新破墙软件 Psiphon

26 views
Skip to first unread message

Shi Songhua

unread,
Nov 29, 2006, 2:51:49 AM11/29/06
to fa...@googlegroups.com
又一个新软件,十二月一号发布

http://psiphon.civisec.org/faq1.html

What is psiphon?

psiphon is a censorship circumvention solution that allows users to access blocked sites in countries where the Internet is censored. psiphon turns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere

When will psiphon be released?

psiphon software will be released on December 1st, 2006, with subsequent releases to be provided as new features are added over time.

Who will use psiphon?

psiphon operates through networks of trust. There are psiphon providers who install and administer a psiphon server (psiphonode) in an uncensored country, and psiphon users (psiphonites) who login and access the server from a country that censors the Internet.

What are psiphonodes, psiphonode administrators and psiphonites??

A psiphonode is a psiphon server that is operated by an administrator residing in an uncensored country (this is an integration of 'psiphon' and 'Node'). The psiphonode administrator is responsible for creating and managing user accounts and running the psiphon server. A psiphonite is a psiphon user, residing within a jurisdiction that blocks arbitrary web sites, and utilizes a psiphonode residing in an uncensored jurisdiction.

How does psiphon work?

psiphon acts as a "web proxy" for authenticated psiphonites, retrieving requested web pages and displaying them in a user's browser. psiphon uses a secure, encrypted connection to receive web requests from the psiphonite to the psiphonode who then transports the results back to the psiphonite. There is no connection between the psiphonite and the requested website, as psiphon transparently proxies the request through the psiphonode's computer allowing the psiphonite to browse blocked websites seamlessly.

How do psiphonites connect to psiphon?

psiphonites go to their psiphonodes' machine using a unique web address. The first page displayed is the user login. The psiphonite must login with a valid username and password, given to them by the psiphonode administrator. After authentication, the psiphon server displays a toolbar at the top of the page where the psiphonite can then enter a website to browse. When using psiphon, the psiphonite does not have to install any software or change any browser settings.

What do you mean, "the user does not have to install any software"?

After a successful login to the psiphon server, the user enters the website address they would like to visit, and psiphon takes care of the rest. With a regular Internet browser, the psiphonite simply logs in and requests and views the website entered in the psiphon toolbar. No software is installed on the end user's machine.

How do users find out about psiphon and how is psiphon distributed?

Anyone who wants to become a psiphon provider and is located in an uncensored country will be able to download the psiphon software from the psiphon website. After installation, the psiphonode administrator sends a unique web address to people in need that he or she personally knows and trusts in censored countries.

Even if the psiphon website is blocked it does not affect psiphon's distribution model. psiphon is completely decentralized; each psiphonode is independent of all others. The distribution of access to personal psiphon servers is based on social networks. Each psiphonode administrator grows his/her private network based on social relations of trust.

What is a social network?

A social network is a structure of nodes - usually individuals or organizations - that have ties between them, such as families or groups of friends or colleagues. psiphon leverages social networks as the discovery mechanism. The psiphonode administrator and the psiphonite(s) have a trust relationship and the web address is known only to these trusted people. Each network of psiphonode/psiphonites chooses how to grow the network. It can be small and extremely private or large and relatively semi-private. It depends on the specific context and needs of the psiphonites.

Can psiphon be blocked?

With publicly accessible circumvention systems one must assume that the censors can also discover and subsequently block access to these systems. The difference with psiphon - a personal system - is that the web address is only sent to a few, trusted, people. In that way, the censors cannot easily find and block the location of the psiphon server.

What happens when the psiphon provider's computer is turned off?

When a psiphon provider's computer is down or off the psiphon users will no longer have access to psiphon. psiphon users will need to wait until the psiphon provider's computer is back up and running again.

psiphon will inform psiphon providers if their network information changes (e.g. after rebooting the computer). When network information changes, psiphon providers will need to supply their psiphon users with the new psiphon web-address.

Note for advanced users: Future releases of psiphon will contain functionality that allows for optional redundancy. In the same way that psiphon providers and users extend their network based on social relations of trust, psiphon providers in a social network can arrange peering agreements to act as a backup psiphon server for each other's users.

Is psiphon anonymous?

psiphon is not an anonymous software program. psiphon users are not anonymous from the psiphon provider. Although traffic between the psiphon user and psiphon provider is encrypted, psiphon providers can potentially monitor everything that is done by the psiphon users they host.

Note: Do not use psiphon for anything you do not want the psiphon provider to be able to see.

