When to Censor?
نویسندگان
چکیده
منابع مشابه
Detecting Censor Detection
Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls. We examine a specific case, that of obfuscated Tor bridges, and conduct experiments designed to discover how long it takes censors to block them (if they do block at all). Through a year’s worth of active measurements from China, Iran, Kazakhs...
متن کاملSupersymmetry as a cosmic censor.
In supersymmetric theories the mass of any state is bounded below by the values of some of its charges. The corresponding bounds in the case of Schwarzschild (M & 0 ) and Reissner-Nordstrom (M & ~q~) black holes are known to coincide with the requirement that naked singularities be absent. Here we investigate [U(1)j charged dilaton black holes in this context. The extreme solutions are shown to...
متن کاملA Technique to Censor Biological Echoes in Radar Reflectivity Data
Existing techniques of quality control of radar reflectivity data rely on local texture and vertical profiles to discriminate between precipitating echoes and non-precipitating echoes. Non-precipitating echoes may be due to artifacts such as anamalous propagation, ground clutter, electronic interference, sun strobe, and biological contaminants (i.e., birds, bats and insects). The local texture ...
متن کاملThe Cosmic Censor Forbids Naked Topology
For any asymptotically at spacetime with a suitable causal structure obeying (a weak form of) Penrose's cosmic censorship conjecture and satisfying conditions guaranteeing focusing of complete null geodesics, we prove that active topological censorship holds. We do not assume global hyperbolicity, and therefore make no use of Cauchy surfaces and their topology. Instead, we replace this with two...
متن کاملActive Protocols for Agile, Censor-Resistant Networks
In this paper we argue that content distribution in the face of censorship is a compelling and feasible application of active networking. In the face of a determined and powerful adversary, every fixed protocol can become known and subsequently monitored, blocked, or its member nodes identified and attacked. Frequent and diverse protocol change is key to allowing information to continue to flow...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: American Journal of Epidemiology
سال: 2017
ISSN: 0002-9262,1476-6256
DOI: 10.1093/aje/kwx281