Here some additional information to circumvent search localization:
You can edit your search localization easily by editing your default search engine. Chrome by default localizes your search (since that is what most people want). If you edit your default search engine (you can go there in options), add a new search engine, name it Google Custom or anything, and add the following in the url: http://google.com/search?q=%s , this will use google dot come search which is international (or us related),
It is a pity that some of the tools like FreeGate FirePhoenix UltraSurf etc. are being flagged as malware (risk)tools by many a anti-malware solution.
Re: http://groups.google.com/group/alt.comp.virus/browse_thread/thread/e6a360e49097ed7b
Users have to exclude them from being flagged to use these proxy tools. Certain basic browser tools can also circumvent the filtering, he IPs used by UltraSurf are being blocked by social sites. Another source states that ULTRASURF is CONFIRMED MALWARE. I would stay FAR FAR FAR away from it. It contains KNOWN malware, contains code to execute and attach to other processes, and it would not surprise me it the traffic is being monitored. Really on has to find/build/engineer one’s own solutions, not even TOR is secure under all circumstances - monitored end-nodes etc…
The sad thing is that the first and second unrelated issues are just as an excuse for the third.
And not only governments do this also Big Media to serve the same ends,
Privacy is now non-existing. see for Tor not being all that secure: http://howtosplitanatom.com/news/tor-might-not-be-so-secure/ Then when one uses Smarthide http://www.smarthide.com/ , it is not free but will keep things anonymous…
From windows 95 hence on Windows has come with inbuilt “keys” that are US government licensed.
And all you publish via your Internet Service Provider is common knowledge and can be related back to the chair you sit in. So you live in a fully transparent world and you better realize that fact,
See why privacy is so easily lost: http://ha.ckers.org/mr-t/ at least when you allow script to run in that browser to see what RSnake’s M Reconaissance tool can do…
The United States government, for example, has the capability to monitor any broadband Internet traffic using devices mandated by the Communications Assistance For Law Enforcement Act (CALEA) and can therefore monitor both ends of a US-based Tor connection.
NoScript and RequestPolicy in the browser will surely help as a combination to protect. Being rather anonymous is quite problematic in the world of to-day. An example where you are less trace-able is:
1} Look for a public hot-spot [ free wifi internet service some-place ]
2} Put a Live Boot CD into your laptop.
3} Then set up a connection to Tor or another anonymous tooll.
4} After you have set up the Tor connection, surf to the site you want to go using http://anonymouse.org/anonwww.html or another.
IP number cannot be traced back anymore to you as a user, mac adres can be changed with various tools or take a Plug en play wifi adapter.
Laptop cannot be traced back.
OS, is not on the Laptop, but you cannot use personalized info because that can be traced back to you, so you have to sanitize your info…
I personally have no problem with countries filtering what people can view. however there does need to be some sort of accountability for what is being blocked. The black list in Australia when leaked had a dentist’s website and a hairdressers on their black list.
I see the problem as more what governments decide to filter.The system could be abused to stifle legitimate political dissent.Plus there is also the Big Brother element.Who decides what and who to filter and why. :-\