-
公开(公告)号:US20240121296A1
公开(公告)日:2024-04-11
申请号:US18378092
申请日:2023-10-09
申请人: Snowstorm Inc.
发明人: Serene HAN , Mykhailo MARYNENKO
IPC分类号: H04L9/40 , H04L61/2517 , H04L69/18
CPC分类号: H04L63/0457 , H04L61/2517 , H04L63/107 , H04L69/18
摘要: Methods, non-transitory computer readable media, and peer devices are disclosed that facilitate network censorship circumvention. A censored peer sends to a rendezvous peer censored peer location information. A connection with a volunteer peer is then established using volunteer peer location information received from the rendezvous peer for a matched volunteer peer. First network traffic is then sent to the volunteer peer in accordance with a first network protocol using a second network protocol associated with the connection. The first network traffic is directed to a network host restricted with respect to the censored peer and the second network protocol is a peer-to-peer network protocol. Second network traffic responsive to the first network traffic is then extracted from network message(s) to thereby obtain access to the restricted network host via the volunteer peer. The first network messages are in accordance with the second network protocol and received via the connection.
-
公开(公告)号:US20240267425A1
公开(公告)日:2024-08-08
申请号:US18608202
申请日:2024-03-18
申请人: Snowstorm Inc.
发明人: Serene HAN
IPC分类号: H04L67/104 , H04L9/40 , H04L61/2517 , H04L61/4535 , H04L69/18
CPC分类号: H04L67/104 , H04L61/2517 , H04L61/4535 , H04L63/0457 , H04L63/107 , H04L69/18
摘要: Methods, non-transitory computer readable media, and peer devices are disclosed that facilitate network censorship circumvention. A censored peer sends to a rendezvous peer censored peer location information. A connection with a volunteer peer is then established using volunteer peer location information received from the rendezvous peer for a matched volunteer peer. First network traffic is then sent to the volunteer peer in accordance with a first network protocol using a second network protocol associated with the connection. The first network traffic is directed to a network host restricted with respect to the censored peer and the second network protocol is a peer-to-peer network protocol. Second network traffic responsive to the first network traffic is then extracted from network message(s) to thereby obtain access to the restricted network host via the volunteer peer. The first network messages are in accordance with the second network protocol and received via the connection.
-