When psiphon users visit websites through the psiphon server their identity and location is hidden from the web-site.

Note for advanced users: To maximize protection against the discovery of the psiphon user's true IP address, all scripting languages, such as JavaScript and ActiveX, should be turned off in the user's browser.

Can a psiphon user be monitored by their government or Internet Service Provider (ISP)?

Yes, your government and/or ISP can always monitor which web sites you visit.

When you use psiphon, your government and/or ISP can only see that you connected to another computer, not the sites you visit. psiphon makes it difficult for anyone to determine that you are using psiphon

Am I safe using psiphon?

psiphon encryption provides strong protection against electronic eavesdropping. However, there is a known attack that attempts to trick users into accepting a forged certificate (see 'Man-in-the-middle attack' below). If psiphonites follow instructions provided, regarding certificate fingerprint validation, this attack can be averted.

Secondly, using an encrypted connection to a home computer in another country may indicate to a government that a censored-bypassing system is being used.

Note: Bypassing censorship may violate law. Serious thought should be given to the risks involved and potential consequences.

What languages will psiphon be in?

Having multi-lingual interfaces for psiphon is a priority. The intention is for psiphon to be available in as many languages as possible. More information will be provided closer to psiphon's release date.

What operating systems will psiphon work on?

Windows, Linux (Mac conversion still underway)

How much does psiphon cost?

psiphon is free.

Is psiphon open source?

Yes. psiphon will be released under GPL open source license.

Can I access my email with psiphon?

psiphon is designed to provide safe, secure web browsing for users in censored countries. Most webmail can be accessed through psiphon.

Can I use instant messenger/chat, VOIP, Skype with psiphon?

No. psiphon is intended for Internet website browsing only. But, most web-based tools and services are available through psiphon.

Can I edit my blog with psiphon?

psiphon is intended for Internet website browsing only. Most Web-based tool and services are available through psiphon. Therefore psiphon can be used to edit most blogs.

When does beta testing begin?

Beta testing to the public will begin in the summer of 2006.

For advanced users:

Can my use of psiphon be detected?

From a technical perspective traffic between the psiphonode and the psiphonite is identical to normal HTTPS (encrypted) traffic. Although many sites only use HTTPS during the login process many sites, such as email providers and banking services, use HTTPS for extended periods of time, as does psiphon. The differences are that psiphon uses self-signed certificates and connections to home computers, rather than signed certificates and domain names. However, unless the attacker has the private psiphon URL it cannot be easily determined that psiphon is being used.

The key to detecting psiphon is infiltration of the psiphon administrator's social network.

Is psiphon susceptible to a Man-In-The-Middle-Attack (MITM)?

While a MITM attack can be attempted against any specific HTTPS connection, manual key fingerprint identification is integral to the proper use of psiphon. Anytime a psiphon URL is sent to a user the certificate fingerprint is also included. The psiphon user only needs to verify the fingerprint one time.

The key to a MITM attack is to trick the user into accepting a fake certificate. If the user properly verifies the certificate fingerprint on the first connection to psiphon the MITM attack can be defended.

What options are available for advanced users (customization)?

A psiphonode administrator will be able to customize the port number that the server runs on as well as the content that appears at the "index" page. An HTTPS connection can actually run on any port number although 443 is the default. Some ISPs block particular ports and some users may choose to run psiphon on a non-standard port.

The "index" page is the page that appears when one connects directly to the server's root path - not the psiphon URL. An attacker monitoring a users connection, at an ISP for example, can directly connect to any IP addresses that the user connects to in order to see what content is there. Each psiphon URL has a unique file path, which is encrypted so this attacker cannot connect to the psiphon login page, only to the IP address. If the provider modifies the "index" page the attacker will see completely innocuous content if they connect to psiphon.

Who is behind psiphon?

psiphon is part of the CiviSec Project run by the Citizen Lab at the Munk Centre for International Studies at the University of Toronto. The CiviSec Project is funded by the Open Society Institute.

The Director of the Citizen Lab is Prof. Ronald J. Deibert.

The graphic design for psiphon is produced by Agent 5 Design.


CCP的防火墙以后终会成为浪费纳税人金钱废物...

