Welcome to Expose The Dark!
It s becoming more and more important! Application and techniques for circumventing online censorship.

Bypass internet filters, app store censorship, Big Tech censorship, and more. Online censorship is on the rise, even democratic countries are enacting sweeping laws that censor citizens freedom of expression and restrict their access to information. Big Tech companies are also increasingly restricting their users freedom of expression.
Luckily, there are many tools and techniques you can use to bypass internet restrictions and access content that governments, tech platforms, and other censors want to prevent you from seeing.
This post identifies four main types of online censorship and lists different tools and techniques to help you circumvent any form of censorship. Types of Internet Censorship
Internet Filtering
Internet filtering restricts users ability to connect to certain online services by restricting various parts of the Internet infrastructure, such as:
- Internet Protocol (IP) addresses (addresses used to connect to online services)
- Domain Name System (DNS) servers (servers that convert domain names into IP addresses so that devices can connect to them)
- Internet Service Providers (ISPs)
Since internet filtering targets infrastructure, which varies by region, the restrictions are usually geo-based. Therefore, you can usually bypass internet filtering by making it look like you re connecting from a different geographical region.
App Store Censorship
App store censorship involves app stores removing apps or restricting access to apps, either because they have decided that the apps violate their app store rules or because they are complying with a government censorship order.
App store censorship has the biggest impact on iPhones and iPads, as Apple s App Store is currently the only way to install apps on these devices. However, there are several ways to minimize the impact of App Store censorship even on Apple devices.
Censorship of online accounts
Censorship of online accounts refers to online service providers who restrict or close user accounts.
This type of censorship is most commonly found on Big Tech platforms that host user-generated content, but it is increasingly spreading to other platforms.
Fortunately, there are tools and strategies you can use to minimize the impact of censorship of online accounts.
Internet shutdowns
Internet shutdowns are the extreme form of censorship, and unfortunately, there is no way to circumvent them entirely. However, there are steps you can take to reduce their impact and maintain some internet-like features when the internet goes down.
Choosing the Right Circumvention Method
When choosing a tool or technique to circumvent censorship, you need to consider what type of censorship will be used and then choose the best tool or technique for the task.
In some cases, censors will use multiple censorship methods. For example, a censor may remove an app from your country s App Store and use internet filtering to block access to the app s servers in your country.
If multiple censorship methods are employed, you need to use a tool or technique to combat both types of censorship at the same time. For example, if an app is removed from your country s app stores and access to its servers in the country is blocked, you will need to use one of the tools to bypass internet filtering, while at the same time using one of the tools or techniques to bypass censorship in the app store.
How to Bypass Internet Filtering
Use a VPN
Virtual Private Networks (VPNs) allow you to mask your real IP address by routing your traffic through a VPN provider s global network of servers. If content is blocked in your country, you can often bypass the block by switching to a VPN server located in another country.
Some VPNs also have additional features to bypass censorship that can bypass attempts to block VPN traffic.
Here are some of the best VPN providers.
Use Tor
The Onion Router (Tor) is a free and open-source service that masks your real IP address by routing your traffic through a network of volunteer-run servers called "nodes" or "relays." Like VPNs, Tor can bypass most geoblocks by routing your traffic through servers in different countries.
The Tor browser also has several built-in bypass tools called "pluggable transports" that disguise Tor traffic and make it look like another form of internet traffic (such as a video call or a connection to a Microsoft website). Some of these bypass tools rely on Tor s "bridges" that allow you to connect to non-public Tor relays. Together, these features help bypass blocks on public Tor entry points that may be imposed by censors.
Furthermore, the Tor browser makes it possible to open private, censorship-resistant versions of websites called "onion services". These onion services are much harder to block or shut down than regular websites and are often still accessible if the main version of a website has been censored.
Tor s decentralized structure also makes it resistant to censorship. Since there are thousands of independent servers on the network and your traffic is routed through multiple servers, it s hard for a single entity to impose bans or restrictions.
