Available WEB browser Ceno 1.4.0, bypassing censorship

Company Equalite Published the release of a mobile web browser Ceno 1.4.0 , intended for organizing access to information in conditions of censorship, traffic filtering or disabling the Internet segments from the global network. Firefox for Android is used as the basis (Mozilla Fennec). The functionality associated with the construction of a decentralized network is transferred to a separate library Ouinet , which can be used to add censorship to arbitrary applications. Project operations extended under the MIT license. Ready builds available in Google Play .

The Ceno browser and the OUINET library allow you to access information under the active blocking of proxy servers, VPNs, gateways and other centralized traffic filtering mechanisms, down until the Internet is completely turned off in censored areas (when fully blocking the content can be distributed from the cache or local drives). To exchange data, P2P network , in which users participate in redirection Traffic to external gateways (Injector), providing access to information bypass filters.

The project also provides content caching on the side of each user with maintaining a decentralized Popular Content Cache. When you open the user of the site, the downloaded content is cached and becomes available to the P2P network members who cannot directly access the resource or to the blocking gateways. Each device is stored only data directly requested from this device. Identification of page cache is carried out with the use of a hash from the URL, while all the additional data associated with the page, such as images, scripts and styles, are grouped and moved together by one identifier.

To gain access to a new content, direct access to which is blocked, special proxy gateways (injector) are applied, which are placed in the external parts of the network, not subject to censorship. Information between the client and the gateway is encrypted using open key encryption. To identify gateways and prevent malicious gateways, digital signatures are applied, and the keys accompanied by the gateway project are included in the browser supply.

To access the gateway in its locking conditions, a chain connection is supported through other users who act as a proxy for a traffic forwarding to the gateway (data is encrypted by the gateway key, which does not allow transit users, through which the requests are transmitted, wed up in traffic or define content). Client Systems External requests on behalf of other users are not sent, or either give data from the cache, or used as a link to install the tunnel to the proxy gateway.

/Media reports.