Bloodeyes

unread,
Nov 29, 2006, 3:23:01 AM11/29/06
to GFans

彩虹,以前就知道了

期待


On Nov 29, 3:51 pm, "Shi Songhua" <shisong...@gmail.com> wrote:
> ***又一个新软件,十二月一号发布
>
> **http://psiphon.civisec.org/faq1.html
> ****
> What is psiphon?*


>
> psiphon is a censorship circumvention solution that allows users to access
> blocked sites in countries where the Internet is censored. psiphon turns a
> regular home computer into a personal, encrypted server capable of
> retrieving and displaying web pages anywhere
>

> *When will psiphon be released?*


>
> psiphon software will be released on December 1st, 2006, with subsequent
> releases to be provided as new features are added over time.
>

> *Who will use psiphon?*


>
> psiphon operates through networks of trust. There are psiphon providers who
> install and administer a psiphon server (psiphonode) in an uncensored
> country, and psiphon users (psiphonites) who login and access the server
> from a country that censors the Internet.
>

> *What are psiphonodes, psiphonode administrators and psiphonites??*


>
> A psiphonode is a psiphon server that is operated by an administrator
> residing in an uncensored country (this is an integration of 'psiphon' and
> 'Node'). The psiphonode administrator is responsible for creating and
> managing user accounts and running the psiphon server. A psiphonite is a
> psiphon user, residing within a jurisdiction that blocks arbitrary web
> sites, and utilizes a psiphonode residing in an uncensored jurisdiction.
>

> *How does psiphon work?*


>
> psiphon acts as a "web proxy" for authenticated psiphonites, retrieving
> requested web pages and displaying them in a user's browser. psiphon uses a
> secure, encrypted connection to receive web requests from the psiphonite to
> the psiphonode who then transports the results back to the psiphonite. There
> is no connection between the psiphonite and the requested website, as
> psiphon transparently proxies the request through the psiphonode's computer
> allowing the psiphonite to browse blocked websites seamlessly.
>

> *How do psiphonites connect to psiphon?*


>
> psiphonites go to their psiphonodes' machine using a unique web address. The
> first page displayed is the user login. The psiphonite must login with a
> valid username and password, given to them by the psiphonode administrator.
> After authentication, the psiphon server displays a toolbar at the top of
> the page where the psiphonite can then enter a website to browse. When using
> psiphon, the psiphonite does not have to install any software or change any
> browser settings.
>

> *What do you mean, "the user does not have to install any software"?*


>
> After a successful login to the psiphon server, the user enters the website
> address they would like to visit, and psiphon takes care of the rest. With a
> regular Internet browser, the psiphonite simply logs in and requests and
> views the website entered in the psiphon toolbar. No software is installed
> on the end user's machine.
>

> *How do users find out about psiphon and how is psiphon distributed?*


>
> Anyone who wants to become a psiphon provider and is located in an
> uncensored country will be able to download the psiphon software from the
> psiphon website. After installation, the psiphonode administrator sends a
> unique web address to people in need that he or she personally knows and
> trusts in censored countries.
>
> Even if the psiphon website is blocked it does not affect psiphon's
> distribution model. psiphon is completely decentralized; each psiphonode is
> independent of all others. The distribution of access to personal psiphon
> servers is based on social networks. Each psiphonode administrator grows
> his/her private network based on social relations of trust.
>

> *What is a social network?*


>
> A social network is a structure of nodes - usually individuals or
> organizations - that have ties between them, such as families or groups of
> friends or colleagues. psiphon leverages social networks as the discovery
> mechanism. The psiphonode administrator and the psiphonite(s) have a trust
> relationship and the web address is known only to these trusted people. Each
> network of psiphonode/psiphonites chooses how to grow the network. It can be
> small and extremely private or large and relatively semi-private. It depends
> on the specific context and needs of the psiphonites.
>

> *Can psiphon be blocked?*


>
> With publicly accessible circumvention systems one must assume that the
> censors can also discover and subsequently block access to these systems.
> The difference with psiphon - a personal system - is that the web address is
> only sent to a few, trusted, people. In that way, the censors cannot easily
> find and block the location of the psiphon server.
>

> *What happens when the psiphon provider's computer is turned off?*


>
> When a psiphon provider's computer is down or off the psiphon users will no
> longer have access to psiphon. psiphon users will need to wait until the
> psiphon provider's computer is back up and running again.
>
> psiphon will inform psiphon providers if their network information changes (
> e.g. after rebooting the computer). When network information changes,
> psiphon providers will need to supply their psiphon users with the new
> psiphon web-address.
>

> *Note for advanced users: Future releases of psiphon will contain


> functionality that allows for optional redundancy. In the same way that
> psiphon providers and users extend their network based on social relations
> of trust, psiphon providers in a social network can arrange peering

