References  What is internet censorship? Amnesty Intl., March 2008.  Iran hackers use fake Facebook profiles to spy on US and Britain. The Telegraph, May 2014.  Dingledine, R. https://blog.torproject.org/blog/researchproblems-ten-ways-discover-tor-bridges, 2011.  Dingledine, R., and Mathewson, N. Design of a blocking-resistant anonymity system.  Dingledine, R., Mathewson, N., and Syverson, P. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (Berkeley, CA, USA, 2004), SSYM’04
References  Collateral freedom: A snapshot of chinese internet users circumventing censorship, https://openitp.org/newsevents/collateral-freedom-a-snapshot-of-chinese-userscircumventing-censorship.html.  Email statistics report 2014-2018, http://www.radicati.com/wp/wp-content/uploads/2014/01/email-statisticsreport-2014-2018-executive-summary.pdf.  Enron dataset, https://www.cs.cmu.edu/./enron/.  Google approves an app that steals all your data, http://www.technologyreview.com/.  Openssl, https://www.openssl.org/.  L. V. Ahn, M. Blum, N. J
] HackingTeam. Wikipedia, https://en.wikipedia.org/wiki/Hacking_Team .  Doug Madory. Iran Leaks Censorship via BGP Hijacks. https://dyn.com/blog/iran-leaks-censorship-via-bgphijacks/ , 2017.  Paul Pearce, Ben Jones, Frank Li, Roya Ensafi, Nick Feamster, Nick Weaver, and Vern Paxson. Global measurement of dns manipulation. In Proceedings of the 26th USENIX Security Symposium , 2017.  John Holowczak and Amir Houmansadr. CacheBrowser: Bypassing Chinese Censorship Without Proxies Using Cached Content. In Proceedings of the ACM Conference on Computer and
References  C. Bocovich and I. Goldberg, “Slitheen: Perfectly imitated decoy routing through traffic replacement,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security , Vienna, Austria, 2016, pp. 1702–1714.  C. Brubaker, A. Houmansadr, and V. Shmatikov, “Cloudtransport: Using cloud storage for censorship-resistant networking,” in Privacy Enhancing Technologies , ser. Lecture Notes in Computer Science, E. De Cristofaro and S. Murdoch, Eds. Springer International Publishing, 2014, vol. 8555, pp. 1–20.  A. Chaabane, T
://bridges.torproject.org/ .  C. Brubaker, A. Houmansadr, and V. Shmatikov. Cloud-Transport: Using cloud storage for censorship-resistant networking. In Proceedings of the 14th Privacy Enhancing Technologies Symposium (PETS) , July 2014. http://www.cs.utexas.edu/~amir/papers/CloudTransport.pdf .  S. Burnett, N. Feamster, and S. Vempala. Chipping away at censorship firewalls with user-generated content. In USENIX Security Symposium , Washington, DC, USA, Aug. 2010. USENIX. https://www.usenix.org/event/sec10/tech/full_papers/Burnett.pdf .  CloudFlare. https
General Franco’s censorship apparatus was quick to pounce on the intellectual dissent in the essays written by Maria Aurèlia Capmany from 1968 to 1978. Based on censorship records, this article analyses the ideological way that those in charge of issuing the reports read her essays. The essays that suffered the most in the hands of the censors were La joventut és una nova classe? (1969), Pedra de toc (1970), El feminismo ibérico (1970) and El feminisme a Catalunya (1973).
References  The CAIDA UCSD Statistical information for the CAIDA Anonymized Internet Traces. http://www.caida.org/data/passive/passive_trace_statistics.xml, 2016. Accessed 22- February-2017.  Simurgh Aryan, Homa Aryan, and J. Alex Halderman. Internet censorship in Iran: A first look. In 3rd USENIX Work- shop on Free and Open Communications on the Internet (FOCI), 2013.  Diogo Barradas, Nuno Santos, and Luís Rodrigues. DeltaShaper: Enabling unobservable censorship-resistant TCP tunneling over videoconferencing streams. Privacy Enhancing Technologies, 2017
, C. M. Swanson, and I. Goldberg, “Slipping Past the Cordon: A Systematization of Internet Censorship Resistance.” CACR Tech Report 2015-10, Aug. 2015.  S. Khattak, L. Simon, and S. J. Murdoch, “Systemization of Pluggable Transports for Censorship Resistance.” http://arxiv.org/pdf/1412.7448v1.pdf, 2014.  M. C. Tschantz, S. Afroz, D. Fifield, and V. Paxson, “SoK: Towards Grounding Censorship Circumvention in Empiricism,” in Proceedings of the IEEE Symposium on Security and Privacy, 2016.  R. Clayton, “Failures in a Hybrid Content Blocking System,” in Privacy
The present study treats a very little researched subject in the specialized literature, respectively the censorship of the orthodox press in communism. We turned our attention to the periodical publication “Glasul Bisericii”, the official magazine of the Metropolitan Church of Ungrovlahia. During the communist regime, the religious press was doubly censored. This was exercised by two institutions, namely: the Department of Cults and the General Directorate of Press and Printing. The censors of the Department of Cults who dealt with the journals of religious cults did not necessarily have theological studies, for which reason they could not understand certain specialized terms or phrases. This thing can be seen into the report signed by the censor Ecaterina Durosov Macheev, from 1971. Another example would be the typing mystakes that escaped from the watchful eye of censorship, and that could have affected the relations between Romanian Orthodox Church and Russian Orthodox Church and, implicitly, with the Soviet Union.
.2. https://tools.ietf.org/html/rfc5246 .  A postol , K. Internet censorship in the arab spring.  B ocovich , C., and G oldberg , I. Slitheen: Perfectly Imitated Decoy Routing Through Traffic Replacement. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (New York, NY, USA, 2016), CCS ’16, ACM, pp. 1702–1714.  B ocovich , C., and G oldberg , I. Secure asymmetry and deployability for decoy routing systems. Proceedings on Privacy Enhancing Technologies 2018 , 3 (2018), 43–62.  B urnett , S., F eamster , N., and