This document discusses techniques for circumventing internet censorship, including methods for detection of censorship like stream reconstruction and keyword matching, blocking techniques used by censors like IP blocking and DNS poisoning, and counter-techniques for bypassing censorship through proxies, secure transfers, tunneling services, and active circumvention projects. It also notes that the information discussed is from public sources and does not involve sharing of classified information.