> agreements to act as a backup psiphon server for each other's users.*
>
> *Is psiphon anonymous?*


>
> psiphon is not an anonymous software program. psiphon users are not
> anonymous from the psiphon provider. Although traffic between the psiphon
> user and psiphon provider is encrypted, psiphon providers can potentially
> monitor everything that is done by the psiphon users they host.
>

> *Note: Do not use psiphon for anything you do not want the psiphon provider
> to be able to see.*


>
> When psiphon users visit websites through the psiphon server their identity
> and location is hidden from the web-site.
>

> *Note for advanced users: To maximize protection against the discovery of


> the psiphon user's true IP address, all scripting languages, such as

> JavaScript and ActiveX, should be turned off in the user's browser.*
>
> *Can a psiphon user be monitored by their government or Internet Service
> Provider (ISP)?*


>
> Yes, your government and/or ISP can always monitor which web sites you
> visit.
>
> When you use psiphon, your government and/or ISP can only see that you
> connected to another computer, not the sites you visit. psiphon makes it
> difficult for anyone to determine that you are using psiphon
>

> *Am I safe using psiphon?*


>
> psiphon encryption provides strong protection against electronic
> eavesdropping. However, there is a known attack that attempts to trick users
> into accepting a forged certificate (see 'Man-in-the-middle attack' below).
> If psiphonites follow instructions provided, regarding certificate
> fingerprint validation, this attack can be averted.
>
> Secondly, using an encrypted connection to a home computer in another
> country may indicate to a government that a censored-bypassing system is
> being used.
>

> *Note: Bypassing censorship may violate law. Serious thought should be given
> to the risks involved and potential consequences.*
>
> *What languages will psiphon be in?*


>
> Having multi-lingual interfaces for psiphon is a priority. The intention is
> for psiphon to be available in as many languages as possible. More
> information will be provided closer to psiphon's release date.
>

> *What operating systems will psiphon work on?*


>
> Windows, Linux (Mac conversion still underway)
>

> *How much does psiphon cost?*
>
> psiphon is free.
>
> *Is psiphon open source?*


>
> Yes. psiphon will be released under GPL open source license.
>

> *Can I access my email with psiphon?*


>
> psiphon is designed to provide safe, secure web browsing for users in
> censored countries. Most webmail can be accessed through psiphon.
>

> *Can I use instant messenger/chat, VOIP, Skype with psiphon?*


>
> No. psiphon is intended for Internet website browsing only. But, most
> web-based tools and services are available through psiphon.
>

> *Can I edit my blog with psiphon?*


>
> psiphon is intended for Internet website browsing only. Most Web-based tool
> and services are available through psiphon. Therefore psiphon can be used to
> edit most blogs.
>

> *When does beta testing begin?*


>
> Beta testing to the public will begin in the summer of 2006.
>

> *For advanced users:*
>
> *Can my use of psiphon be detected?*


>
> From a technical perspective traffic between the psiphonode and the
> psiphonite is identical to normal HTTPS (encrypted) traffic. Although many
> sites only use HTTPS during the login process many sites, such as email
> providers and banking services, use HTTPS for extended periods of time, as
> does psiphon. The differences are that psiphon uses self-signed certificates
> and connections to home computers, rather than signed certificates and
> domain names. However, unless the attacker has the private psiphon URL it
> cannot be easily determined that psiphon is being used.
>
> The key to detecting psiphon is infiltration of the psiphon administrator's
> social network.
>

> *Is psiphon susceptible to a Man-In-The-Middle-Attack (MITM)?*


>
> While a MITM attack can be attempted against any specific HTTPS connection,
> manual key fingerprint identification is integral to the proper use of
> psiphon. Anytime a psiphon URL is sent to a user the certificate fingerprint
> is also included. The psiphon user only needs to verify the fingerprint one
> time.
>
> The key to a MITM attack is to trick the user into accepting a fake
> certificate. If the user properly verifies the certificate fingerprint on
> the first connection to psiphon the MITM attack can be defended.
>

> *What options are available for advanced users (customization)?*


>
> A psiphonode administrator will be able to customize the port number that
> the server runs on as well as the content that appears at the "index" page.
> An HTTPS connection can actually run on any port number although 443 is the
> default. Some ISPs block particular ports and some users may choose to run
> psiphon on a non-standard port.
>
> The "index" page is the page that appears when one connects directly to the
> server's root path - not the psiphon URL. An attacker monitoring a users
> connection, at an ISP for example, can directly connect to any IP addresses
> that the user connects to in order to see what content is there. Each
> psiphon URL has a unique file path, which is encrypted so this attacker
> cannot connect to the psiphon login page, only to the IP address. If the
> provider modifies the "index" page the attacker will see completely
> innocuous content if they connect to psiphon.
>

