. 

Other common targets for censorship include news organizations, social media platforms, like Twitter and Facebook, or messaging services, like WhatsApp or Telegram, as they provide quick, efficient ways to spread information and organize.

This post focuses on the government censorship of the internet at the national/ISP level because it is the most impactful in terms of the number of people affected. 

Internet censorship examples from 2021

Censorship takes many different forms and can be implemented briefly or turned into a durable, lasting condition of the internet. Examples of the different types and levels of censorship from 2021 include:

  • China’s Great Firewall, which was established in the mid-2000s, blocks access to thousands of western websites. It has steadily been increasing its censorship, blocking all language versions of Wikipedia since 2019. The Chinese government also exercises tight control of its national internet to swiftly delete posts that are critical of Xi Jinping or the Chinese Communist Party. 
  • In January, in the run-up to national elections (a pretext many regimes use to censor the internet), the Ugandan government ordered the national internet provider to shut down internet access entirely throughout the country. Ugandans were without internet for a little over five days.
  • During mass protests in July, the Cuban government blocked access to several social media platforms, including Facebook, Instagram, WhatsApp, and Telegram, for two days. 

The last example is the most representative of most internet censorship. Building an entirely separate national internet is expensive and difficult to maintain, and shutting down a country’s internet entirely, even for a short time, can lead to massive economic losses. Comparatively speaking, it is easier to block news articles that are critical of the government and prevent people from organizing on social media technically and politically. Fortunately, these types of blocks can be defeated.

Internet censorship around the world 

According to Freedom House’s 2021 assessment of Freedom on the Net (FOTN), internet freedom has declined for the 11th straight year. 

This decline has been largely driven by governments’ abuse of problematic regulations that allow them to remove critical or unflattering content. This is expected from authoritarian countries like China, Iran, and Myanmar (which occupy the bottom three rankings in the FOTN report), but this type of online censorship is also becoming more common in democracies like India and Indonesia. 

What countries have no internet censorship?

According to the 2021 FOTN report, the four countries with the highest freedom scores are:

  • Iceland
  • Estonia
  • Canada
  • Costa Rica

While this doesn’t mean that these countries have no censorship, they all have strong records of protecting freedom of speech and expression on the internet and generally try to make the internet as accessible as possible.

How does internet censorship work?

Internet censorship is usually implemented through one of the following methods. We briefly explain how they work and how you can bypass them. 

Domain Name System (DNS) filtering and redirection

Your DNS queries are resolved by DNS servers operated by your ISP by default. This means your ISP can refuse to resolve requests for domains hosting censored content on their DNS servers, making the site non-accessible to browsers and causing them to return an incorrect IP address.

DNS query blocked

Internet Protocol (IP) address blocking

IP address blocking is a fairly simple way of censoring specific websites or platforms. First, the censor creates a list of the IP addresses or TCP/IP port numbers of all the websites to be blocked. Then, as browsers request to reach a website, the ISP will check each request against the list. If there is a match, the ISP will drop the connection. 

Any websites on the same shared hosting server will share the same IP address and also be blocked as collateral damage. IP address blocking is the most common way to geo-block copyrighted content, like music or movies. 

By blocking certain TCP/IP ports, censors can even block applications by their type of traffic. This is a common way to block VPNs.

DNS query blocked

Search engine blocks

Search engines have immense power to shape web traffic, which is why governments often threaten to block their service unless they agree to filter out objectionable content. Since this type of censorship relies on the cooperation of the search engine operator, it can only be enacted by national governments. Government censors will define what content is objectionable and must be removed from search results. Safe Search on Google is an example of a search filter, though its purpose is to block inappropriate material from children.

Deep packet inspection (DPI)

DPI is an advanced form of censorship used by certain states with strict internet controls. It works by inspecting the metadata of packets sent between servers to determine what type of traffic is being transferred. Authorities can then log, re-route, or block that traffic based on what they find. This is one of the few methods effective at blocking encrypted traffic. Sophisticated firewalls using DPI (such as the Great Firewall of China) can even detect and block VPN or Tor traffic.

The best way to defeat online censorship

Proton VPN is the best way to defeat the most popular types of online censorship. 

A VPN creates an encrypted tunnel between your device and the VPN server. Your internet traffic, including your DNS queries, is then routed through the VPN server and not traceable back to you. This prevents your ISP from seeing which websites you are trying to access and prevents it from applying any blocks. You can then connect to a server in another country (like the countries with high FOTN scores) where that content or service is not blocked. 

How a VPN works


This will let you defeat:

  • DNS filtering
  • IP address blocking
  • URL filtering
  • Search engine blocks

Try Proton VPN for free

Proton VPN is a better option than other VPNs because: 

  • We have developed advanced features that allow Proton VPN to bypass attempts to block or censor VPN services themselves.
  • We provide a free VPN with no logs, no ads, no data limits, and no speed limits.
  • We are based in Switzerland and subject to strong Swiss data privacy laws.
  • We are a transparent, trustworthy VPN service run by the creators of Proton Mail, the world’s largest encrypted email service.

Learn why Proton VPN is the best option to defeat censorship

Other solutions to censorship

If you know you are facing DNS filtering, you can simply switch who handles your DNS queries. Quad9 is a popular DNS provider that can help you bypass blocks. While you will need to reconfigure your operating system to use a new DNS provider, Quad9 offers a thorough setup guide.

