<s>
Refraction	B-Application
networking	I-Application
,	O
also	O
known	O
as	O
decoy	B-Application
routing	I-Application
,	O
is	O
a	O
research	O
anti-censorship	B-Application
approach	O
that	O
would	O
allow	O
users	O
to	O
circumvent	O
a	O
censor	O
without	O
using	O
any	O
individual	O
proxy	O
servers	O
.	O
</s>
<s>
There	O
are	O
five	O
existing	O
protocols	O
:	O
Telex	B-Application
,	O
TapDance	O
,	O
Cirripede	O
,	O
Curveball	O
,	O
and	O
Rebound	O
.	O
</s>
<s>
These	O
teams	O
are	O
now	O
working	O
together	O
to	O
develop	O
and	O
deploy	O
refraction	B-Application
networking	I-Application
with	O
support	O
from	O
the	O
U.S.	O
Department	O
of	O
State	O
.	O
</s>
