Applications that allow communication despite the disconnection and the Internet
We hear a lot about a government in a country blocking some websites or social media services from its citizens in cases of popular demonstrations and protests, as happened during the Arab Spring revolutions; how can this blocking be overcome?
How is blocking?
Regardless of the reason behind the blocking, the methods are almost the same. Some servers (for example) block access to any website that contains a specific word in its link, while others block access to a specific link.
Also, some resort to blocking Internet Protocol (IP) addresses to prevent access to them completely, or firewalls may be used to block a specific port, when you want to block VPNs.
Because of different masking methods, the means to bypass it also differ and vary. Sometimes, the user may have to use more than one tool to reach his goal. Given the many solutions, we will review here the easiest and most common:
Blocking websites
"Proxfree.com" and "hidemyass.com" are websites that offer blocked website opening services, and when entering one of them the user writes the blocked website link to the tool to bypass blocking and display its contents, but this method may not work If the two mentioned sites are originally blocked.
Google search engine
When heading to the Google search engine and writing a search term for a published report, for example in a blocked site, an arrow appears next to the search result, and when clicking on it appears an option with a cached title, and by clicking on it the user will be moved to an archived copy inside the Google servers of the report itself can be read; However, this method does not work if blocking is used according to a specific word within the link.
Web browsers and extensions for safe browsing
HotSpot Shield
Browser extensions can be used if the previous solutions are not successful, the most famous of which are "Hotspot Shield" available for Google Chrome and Firefox browsers. The company also provides applications for all operating systems including "Windows", "Mac OS", "Android" and "iOS".
Installing the extension in the browser will facilitate the process of overcoming the blocking, after installation, its icon will appear after the address bar, and once you click on it and choose "Contact", the process of securing the connection and encryption of all data begins, as the color of the icon changes from orange to green to indicate that the connection is secure; this does not It is only allowed to bypass blocking, but also to protect user privacy while browsing the Internet.
Opera
Opera browser, in its new version, provides virtual private networks "VPN" without the need to install any plugin, and it is available for all computer operating systems.
After the browser is installed, it is directed to Preferences, after which Privacy & Security is selected, and finally the "VPN" option is activated.
The previous steps will lead to the emergence of a new button before the title bar called "VBN", and by clicking on it the process of securing the connection begins and the color of the button turns from gray to blue indicating its action.
What is distinctive in the browser "Opera" and its tool is the presence of more than one server, and therefore even if the provider blocks a server, there remains the possibility to take advantage of the rest of the servers that are constantly changing.
Tor
The Tor tool offers a very high level of protection, it is also used to access the Deep Web and the Dark Web, and it also provides a safe browser based on a version of Firefox.
The user only needs to download and run the tool to start the encryption process completely. After pressing the "Connect" button, the tool's browser is launched through which the Internet can be browsed safely from the eyes of the censor.
Besides the above, there are other methods to bypass blocking such as using a proxy, changing a domain server; and using these two methods is not as easy as the previous methods, so we ignored them here.
Applications for smartphones to open blocked sites
Bypass blocking is not limited to computers, as there are many smart phone applications that allow users to open blocked websites.
Opera VPN
It is a free application that secures the user's connection and helps him bypass the blocking while surfing the Internet.
PureVPN
This application allows the user - for a simple monthly subscription - to choose the country from which to browse, and therefore when using services such as "Netflix" - to name a few - you can access the content of the United States of America or the Middle East by selecting the desired country from the list.
TunnelBear and CyberGhost
They provide limited free subscription, but at the same time they provide a program to guarantee the user’s rights and the ability to recover his money in case the service does not work optimally.
Applications to communicate confidentially between users
Firechat
Firchat is among the chatting applications that provide private direct messaging, creating private groups and conducting public discussions, based on the tag.
According to the developed company, this application works even without an internet connection or coverage from mobile networks, and all it takes is for a few people around you to use it, as it depends on Bluetooth and Wi-Fi.
Briar
This application is open source, and also allows sending private direct messages and creating private groups, with the ability to post mini-blogs that only your acquaintances can read.
The developer says the app is designed for activists and journalists for safe correspondence between them. And in case the internet crashes, the application can synchronize via Bluetooth or Wi-Fi, and in the event of the return of the Internet, it can sync over the Tor network to protect users from censorship.
Bridgefy
It is a messaging app that allows users to chat safely with their friends without the Internet or short text messages, but using Bluetooth technology only, and therefore it is useful for transferring information quickly and confidentially between users in gatherings provided that all parties have installed this application in their devices.
This application works in two modes: The first is a personal style that allows chatting confidentially with others, the distance between them does not exceed a hundred meters.
And the network pattern that allows chatting with others increases the distance between them by a hundred meters by the presence of others in the middle using the same application, where the device of the person in the middle acts as a medium to transmit the signal to the farthest.
Qoul Application (qaul.net)
This application - which was developed inspired by the demonstrations of Tahrir Square in Egypt in 2011 - can be accessed through the "qaul.net" website, and download a copy for Android phones or desktop computer operating systems (Windows, Ubuntu, or OSX).
The app comes with many features like direct private messaging, file sending and voice chat.
Silence
This application is specialized in encrypting short text messages (SMS) or multimedia messages (MMS) and thus you will be able to share messages, media or attachments with friends in complete privacy, according to the developer of the application, but this requires its presence on the devices of the two parties who use it.
TrebleShot
This open source application provides an easy way to send and receive files between one phone and another without an internet connection, but like the previous applications it must be installed on the devices of both parties.
As noted, all previous applications work even with the disruption of the mobile network or the interruption of the Internet, where each user contributes to the transmission of messages to others by passing them automatically from one device to another (via Bluetooth or Wi-Fi) until reaching its final destination, while keeping the confidentiality of messages between The sender and the recipient, but it requires the application (or applications) to be preinstalled on users ’devices.
These are some solutions to bypass blocking websites or social media services, but they remain proposed solutions and may not succeed all of them, and for this reason the user himself needs to search for the best solution for the country or geographical location in which he is located.