...they be bypassed? I'm asking mostly about countries with nationwide firewalls, such as the "Great Firewall of China", but I am also interested in how these are employed in schools and businesses, and what common and not so common methods are being used to exploit vulnerabilities in these systems.
A group I have had contact with in the past was very successful using the Portable Firefox / Portable Tor method, but are there any better ones? I've found it useful to, when using public computers, find ways to route traffic through different nodes of the LAN before routing through Tor, but this has proved very difficult.
While I would also like to hear from people bypassing these systems on smaller scales, such as schools and places of work, I am hesitant to ask, since these questions generally lead to answers that are entirely off target. I.e., I'll ask how, and people will instead answer with why and why not.
A group I have had contact with in the past was very successful using the Portable Firefox / Portable Tor method, but are there any better ones? I've found it useful to, when using public computers, find ways to route traffic through different nodes of the LAN before routing through Tor, but this has proved very difficult.
While I would also like to hear from people bypassing these systems on smaller scales, such as schools and places of work, I am hesitant to ask, since these questions generally lead to answers that are entirely off target. I.e., I'll ask how, and people will instead answer with why and why not.