|
|
|
Zhonghang Sui, Hui Shu, Fei Kang, Yuyao Huang and Guoyu Huo
Tunnels, a key technology of traffic obfuscation, are increasingly being used to evade censorship. While providing convenience to users, tunnel technology poses a hidden danger to cybersecurity due to its concealment and camouflage capabilities. In contr...
ver más
|
|
|
|
|
|
|
Dilovar Salimov
Pág. 126 - 133
The article examines the situation of online media as a new challenge to the ideology of the Tajik state. At the same time, the main emphasis is on the formation of a network society and its impact on the transformation of the political life of the count...
ver más
|
|
|
|
|
|
|
Ephraim Vhutuza
Pág. 17 pages
The paper focuses on the legal banning and prohibition of plays and/or theatre productions, and, in extreme cases, the arrest and harassment of artists in Zimbabwe by a variety of state actors and instruments, which include the Board of Censors, the Nati...
ver más
|
|
|
|