> *Who is behind psiphon?*


>
> psiphon is part of the CiviSec Project run by the Citizen Lab at the Munk
> Centre for International Studies at the University of Toronto. The CiviSec
> Project is funded by the Open Society Institute.
>
> The Director of the Citizen Lab is Prof. Ronald J. Deibert.
>
> The graphic design for psiphon is produced by Agent 5 Design.
>

> *CCP的防火墙以后终会成为浪费纳税人金钱废物... *

romantic.stone

unread,
Nov 29, 2006, 3:28:30 AM11/29/06
to fa...@googlegroups.com
工作原理是什么呀~

On 11/29/06, Bloodeyes <suil....@gmail.com> wrote:


彩虹,以前就知道了

期待


On Nov 29, 3:51 pm, "Shi Songhua" <shisong...@gmail.com> wrote:
> ***又一个新软件,十二月一号发布
>



--
I'm a stone. blog: http://freetree.bak.cn    http://cscom.bokee.com

小蘋

unread,
Nov 29, 2006, 5:55:32 AM11/29/06
to fa...@googlegroups.com
希望速度能比TOR快点.


--
小蘋
--------------------------------------------------------------------
光照在黑暗里,黑暗却不理解光.

予豈好辯,予無奈也.
http://groups.google.com/group/neocromancer
约伯的天平

Fwolf

unread,
Nov 29, 2006, 6:35:51 AM11/29/06
to fa...@googlegroups.com
是啊,tor太慢了。

On Wed, Nov 29, 2006 at 06:55:32PM +0800, 小蘋 wrote:
> 希望速度能比TOR快点.
>

--
http://www.fwolf.com/

Fred

unread,
Nov 29, 2006, 6:55:54 AM11/29/06
to GFans
要到12月1号才会有的,还要等的

gl.w

unread,
Nov 29, 2006, 7:37:47 AM11/29/06
to fa...@googlegroups.com
还没发布的阿.....???/= =

在06-11-29,Fred <McF...@gmail.com> 写道:
要到12月1号才会有的,还要等的

conan

unread,
Nov 29, 2006, 6:57:07 AM11/29/06
to fa...@googlegroups.com
CCP的防火墙以后终会成为浪费纳税人金钱废物...
别这么说。。。
还是能挡住不少低级网民的
 

gl.w

unread,
Nov 29, 2006, 9:11:15 AM11/29/06
to fa...@googlegroups.com
就是那些一上网只会开网游和QQ的人

在06-11-29,conan <cryst...@gmail.com> 写道:

小蘋

unread,
Nov 29, 2006, 9:18:50 AM11/29/06
to fa...@googlegroups.com
文化水平所限,说到底还是国家没有为他们提供足够的教育机会!

romantic.stone

unread,
Nov 29, 2006, 9:44:05 AM11/29/06
to fa...@googlegroups.com
严重顶小苹,
国家没有为他们提供足够的教育机会.
这很不公平!

妖精の瞳 ♫~

unread,
Nov 29, 2006, 1:33:56 PM11/29/06
to fa...@googlegroups.com
我用TOR的速度还可以啊... 慢的不是太夸张...
--
灌水, 只是我滴表面工作...
blog: http://weblog.bak.cn

妖精の瞳 ♫~

unread,
Nov 29, 2006, 1:35:47 PM11/29/06
to fa...@googlegroups.com
可惜的是在这部分人中, 有很多认为这很公平... 你不得不服...

On 11/29/06, romantic. stone <romanti...@gmail.com> wrote:
严重顶小苹,
国家没有为他们提供足够的教育机会.
这很不公平!

conan

unread,
Nov 29, 2006, 10:12:26 PM11/29/06
to fa...@googlegroups.com
re~
也就是吵着闹着说google过滤关键字号召大家抵制google的那些

 
On 11/29/06, gl. w <char...@gmail.com> wrote:

Fwolf

unread,
Nov 30, 2006, 1:00:08 AM11/30/06
to fa...@googlegroups.com
差不多,起哄的总是这些人。

On Thu, Nov 30, 2006 at 11:12:26AM +0800, conan wrote:
> re~
> 也就是吵着闹着说google过滤关键字号召大家抵制google的那些
--
http://www.fwolf.com/

