Keyword Filtering scans unencrypted traffic for specific words or phrases deemed sensitive by the controlling authority. If a match is found, the connection is reset or the specific content is redacted from the user's view.
URL Filtering targets specific paths within a website rather than the entire domain. This allows an authority to block a specific controversial article on a news site while leaving the rest of the site accessible to the public.
Platform-Level Moderation occurs when social media companies remove content or ban users based on internal community guidelines. While often called 'moderation,' it functions as a form of private censorship that shapes public discourse.
| Feature | State Censorship | Corporate Moderation |
|---|---|---|
| Authority | Government/Law | Terms of Service |
| Scope | National/Jurisdictional | Platform-wide |
| Mechanism | ISP/Gateway Blocking | Content Removal/Shadowbanning |
| Goal | Political/Social Control | Brand Safety/Legal Compliance |
Identify the Layer: When analyzing a censorship scenario, determine if the block is happening at the Application Layer (content removal), Transport Layer (port blocking), or Network Layer (IP blocking).
Encryption Limits: Remember that while HTTPS encrypts the content of a request, the SNI (Server Name Indication) in the initial handshake often remains unencrypted. This allows censors to see which website you are visiting even if they cannot see what you are doing on it.
Check for Redirection: A common exam pattern involves distinguishing between a 'connection timed out' (IP block) and a 'redirect to a warning page' (DNS or URL filtering). The latter indicates an active interception rather than a passive drop.
The VPN Fallacy: A common misconception is that VPNs provide 100% anonymity and are impossible to block. In reality, many censors use Deep Packet Inspection to identify VPN signatures and block the encrypted tunnels themselves.
Censorship vs. Privacy: Students often confuse the two; censorship is about the availability of information, while privacy is about the secrecy of information. A system can be highly censored but still offer high privacy for the allowed communications.
The Streisand Effect: This is a phenomenon where an attempt to hide or remove a piece of information has the unintended consequence of publicizing the information more widely, usually facilitated by the internet's decentralized nature.