To defeat advanced censorship, you can turn to the open-source software Tor. The Tor browser encrypts your internet connection and routes it through different Tor servers (called nodes) on the Tor anonymity network. The website will only see the IP address of the last Tor server pinged and not the IP address of your device. Tor can be slow and cumbersome to work with, but it remains an excellent option for anyone trying to access censored sites or anonymize their web activity.

How Tor works

If even Tor fails because your ISP is blocking access to known Tor nodes, you can use a Tor bridge with a pluggable transport. A Tor bridge is a Tor node that is not listed in the main Tor directory. Since bridges are unknown, an ISP cannot block their IP addresses. However, if a government used DPI, it would be able to find the Tor bridge. To prevent this, you can add a pluggable transport to your connection. A pluggable transport transforms your Tor traffic into something more innocent or random looking, like regular HTTPS traffic. 

Learn how to use Tor bridges and pluggable transports 

Tools like Proton VPN and Tor play an important role in keeping the internet free and open and help you stay one step ahead of those that would deny you access to information. As the poet Yevgeny Yevtushenko said, “When truth is replaced by silence, the silence is a lie.” We hope you use these tools to fight through the silence and find the truth.

Prior to joining Proton, Richie spent several years working on tech solutions in the developing world. He joined the Proton team to advance the rights of online privacy and freedom.

Secure
your internet

Get Proton VPN
Get Proton VPN

For customer support inquiries, please submit the following form for the fastest response:
Support Form

For all other inquiries:
contact@protonvpn.com


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: OpenPGP.js v4.10.10
Comment: https://openpgpjs.org

xsBNBFiYeeIBCACpwuYcTsACyjQaqY3tOUonokamGZf3VDuLvcA9nQnu4vlB
n1RFFUJa5Pmf2yZ9EjJFSldTl5lreE3tFf53CcZ9wKa1R6aMnN/0VqURJho0
ZTqevQlCvuJ9kKHkDck3Em0/1WWnhDJgabp+fOa5HAHoAvcNy5gVPuexTT/N
wp6QcfB7w+qFhf73s0bcSn5RC+FAYlQxZVFhFtA7/7LthBVatDJrYLYP9XJd
zOZqz9AX0XZwKal25RcVeGHkNKgloo0bTgro4D88MR7saqXFHTRhy3+Wss7c
uqrh0uIkVmqtadoK/rAbqOyFXQ2DlvSMVrEMLUvwlZbC0taqcKDfNA+FABEB
AAHNLWNvbnRhY3RAcHJvdG9udnBuLmNvbSA8Y29udGFjdEBwcm90b252cG4u
Y29tPsLAfwQQAQgAKQUCWJh54wYLCQcIAwIJEN4dfnhhw11TBBUIAgoDFgIB
AhkBAhsDAh4BAAoJEN4dfnhhw11T6PwIAKgIHTUaEcCFQ5WfmwGpdhRgFe7H
gnHR8UOFPrRKnbCOQgTVPGwCFt8UVFhEgbmtroThU89DpxFSYUOD6nZ2k1X3
X4Q9OsItFUUuhPtLJrkz5ghtZLmsAH/edTRbVU1Ew1E8KbylLFI1J5yId7zR
GdnaTXv/E7P3po5X/b08TFAhXSyYYUbMeQuthbJajtpFygr53lm47cOWa4N8
udqLhmpheaQj04DuqYXOGC08JQn+XbHzhFl5Yvlt9Idk8+7c2UJ0qgWKQ5ZV
mquRAw5HDCQM5OqF1MoImDxOH+tK3PUlvFDsLZ1WPEOHK/EN12sPBx0x1R04
fcPTPdbMwgISGM3OwE0EWJh54gEIALqhrLUpvarPc0nkuHpyJC/MsrIDPLuV
qMc49tgjgDBsyIKJFEP9qCnkSOEixaFi+nTljUSpkHGR+PvEGecmcOdW6djN
QGxon/nwBT9d8HbtxJesaEIzwRAxmqQW9MqNq4UsfNQ0VvUYqV9wEbYfdDT/
jZfz9N0hjFELF1sg3UPcCRijhf162bp+rLQdO9vWVUbOdMQvsM/kyUJ6JMXR
xUtyKC05ddxii2SMr4XUW45ostPbxJybOF5oSZpEb1EIlrTLLPAe/498XlBW
hpRAPe+9ZfNs7drMvUEFnnOXahrXAuaaZpyaS/XBaloqSb1+v2AkUep3dbSF
PaRtbXRMS+kAEQEAAcLAaAQYAQgAEwUCWJh54wkQ3h1+eGHDXVMCGwwACgkQ
3h1+eGHDXVMZ4Qf4hu5N8/uYNDqJMFRIWSCpPGxmyIVXGARG4hgR8gwPZY9K
fReAUndX3uODBNIgZU7I3YntawU1DlP6GpP6yyR/8lfUMNCAXPDmd+zTFYIJ
UDHD8sw2GRrFVzFOKUpAapWFOI4XjSMP2UiK4HgrpUjAhe1wSaa7nEjtAuYT
zFx1QSuQD1iYcOF/FAm7EuhBIfWITjYAobGM6gonPbp3IPHM52rUbulllcdV
vCLs+blcyiVCGZlNcmlg3eibAJJL19TQLqT2DbQvQ/SyVBJGjoT+y4TTRtmZ
cebEjt2KJcc4x2lzPq3z2KJNyJTOTMB+aYD9Ma9IObDds+M/+5XDWi7f
=ueTT
-----END PGP PUBLIC KEY BLOCK-----

You can also Tweet to us:
@ProtonVPN