NIUZHU

unread,
Nov 30, 2006, 1:09:02 AM11/30/06
to fa...@googlegroups.com
估计也是大同小异的~

妖精の瞳 ♫~

unread,
Nov 30, 2006, 3:51:29 AM11/30/06
to fa...@googlegroups.com
没错! QQ上什么最流行? 那句话在腾讯的服务器最多的被传送?
我相信!! :" 我试了, 真的很灵, 我已经升了" 就是其中一句.
来点什么信息想都不想, 然后就相信, 就转发. 某游戏公司客服用QQ联系索要游戏帐号密码, 身份证号码这都能信. 我真的很怀疑他们那些人如此光滑的大脑是怎么进化的... 绝对是人类进化史上的一个奇迹!!
要想造点什么谣言, 利用这些"免费资源"最好不过了...

On 11/30/06, Fwolf <fwo...@gmail.com> wrote:

差不多,起哄的总是这些人。

小蘋

unread,
Nov 30, 2006, 4:00:39 AM11/30/06
to fa...@googlegroups.com
真是这样的.在QQ圈子里面谣言满天飞,在怎么离奇的事情都有人相信.近距离的接触一些网吧里面用QQ的人,你就会惊叹:"天哪!这个世界还有这么愚昧,无知的人!"于是你对之前想要去改变这个世界的想法就是消失得无影无踪了,你也更深刻得体会到什么是所谓的愚民政策.我很怀疑,这个世界上还有比我们可爱的党更成功的愚民政策吗?

Fwolf

unread,
Nov 30, 2006, 4:38:51 AM11/30/06
to fa...@googlegroups.com
归根结底还是素质!不是说别人素质低,而是没有正确的分辨是非的能力!

On Thu, Nov 30, 2006 at 04:51:29PM +0800, 妖精の瞳 ♫~ wrote:
> 没错! QQ上什么最流行? 那句话在腾讯的服务器最多的被传送?
> 我相信!! :" 我试了, 真的很灵, 我已经升了" 就是其中一句.
> 来点什么信息想都不想, 然后就相信, 就转发. 某游戏公司客服用QQ联系索要游戏帐号密
> 码, 身份证号码这都能信. 我真的很怀疑他们那些人如此光滑的大脑是怎么进化的... 绝
> 对是人类进化史上的一个奇迹!!
> 要想造点什么谣言, 利用这些"免费资源"最好不过了...
>

--
http://www.fwolf.com/

小蘋

unread,
Nov 30, 2006, 4:36:12 AM11/30/06
to fa...@googlegroups.com
素质是教育的后果,没有好的教育,也很难又高的素质!

On 11/30/06, Fwolf <fwo...@gmail.com> wrote:
>

xiaoyu Wang

unread,
Nov 30, 2006, 6:32:48 AM11/30/06
to fa...@googlegroups.com
"光滑的大脑"……
~_~' 为这句倾倒……好形象啊,据说人的智力和大脑沟回成正比……
 
在06-11-30,妖精の瞳 ♫~ <boy...@gmail.com> 写道:
没错! QQ上什么最流行? 那句话在腾讯的服务器最多的被传送?
我相信!! :" 我试了, 真的很灵, 我已经升了" 就是其中一句.
来点什么信息想都不想, 然后就相信, 就转发. 某游戏公司客服用QQ联系索要游戏帐号密码, 身份证号码这都能信. 我真的很怀疑他们那些人如此光滑的大脑是怎么进化的... 绝对是人类进化史上的一个奇迹!!
要想造点什么谣言, 利用这些"免费资源"最好不过了...

 



luci...@gmail.com

unread,
Nov 30, 2006, 7:50:08 PM11/30/06
to GFans
请问一下,wj、freegate之类的lz软件和tor比起来怎么样?是不是tor更安全或者速度更快?

逆水行舟

unread,
Dec 1, 2006, 8:05:55 AM12/1/06
to fa...@googlegroups.com
哎呀,英语不好,看不懂英文~~~~敢问是什么意思啊?

