‘This page cannot be found’. How internet censorship works.


Internet censorship is run by private companies working for the government.  Net service providers receive many requests from governments around the world to block material, which they normally comply with.

ISPs delete articles when asked by governments, but they also do it themselves on their own initiative, using various excuses.  Apple has a free hand to filter, and they can be seen using it to do what they believe will please the powers that be.

The Tap saw posts disappear on Blogger, usually posts which criticised powerful or wealthy individuals like Rupert Murdoch, or Andrew Lloyd Webber (Ben Fellows alleged he groomed him and tried to derive sexual satisfaction from him in a working context) and the like.  I wrote a post accusing Murdoch of running Britain’s policy as regards the EU, and not only did the post disappear.  The blog was closed down.  It re-opened six months later without anything being said.  I moved over to WordPress in the interval.

It’s worrying in that context that Nigel Farage has meetings with Rupert Murdoch.

A comment was written criticising The Barclay Brothers, and a threatening email was sent by a lawyer acting for them asking for the comment to be removed.

Comments are not normally the responsibility of the site, but I deleted it for the lawyers as requested.  I usually delete anything if it’s requested.

I had one legal threat from a less well known person, where his activities, which I believed to be deceptive, had been exposed on the blog.  I left the story in, but took out the person’s name, and disguised the location.  He never wrote back, and his activities ceased.


6 Responses to “‘This page cannot be found’. How internet censorship works.”

  1. sovereigntea says:

    Censorship is nothing new and takes many forms. The subtle stuff is the most insideous.

    Note how many stories in the online Daily Mail and Telegraph no longer allow readers to comment. If challenged upon this such organisations often hide behind the canard “its for legal reasons”.

    Sinister indeed and perhaps indicative was the concerted and global effort pre downing of flight MH17 over Ukraine to hack & edit all sources of data on the Sukoi SU25 The height of the Service Ceiling: 32,808 ft (10,000 m; 6.2 miles).

    source http://www.militaryfactory.com/aircraft/detail.asp?aircraft_id=195

    source Sukhoi factory

    Service ceiling (without external ordnance and stores), 7km

    I still have to use a proxy server to get to the latter, do you ?

    Considering the above its a possibility that MH17 was shot down with gunfire. But at the time of the shootdown you were not permitted to know that due to hacking and censorship.

  2. sovereigntea says:


    Today having already made several comments I attempted to make the following comment on the PressTV website. It was blocked I suspect by some dark force using layer 5 packet inspection or DPI Deep Packet Inspection. Following that failed attempt I was then able to comment under another article.

    Now who wouldnt want us to expose paedophiles and abuse of power ?

    Would someone be kind enough to attempt to send the same message and report the results. We might then begin to find out of this is a UK problem or a wider network issue.


    Comment follows

    As yet no politicians or senior establishment figures have even ended up in court.
    Another hasbean DJ being gaoled is merely chaff to provide cover.

    Witnesses are being intimidated and sentenced by corrupt officials in order to silence them.

    see Melanie Shaw – Mel Shaw #freemelanieshaw sentenced 11Dec14 Notts 3yr controlled probation order. Diagram key events to silence her.
    Brian Gerrish ‏@briangukc

  3. sovereigntea says:

    Packet Inspection Can Be A Form of Censorship !


    Effectively, DPI lets network owners inspect, stop, or manipulate unencrypted data exchanges flowing across their network in real time.
    Where encrypted data is transferred using a known pattern, administrators can intuit what is likely transmitting the data and similarly take action. This level of awareness concerning packet contents lets administrators interact with packets at a granular level , and in an automated fashion,before the packets
    leave the originating network or arrive at a recipient within that network.
    This interrogation capacity has implications for how large network providers,
    such as Internet Service Providers (ISPs),develop their network and also establishes an appealing technical infrastructure that non -ISPs may be interested in influencing.Having discussed the capabilities of deep packet inspection, let us turn to how they might be utilized to fulfill various technical, economic, and political goals.


  4. sovereigntea says:

    So you thought encryption made your data private 🙂

    Aug 6, 2014 FPAY Fee payment
    Year of fee payment: 4
    Effective date: 20120608

    Encrypted packet inspection
    US 20030018891 A1
    A method, system, and device for encrypted packet inspection allowing an authorized third party device to monitor cryptographic handshaking information (full-duplex) between two other devices and together with the secret private key then transparently decrypt the bulk encrypted data stream.
    The scope of this invention encompasses many applications, three examples of which are firewalls, load balancers, and local network caches. Additionally, this invention achieves and contributes to the efficient handling of encrypted information in other ways, three examples of which are making switching, routing, and security decisions.

  5. salty says:

    Scholars in Italy debate Israel boycott despite censorship

    13 April 2016.




Leave a Reply

You must be logged in to post a comment.