Censorship & Safeguards: Strengthening Internet Protocols
This podcast series examines how internet censorship shapes global access to information and the technical safeguards needed to ensure a free and open web. We dive into the mechanics of filtering, circumvention strategies, and the role of internet protocols in protecting privacy, security, and freedom of expression. Voice and scripts by NotebookLM with input from Nick Sullivan and published research.
Episodes

Monday May 05, 2025
Monday May 05, 2025
In this season finale, we explore how encryption and obfuscation tools are adapting to advanced censorship. Topics include potential client-side backdoors, the centralization of encrypted services, and the role of grassroots tech communities. This concluding discussion frames key challenges and possibilities for future internet governance and user privacy.

Wednesday Apr 30, 2025
Wednesday Apr 30, 2025
MASQUE (sometimes spelled “mask”) expands on HTTPS-based tunneling to conceal additional traffic types, including IP-level tunnels. You’ll look at how MASQUE can make censorship more difficult by blending various protocols into HTTP/3 streams. There is a broader reflection here on protocol “camouflage” and how the arms race escalates as new protocols offer stronger obfuscation against state or ISP-level meddling.

Friday Apr 25, 2025
Friday Apr 25, 2025
TLS used to expose data like Server Name Indication during the handshake. Encrypted Client Hello (ECH) fixes that by encrypting handshake info, defeating SNI-based blocking. This episode covers how ECH works, its adoption push, and how censors might react. It also explores the privacy vs. visibility debate between users and network operators focused on security.

Monday Apr 21, 2025
Monday Apr 21, 2025
Shifting into the encryption era, you introduce DNS over HTTPS (DoH) and explain how it attempts to shield DNS queries from on-path observers. This episode investigates the controversies around DoH—whether centralization of DNS resolvers shifts power to big tech, and whether it genuinely thwarts censorship or simply moves the choke point to another layer (e.g., government regulation of public DoH endpoints).

Wednesday Apr 09, 2025
Wednesday Apr 09, 2025
This episode explores how DNS, traditionally in plaintext, exposes user intentions and becomes a target for censorship via spoofing, redirection, or injection. It covers classic DNS-based blocking tactics and examines how the fragmented, distributed nature of the DNS ecosystem influences censorship approaches.

Friday Apr 04, 2025
Friday Apr 04, 2025
Here, you map out the “where” of censorship: ISPs, internet exchange points (IXPs), backbone providers, and government-run or regulated network segments. The focus is on how each actor can enforce blocking or filtering, and what legal or political frameworks empower them. Real-world examples (e.g., national firewalls) highlight the many ways organizations leverage these choke points to monitor or restrict content.

Tuesday Apr 01, 2025
Tuesday Apr 01, 2025
This episode explores how unencrypted (plaintext) traffic historically enabled governments, ISPs, and entities to monitor and control internet communications. You'll learn foundational concepts—such as internet structure, traffic routing, and administrative interventions—to illustrate why plaintext channels (e.g., classic DNS) facilitate censorship and surveillance.

Saturday Mar 29, 2025
Saturday Mar 29, 2025
How do people in censored environments access information? We explore user perspectives, priorities, and barriers to using circumvention tools. Research from Xue et al. highlights challenges in trust, funding, and usability, shaping the future of internet freedom.
Created with NotebookLM.

Monday Mar 24, 2025
Monday Mar 24, 2025
Some governments take censorship further by shutting down the internet entirely. We analyze case studies from Myanmar, Ethiopia, and Sudan, examining economic and social impacts, resistance strategies, and expert insights on the growing trend of shutdowns as a political tool.
Created with NotebookLM.

Tuesday Feb 11, 2025
Tuesday Feb 11, 2025
We examine popular circumvention methods—VPNs, Tor, and encrypted DNS (DoH/DoT)—and how governments counter them. What makes these tools effective? What are their limitations? Insights from Feldstein reveal the ongoing battle between censors and those fighting for open internet access. Created with NotebookLM.