2006/11/30, xiaoyu Wang <echo8...@gmail.com>:



--
学如逆水行舟,不进则退;心似平原走马,易放难追……
http://noahlin.blog.cfan.com.cn/

贾诗文

unread,
Dec 1, 2006, 6:18:50 PM12/1/06
to GFans
这不是也靠志愿者提供服务吗?比tor能快到哪去?似乎还没有tor开放。
不过还是 非常期待啊。
wiki在美国的访问量好像是前五,中国怎么能不落后呢?
郁闷。。。。。

Fwolf

unread,
Dec 2, 2006, 9:53:46 AM12/2/06
to fa...@googlegroups.com
美国对科技的崇拜,是中国目前所不具备的。

--
http://www.fwolf.com/
今日幸运号码:55980548

癔雨人

unread,
Dec 2, 2006, 8:40:33 PM12/2/06
to fa...@googlegroups.com
中国是对金钱的崇拜(那些软件公司和网络公司)

Leeds.Huang

unread,
Dec 2, 2006, 8:46:52 PM12/2/06
to fa...@googlegroups.com
老外也崇拜金钱,只不过用的方式不同。这不是人性的问题,而是资本的逐利性。

但是中国的公司太注重眼前利益了

On 12/3/06, 癔雨人 <shuj...@gmail.com> wrote:
中国是对金钱的崇拜(那些软件公司和网络公司)





--
http://LeedsHuang.mayget.net

McFred

unread,
Dec 2, 2006, 9:33:08 PM12/2/06
to fa...@googlegroups.com
中国对环境的破坏就能说明问题

不过我觉得你说资本的问题有点不切实际,那是马克思的一套,到现在根本不实用


--
My Google Group
http://groups.google.com/group/weapon

My Blog
http://www.firstsight.cn/blog/mcfred

romantic.stone

unread,
Dec 2, 2006, 9:39:06 PM12/2/06
to fa...@googlegroups.com
长在后,马克思在偶心里一落千丈,已经同流氓没什么区别。

Leeds.Huang

unread,
Dec 2, 2006, 9:56:23 PM12/2/06
to fa...@googlegroups.com
恩,马克思的有些东西我也不太认同了(不过我不认同不一定就代表他的东西是错误的,可能是我觉悟不够),也可能是我们学的马克思的理论都是"有china特色的"。"资本的逐利性"固然是马克思说的,但是类似观点在《国富论》里也有论述,现在西方经济学里"价格均衡"的概念也是资本竞争的结果,每个人都要最好的回报。有些东西是不能一概否定的,没有完善的理论,由于是经济学。

算了,其实我也搞不明白^^貌似也跑题了
--
http://LeedsHuang.mayget.net

FreeBug

unread,
Dec 2, 2006, 10:02:56 PM12/2/06
to fa...@googlegroups.com
大家都越谈越远,有没有谁英文好,给大家介绍一下啊,根本不知道该怎么用啊。


On 12/3/06, Leeds. Huang <tyhu...@gmail.com> wrote:
恩,马克思的有些东西我也不太认同了(不过我不认同不一定就代表他的东西是错误的,可能是我觉悟不够),也可能是我们学的马克思的理论都是"有china特色的"。"资本的逐利性 "固然是马克思说的,但是类似观点在《国富论》里也有论述,现在西方经济学里"价格均衡"的概念也是资本竞争的结果,每个人都要最好的回报。有些东西是不能一概否定的,没有完善的理论,由于是经济学。

算了,其实我也搞不明白^^貌似也跑题了


On 12/3/06, romantic. stone <romanti...@gmail.com > wrote:
长在后,马克思在偶心里一落千丈,已经同流氓没什么区别。


On 12/3/06, McFred < mcf...@gmail.com> wrote:
中国对环境的破坏就能说明问题

不过我觉得你说资本的问题有点不切实际,那是马克思的一套,到现在根本不实用

On 12/3/06, Leeds. Huang < tyhu...@gmail.com > wrote:
> 老外也崇拜金钱,只不过用的方式不同。这不是人性的问题,而是资本的逐利性。
>
> 但是中国的公司太注重眼前利益了
>
> On 12/3/06, 癔雨人 <shuj...@gmail.com> wrote:
> > 中国是对金钱的崇拜(那些软件公司和网络公司)
> >
> >
> >
>
>
>
> --
> http://LeedsHuang.mayget.net
>
>  >
>