There are a few different ways to access the Tor network, and the optimal method depends on your use case.
If you only need to use Tor to bypass website censorship, you can use the Tor browser.
If you want to route all of your device s traffic through Tor to bypass other types of censorship (such as censoring content in apps), you can:
- Use a VPN that supports Tor connections (this feature is offered by Proton VPN).
- Use Tails (The Amnesic Incognito Live System) on desktop (Tails is a portable, open-source Linux distribution that routes all internet connections through Tor and blocks apps that try to connect to the internet without Tor).
- Use Orbot on mobile devices (Orbot is an open-source proxy that routes all of your phone s traffic through Tor).
Use Lokinet
Lokinet is a free and open-source service that works similarly to Tor. It hides your real IP address by routing your device s traffic through a decentralized network of nodes. This allows you to bypass most location-based restrictions.
Lokinet also hosts private, censorship-resistant versions of websites called "SNApps". These websites are only accessible through Lokinet and are similar to the Tor onion services. Because SNApps are more resistant to censorship, they usually continue to provide access to a website s content if the main website is blocked or taken offline.
Due to the decentralized nature of Lokinet and the way it routes traffic through multiple servers around the world, it is difficult for a single censor to shut down or restrict the network.
Unlike Tor, which offers options to route only browser traffic through Tor or route all network traffic through Tor, Lokinet doesn t have a separate browser and routes all network traffic through Lokinet.
However, one thing to keep in mind is that Lokinet is a relatively new project and has fewer nodes than Tor. It also only has apps for Windows, macOS, and Linux, although it says that mobile clients are in development.
You can download Lokinet here.
Use a private DNS
Most ISPs use their own DNS servers by default, and this allows them to block your access to apps, websites, and other online services at the DNS level.
You can bypass this type of censorship by either using a VPN with first-party DNS servers (all VPNs in our list of top VPNs use first-party DNS servers) or changing your default DNS to a private DNS provider, such as NextDNS or Quad9.
Although alternative DNS servers are not immune to censorship, these providers are less likely to impose restrictions on their users.
Use DNSCrypt
Private DNS providers allow you to bypass most DNS-related internet restrictions. However, DNSCrypt can provide you with additional protection against this type of censorship by encrypting your DNS requests and preventing third parties from monitoring or manipulating them.
DNSCrypt is an open specification, and there are numerous free and open-source implementations for Windows, macOS, Linux, Android, iOS, and iPadOS.
You can learn more about DNSCrypt and its implementations here.
Most implementations have supporting documentation that shows you how to configure DNSCrypt with your preferred DNS provider and on your preferred operating system.
Use Lantern
Lantern is an open-source censorship bypass tool that uses various techniques and protocols to bypass internet restrictions. It claims that these techniques and protocols make it better than a VPN to bypass internet blocks.
It also has a "Discover" feature that archives content that has been censored or is at risk of being censored and allows users to upload content anonymously. This archive is censorship-resistant, protects privacy, and uses peer-to-peer technology, so it s accessible when the internet goes offline.
Lantern is available on Windows, macOS, Linux, Android, iOS, and iPadOS.
You can get Lantern here.
Use Shadowsocks
Shadowsocks is an open-source proxy tool that can bypass internet censorship. It is known for its ability to obfuscate internet traffic, making it difficult for censors to detect and block it.
One thing to keep in mind when using Shadowsocks is that it s not designed for privacy and doesn t offer the same level of privacy as VPNs or Tor.
Another thing to keep in mind is that you ll need both a client and a server to run Shadowsocks. Some VPN providers, such as Mullvad VPN, offer features that allow you to use Shadowsocks through their VPN clients and servers. Alternatively, you can rent a virtual private server (VPS) running Shadowsocks and connect to it through a Shadowsocks client.
You can view Mullvad VPN s documentation on Shadowsocks here.
You can get more information on how to set up Shadowsocks on a VPS and connect it to a Shadowsocks client here.
