Main Methods Revealed
To research using peer-to-peer networks as a method to access censored content, we search for signs of BitTorrent traffic within the logs. Most of those requests (99.97%) are allowed. Whereas we don’t discover any content that can be directly associated with sensitive matters like “Syrian revolution” or “Arab spring” (these files should still be shared through BitTorrent without publicly asserting […]