🤖 AI Summary
Modern internet censorship has grown increasingly sophisticated and multi-layered, challenging conventional static models that categorize censorship by client, server, or network location.
Method: This study introduces the novel analytical framework of “censorship chokepoints,” integrating large-scale network measurement, content delivery chain modeling, and systematic case studies of global political events to identify and characterize critical intervention points across content production, transmission, and end-user reception.
Contribution/Results: The framework reveals how multiple states leverage chokepoints to deploy large-scale, highly covert, and precision-targeted client-side monitoring and filtering—enabling cross-jurisdictional, cross-protocol, and multi-tiered censorship architectures. By mapping censorship interventions onto dynamic infrastructure dependencies rather than fixed network positions, this work advances theoretical understanding of regional surveillance logics and information manipulation pathways in the digital age, offering both conceptual innovation and empirically grounded insights for policy and technical research.
📝 Abstract
Undoubtedly, the Internet has become one of the most important conduits to information for the general public. Nonetheless, Internet access can be and has been limited systematically or blocked completely during political events in numerous countries and regions by various censorship mechanisms. Depending on where the core filtering component is situated, censorship techniques have been classified as client-based, server-based, or network-based. However, as the Internet evolves rapidly, new and sophisticated censorship techniques have emerged, which involve techniques that cut across locations and involve new forms of hurdles to information access. We argue that modern censorship can be better understood through a new lens that we term chokepoints, which identifies bottlenecks in the content production or delivery cycle where efficient new forms of large-scale client-side surveillance and filtering mechanisms have emerged.