Use online services
Online services that can open web pages or make copies of them can sometimes be used to access the content of blocked websites.
Here are some online services you can use to access restricted content:
- Archive Today (search the archive to see saved versions of restricted content)
- Wayback Machine (search the archive to see saved versions of restricted content)
- Cached View (search the Google Web Cache to see saved versions of the restricted content)
- Online website translator (paste the URL of the restricted content into an online website translator to see if you can access a translated version of the page)
- RSS reader (paste the RSS feed of the restricted content into an RSS reader and check if it is accessible in the RSS reader)
- Online reading services (save the page in an online reading service and check if it is accessible in the online reading service)
Check Alternative Domain Names
Some websites that are frequently censored create and switch through new domains to stay one step ahead of the censors. Websites that use multiple domains often share those domains on social media.
Therefore, if a website s main domain is censored, you should check the site s social media to see if there are alternative domains where you can view the restricted content. How to Bypass Censorship on the App Store
Use multiple App Store accounts
Apple, Google, and most other big tech companies that run app stores allow you to create multiple accounts and switch between them. If an app has been censored in your country but is available in other countries, you can create a new App Store account linked to a country where the app is available and then use that account to access the censored app.
However, this method has several limitations. First, you ll need a phone number linked to the country you re creating the account for. Second, Apple only allows you to sign in with one account at a time on its devices, so you ll have to sign out and sign back in every time you want to access a censored app on Apple devices that way.
If you create additional App Store accounts, make sure you comply with Apple and Google s terms of service.
Sideloading apps (desktop and Android only)
If the censored app is available as a direct download from the developer s website, you can install it (directly) on desktop or Android devices.
On the desktop, simply download the file, double-click on it once it s downloaded, and follow the on-screen instructions to complete the installation.
On Android, there are several ways to install apps directly. This post discusses these sideloading methods and explains how you can find sideloading apps.
Use alternate app stores (desktop and Android only)
If an app has been censored in one app store, it may still be available in other app stores on desktop or Android.
Just download an alternative app store or browse its catalog online, search for the censored app, and see if it s available.
This post covers some of the main Android alternative app stores and how you can install them.
Compile apps yourself (desktop and Android only)
If a censored app is open source, you can compile it yourself and install the compiled app on desktop or Android devices.
The process for doing this varies depending on the operating system (OS) and the apps you use and compile. So, you need to follow the instructions in the source code or on the app s developer s website.
If you are using Android, you can transfer the compiled APK file of the app from your computer to your Android device and then install it on your device. However, keep in mind that this process may require rooting your Android device.
Of course, here is the article in complete and fluent German:
Using Progressive Web Apps
Many websites can be saved as Progressive Web Apps (PWAs). These PWAs can be used as an alternative to censored apps.
PWAs appear on your home screen, in your app list, and in the operating system s search features, just like regular apps. On some operating systems, they have almost all the features of regular apps. However, on other operating systems, such as iOS and iPadOS, certain features, such as notifications, are limited.
PWAs can be found by searching for "[app name] PWA" or by searching this PWA directory.
In case the censored app doesn t have a PWA, most browsers still allow websites to be saved as apps, either natively or with an extension.
The exact process of storing PWAs and saving websites as apps varies depending on the browser and operating system you re using. However, the general process is as follows:
- Open the website you want to save.
- Save the website as an app. The option to do so usually appears in the address bar, share menu, or settings menu. On Android, the option is called "Install App". On iOS and iPadOS, the option is called "Add to Home Screen." On desktop devices, the option is either an install icon or is called "Create Shortcut" or "Install [App Name]".
How to Bypass Online Account Censorship
- Create multiple accounts
Creating multiple accounts for the main services you rely on ensures that you don t lose access to those services if your main account is censored.
To reduce the chances of these secondary accounts being censored, make them anonymous or pseudonymous and don t do anything that associates them with your main account. Also, make sure to abide by each platform s terms of service when creating these secondary accounts.
- Back up your data regularly
Regularly backing up important data from your online accounts ensures that you have access to that data if the account is restricted or closed.
