Methods And Devices For Network Censorship Circumvention

    公开(公告)号:US20240121296A1

    公开(公告)日:2024-04-11

    申请号:US18378092

    申请日:2023-10-09

    申请人: Snowstorm Inc.

    摘要: Methods, non-transitory computer readable media, and peer devices are disclosed that facilitate network censorship circumvention. A censored peer sends to a rendezvous peer censored peer location information. A connection with a volunteer peer is then established using volunteer peer location information received from the rendezvous peer for a matched volunteer peer. First network traffic is then sent to the volunteer peer in accordance with a first network protocol using a second network protocol associated with the connection. The first network traffic is directed to a network host restricted with respect to the censored peer and the second network protocol is a peer-to-peer network protocol. Second network traffic responsive to the first network traffic is then extracted from network message(s) to thereby obtain access to the restricted network host via the volunteer peer. The first network messages are in accordance with the second network protocol and received via the connection.

    METHODS AND DEVICES FOR NETWORK CENSORSHIP CIRCUMVENTION

    公开(公告)号:US20240267425A1

    公开(公告)日:2024-08-08

    申请号:US18608202

    申请日:2024-03-18

    申请人: Snowstorm Inc.

    发明人: Serene HAN

    摘要: Methods, non-transitory computer readable media, and peer devices are disclosed that facilitate network censorship circumvention. A censored peer sends to a rendezvous peer censored peer location information. A connection with a volunteer peer is then established using volunteer peer location information received from the rendezvous peer for a matched volunteer peer. First network traffic is then sent to the volunteer peer in accordance with a first network protocol using a second network protocol associated with the connection. The first network traffic is directed to a network host restricted with respect to the censored peer and the second network protocol is a peer-to-peer network protocol. Second network traffic responsive to the first network traffic is then extracted from network message(s) to thereby obtain access to the restricted network host via the volunteer peer. The first network messages are in accordance with the second network protocol and received via the connection.