From 9a895eafcc8ba477d433473bc51cfedd9b09b311 Mon Sep 17 00:00:00 2001 From: WfKe9vLwSvv7rN <96372288+WfKe9vLwSvv7rN@users.noreply.github.com> Date: Wed, 24 Aug 2022 23:04:17 +0000 Subject: [PATCH] Add "Circumventing censorship/filters" to "Commercial VPN Use Cases" --- content/knowledge/Commercial VPN Use Cases.md | 51 ++++++++++++++++++- 1 file changed, 50 insertions(+), 1 deletion(-) diff --git a/content/knowledge/Commercial VPN Use Cases.md b/content/knowledge/Commercial VPN Use Cases.md index 65a0cb2..c9492e9 100644 --- a/content/knowledge/Commercial VPN Use Cases.md +++ b/content/knowledge/Commercial VPN Use Cases.md @@ -2,7 +2,7 @@ title: "Commercial VPN Use Cases" date: 2022-07-19 tags: ['Knowledge base', 'VPN', 'Privacy'] -author: Tommy +author: ['Tommy', 'WfKe9vLwSvv7rN'] --- Virtual Private Networks are a way of creating a protected and private network over the open Internet. It was originally designed to provide remote access to an internal corporate network. However, in recent years, it has also been used by commercial VPN companies to hide their clients' real IP address from third-party websites and services. @@ -53,3 +53,52 @@ A VPN is useful in a variety of scenarios, such as: - Hiding your traffic from **only** your Internet Service Provider. - Hiding your downloads (such as torrents) from your ISP and anti-piracy organizations. - Hiding your IP from third-party websites and services, preventing IP based tracking. + +## Circumventing censorship/filters {#circumventing-censorship} + +Network filtering can take many forms, from simplistic DNS or IP blocklists to sophisticated deep packet inspection ({{< rawhtml >}}DPI{{< /rawhtml >}}). A VPN, if not itself blocked, is the most robust method to circumvent filtering, but other methods may also be worth considering: + +{{< rawhtml >}} +