Many online accounts allow you to review and download the data they store about you. If this option is available, use it to quickly save a copy of your important data.
- Create a website
Websites are much more resistant to censorship than social media, and most hosting providers don t have the same far-reaching censorship rules as Big Tech.
By creating a website and promoting it regularly on your social media platforms, you can ensure that you still have an online presence if one of your social media accounts is censored.
This guide and videos show how to create your own website.
- Build an email list
An email list allows you to connect directly with your subscribers without being exposed to the ever-changing algorithms of social media platforms. It also ensures that you can stay in touch with your subscribers if one of your social media accounts is restricted or closed.
This guide will show you how to set up your own email list.
Once you ve set up your email list, promote it on your website and social media platforms and communicate with it regularly.
How to Bypass Internet Shutdowns
- Store offline backups
By storing offline backups of apps, websites, and data you rely on, you ensure that you have access to them when the internet goes down.
Although you won t be able to use in-app features that require an internet connection when the internet is turned off, these backups still provide access to valuable offline data.
In addition to backing up your main apps, you should also store some portable apps that you might need on USB sticks or external hard drives.
Portable apps are apps that can be run directly from an external drive. If you ve saved portable apps in advance, you can still access those apps from any desktop device if the internet goes down by plugging in the USB stick or hard drive.
You can get over 400 portable apps from PortableApps.com.
- Set up a personal server
Personal servers allow you to store a lot of important data such as files, photos, messages, and contacts locally. Not only are they a great way to get your data back from Big Tech, but they also allow you to have a local copy of your data at all times, even if the internet goes down.
There are several options for personal servers, such as Umbrel and Nextcloud.
You can also use these open-source Plex alternatives to set up your own media server that will allow you to access your movies, TV shows, music, and other personal media without an internet connection.
- Use offline and peer-to-peer apps and services
Offline apps and services provide access to a wide range of information locally without requiring an internet connection. Peer-to-peer apps allow you to share information and communicate with others when you don t have access to the internet.
Both types of apps can be invaluable if you re cut off from the internet, but you ll need to download them first.
The types of offline and peer-to-peer apps you should download depend on your needs. Some types of apps to consider include:
–
Offline map apps: These apps allow you to navigate without an internet connection. OsmAnd and Organic Maps are two open-source offline map apps that work on mobile devices, while QGIS is an open-source desktop map app.
- Offline Content Reader: These apps allow you to store offline versions of educational databases such as Wikipedia and Project Gutenberg, access them on all devices, and search them with full-text search. The open-source app Kiwix is one of the most popular apps in this category.
- Offline Generative Pre-Trained Transformer (GPT) Models: These models are trained on massive amounts of data and can answer many of the questions you would normally use a search engine for if you don t have access to the internet. There are many models available, but you can search on GitHub, GitLab, or Hugging Face, or ask Hugging Chat (Hugging Face s open-source chatbot) to find something suitable for your needs.
- Peer-to-peer messaging apps: These apps use different techniques to allow you to communicate with others when the internet is turned off. One of the most popular open-source peer-to-peer messaging apps is Briar.
Privacy Considerations for Circumventing Online Censorship
Authorities that enforce censorship often monitor and punish those who engage in circumventing censorship. Therefore, you need to take precautions and make your activities to circumvent censorship as private as possible.
Here are some tips you can use to stay private when bypassing censorship:
- Separate your activities to circumvent censorship and your real identity
To minimize the chances that your censorship circumvention activities will be associated with your real identity, do everything you can to separate these activities from your real identity.
For maximum separation, get separate devices for your censorship circumvention activities. Buy them in cash or with another payment method that is not linked to your identity.
Use these devices solely to circumvent censorship and do not do anything on these devices that is related to your real identity. Also, don t use your anonymous accounts on devices linked to your real identity. Among other things, avoid using your anonymous accounts on devices linked to your real identity.
