Font size:
Page background:
Letter spacing:
Images:
Disable visually impaired version close
Version for visually impaired people
News

Content blocking: principles, mechanisms and technical approaches

Unsuitable content is one of the most complicated and controversial problems in the Internet. On one scale there is, as a rule, the convenience and freedom of users, on the other, there is the combat with cybercrime and unlawful activity. IETF gave a detailed layout of the content blocking and the advisability of different approaches with the account of modern Internet structure. IETF engineers emphasized three main approaches to limit the unsuitable content: control with the assistance of intermediaries, governance of trustworthy data and the use of reputation and authentification systems.

According to specialists the most efficient and safe for the Internet method of limiting the unsuitable content is blocking on the user’s side. The systems of blocking through an intermediary are in some cases rather inexpensive solutions but they hardly match up the Internet architecture. Blocking a server with unsuitable content may bring a fast result but the efficiency of this method is limited by the very structure of the global network.

Yet IETF engineers mark the trend of content limiting will keep in the nearest time.

“Due to the universal structure of the Internet-routing where a packet from point A should be delivered to point B there is no efficient method of unsuitable content blocking between these two points, - says Andrey Kolesnikov, CEO of the Coordination Center for TLD. RU/.РФ. - Nevertheless, the Internet is evolving constantly and a more acceptable method will sooner or later be found – time will show which exactly.”

Previous News Next news