--
My Google Group
http://groups.google.com/group/weapon

My Blog
http://www.firstsight.cn/blog/mcfred



--
I'm a stone. blog: http://freetree.bak.cn      http://cscom.bokee.com



--
http://LeedsHuang.mayget.net



--
我的taobao店:http://shop33405227.taobao.com/
My BLOG:期待blogger归来。。。。。。

McFred

unread,
Dec 2, 2006, 10:18:35 PM12/2/06
to fa...@googlegroups.com
我刚刚开始看,还没看具体的东西,不过在psiphon论坛上(
http://psiphon.civisec.org/forum/viewtopic.php?t=6
)看到原来伊朗人也很需要这种工具,我想大家也可以帮帮忙,毕竟都是患难兄弟,下面是他的话:

hi i am in iran my english is not good Sad
the psiphon site is filtered in iran before the psiphon software
coming on the site
i conscious for this program per voa persian news
i,ve downlod psiphon difficulty not work for me if must perform
necessary configuration plz help me thanks all

FreeBug

unread,
Dec 2, 2006, 11:18:50 PM12/2/06
to fa...@googlegroups.com
看起来要使用的话是要什么帐号的。似乎是一部分人做服务器,设置帐号密码,另一部分人可以用这些帐号来访问到这些服务器中转的数据。不知道我这样理解对不对。

heart5

unread,
Dec 4, 2006, 3:01:00 AM12/4/06
to fa...@googlegroups.com
正解!

和TOR工作原理差不多,不知道能不能火起来。
--
────────────────────────
手机也能Gtalk:体验评测手记一(01)--NootMobile
http://heart5.chinap4.com/blog/2006/12/gtalk01nootmobile.html

领导和意志力--评《赢在中国》五强晋级最后一场
http://heart5.chinap4.com/blog/2006/11/win-in-chinalast-5.html

我们是怎么开始信任品牌的
http://heart5.chinap4.com/blog/2006/11/4-levels-of-belief-5-ways-to-market.html

杨波

unread,
Dec 4, 2006, 3:43:45 AM12/4/06
to fa...@googlegroups.com
我看这取决于GFW
万一哪天又把BLOGGER  WIKI 办了,肯定火

 
2006/12/4, heart5 <baiy...@gmail.com>:
正解!

和TOR工作原理差不多,不知道能不能火起来。


McFred

unread,
Dec 4, 2006, 5:36:13 AM12/4/06
to fa...@googlegroups.com
不过这样也很麻烦,首先你必须要知道别人的IP地址,否则你无法使用,我还是觉得Tor更好

Shi Songhua

unread,
Dec 4, 2006, 5:38:38 AM12/4/06
to fa...@googlegroups.com
同感,用了一下,比Tor麻烦多了...
可能适合小群体内部使用?

McFred

unread,
Dec 4, 2006, 5:44:49 AM12/4/06
to fa...@googlegroups.com
其实类似的软件很多,比如stunnel,就是在自己的电脑上建一个代理服务器,如果能做成Tor类似的网络就好了。我现在也就只能在局域网里用一下,设置的是局域网的IP地址。

romantic.stone

unread,
Dec 4, 2006, 10:24:23 AM12/4/06
to fa...@googlegroups.com
找到一编文章介绍这软件的

賽迪網訊】11月30日消息,日前,加拿大大學研究人員表示,已經成功開發出一套防火牆規避系統,從而可以瀏覽到本國政府防火牆所遮罩的網站內容。
據悉,該研究項目名為Psiphon,由加拿大多倫多大學電腦專家小組領銜,通過該技術,任何用戶都可以在不受任何防火牆遮罩的情況下,瀏覽任何網站。"我們只是希望嘗試一下如何突破政府設置的防火牆。"多倫多大學電腦實驗室研究員表示。

據悉,Psiphon軟體目前已經可以免費下載,然而該軟體必將激起加拿大政府的不滿,在此之前政府採取了許多措施,遮罩那些互聯網上的有害內容。"我們的做法確實與政府有衝突,但是他完全符合法律約束。"

該軟體的運行原理如下:首先某些沒有政府防火牆的國家,例如加拿大用戶創建一個帳戶,接下來,那些被政府防火牆所困擾的其他國家用戶,可以直接登陸到加拿大用戶創建的帳戶,並且瀏覽那些被遮罩的資訊。

另一方面,該小組發言人同時承認,使用這種規避防火牆的形式登陸互聯網,在某些國家是不合法的。"在某些國家,使用這種軟體可能導致你被送進監獄,因此我們並不建議所有用戶都使用該程式。"

該軟體的下載地址為 http://psiphon.civisec.org

FreeBug

unread,
Feb 4, 2007, 4:23:00 AM2/4/07
to fa...@googlegroups.com
现在这个软件的官网已经打不开了,无语。。。
Reply all
Reply to author
Forward
0 new messages