If separate devices are not practical, try to maintain this separation across different profiles and accounts on your devices. Create new accounts and profiles that will be used solely to circumvent censorship, and do not mention or refer to these accounts when using profiles or accounts that are linked to your real identity.
If you are required to provide personal information, such as an email address or phone number, use email addresses and phone numbers that are not linked to your real identity.
- Use a personal operating system
Windows, macOS, most versions of Android, iOS, and iPadOS are linked to a user account and send telemetry to the tech giants that provide it. By using an operating system that doesn t require a user account, you can stop most of this telemetry and greatly improve your privacy.
On desktop devices, Linux is a private, open-source alternative to Windows and macOS that doesn t require a user account. There are many Linux distributions to choose from, but Ubuntu is a popular and easy-to-use distro for beginners. If you want your activity to be deleted after each session, Tails (the portable, open-source Linux distribution covered in the "Using Tor" section of this post) is another option.
On mobile, there are several open-source, Google-exempt Android distributions that remove the requirement to sign in with a Google account, remove many of Google s services from the operating system, and add new privacy features. These include GrapheneOS, CalyxOS, and LineageOS.
- Use a private browser
Google Chrome, the world s most popular browser, is a privacy nightmare that uses browsing history to reach users with advertisements. Most users also log in to using Chrome, which allows Google to collect their browsing history. Some other popular browsers also have similar privacy issues.
To minimize data collection and browsing privacy issues, choose a browser that doesn t prompt you to sign in and has built-in privacy features.
You can check some private browsers here.
- Block Ads
Online advertising technology companies are becoming more adept at tracking our activity on the web and often share the data they collect with numerous third parties. By blocking ads, you can minimize the amount of data collected and shared by these companies.
There are several ways to block ads:
- Block ads over DNS (Next DNS and all VPNs on our top VPN list block ads over DNS).
- Using a private browser with built-in ad-blocking capabilities (many of the private browsers in this list have built-in ad-blocking capabilities).
- Using an ad-blocking extension (UBlock Origin is a popular open-source ad-blocking extension for desktop and Firefox for Android, while 1Blocker is a popular ad-blocking extension for Safari on iOS, iPadOS, and macOS).
- Using a private operating system (limiting telemetry reduces the amount of data collected that can be used for ad targeting).
Increase your WiFi privacy
Your router and other internet-enabled devices may reveal your location and other sensitive data to third parties through their WiFi capabilities.
Fortunately, there are several steps you can take to strengthen your WiFi privacy and limit the amount of data leaked via WiFi features.
This post discusses how to protect yourself from WiFi data leaks.
Restrict Location Tracking
Even if you turn off location services, there are numerous ways that computers and phones can track your location and reveal it to third parties.
However, there are ways to protect yourself from most common forms of location tracking used by third parties.
This post discusses how you can restrict location tracking.
Back up your router
Your router is one of the most important internet-enabled devices in your home because it manages web traffic for all phones, laptops, tablets, consoles, smart TVs, and other devices. If poorly configured, malicious actors can exploit vulnerabilities in your router and spy on internet traffic.
Luckily, improving your router s security is relatively easy.
This post discusses the steps you should take to secure your router.
Use private payment options
Debit cards, credit cards, PayPal, and other popular online payment services link your purchases to your identity. So, if you need to buy something related to your activities to circumvent censorship, use a private payment option that is not linked to your identity if possible.
Some of the private payment options you can try are:
- Cash
- Prepaid debit cards purchased with cash
- Gift cards purchased with cash
- Privacy-Focused Cryptocurrencies
Start building your censorship circumvention toolbox today
Although these tools and techniques provide a great way to fight back against censorship, they can be difficult to access once a censorship measure has been provided. Therefore, it is best to make preparations now so that you are not surprised by sudden or unexpected censorship.
Go through all the tools, techniques, and privacy considerations in this post, download everything you might need, and take as many prep steps as possible so that your censorship bypass toolbox is ready when you need it.
Source: reclaimthenet.org
Leave a comment