Archive for the ‘Internet Security Insights’ Category

The era of the “little Internet”

Wednesday, February 13th, 2013
Share

If you want to promote some bad thing than call it as “white” or “clear” or “safe”. It seems like a strange public organization called “Secure Internet League” that was established by Charity Foundation of St. Basil the Great, used to think in this way. This organization also pretend on doing nothing more but  the filtering of Internet content.

Recently, it was described about their initiative to introduce “white lists” of sites that were made by themselves and these sites will be visited by the user. That means that they will decide for you, dear users, what you can see and what can not. It is filtering and nothing else.

Today it became known about one more “new” – “smart filter”. That is not some – “simple filter” it is SMART FILTER /Smart means – smarter than you, dear Internet user. This filter will analyze the link you clicked, and if it is “bad”, you simply will not have an access to this page.

So what will a “smart filter” do with other languages& It is impossible to imagine. If you can read Chinese or Spanish, Georgian, or Polish, you surely will not get an access because they do not know for sure what these Georgians written. What if this site content some extremist content?

And yet, this thing will be too smart, for example if you entry to the site of any media it will show the headband, which will specify the age limit. And what would be considered as the media? Well, certainly the resources that are officially registered as mass media (and there are not much of them).

Here is a “smart filter” with “white proxy” and the experiment will begin in the Kostromskaya region. And if you want to disconnect – this should be done specifically. In fact, we are entering an era of the “little Internet” – a limited, stripped, sterile and empty.

It is a dangerous thing – they are going to block “extremist” sites. So, what is it? A half of pictures and demotivators in VKontakte can be considered as extremist if you wish! This notion is so broad than they can prohibit everything and explain it as the using or having of “extremist” articles.

In general, it is a matter of fact that while the Ministry of Communications does nothing some private persons (the Chairman of the League Malofeeva at the moment is being searched on charges of fraud and embezzlement of $ 200 million) are beginning to introduce the Internet censorship and filtering in the Russian regions. I do not understand why they allowed this? Who are they,? And what about the constitutional right for information?

So, by the way, once I used the Internet in North Corea. That was like this:

Share

Some facts of elections in Iran

Sunday, January 20th, 2013
Share

Iran citizens recently faced extensive disruption of web activity , it was concerned with particularly access to the Internet, a week after the social networking were blocked appeared some concerns about state censorship of parliamentary elections.

Internet blockade affected common form of secure connection that encrypts international websites of Iranian republic making dependable of the Secure Layer protocol, this protocol displays http addresses.

“Emails, proxies, secure channels usually start with https that are not available”- then informs Tehran-based expert declining to be identified.

“Cases touching upon these websites are worse than later, the VPNs do not work at all.”

Most of the Iranians apply private network, VPN and software getting around the government web filter aiming at prevention for getting access to wide range of websites together with foreign news social networks and sites rather similar to Facebook.
Last week millions of Iranian citizens suffered dangerous disruption in mail accessing and networking websites touching governmental activity.

Iranians grapple increasing obstacles that uses Internet for opposition supporters, that in its turn organize protests.

Government denies any frauds in the vote igniting large scale street demonstrations crushing security services after eight months.

Iran prepares to organize parliamentary elections on March 2.

Iran have passed the parliamentary elections on the 2nd of March, the previous elections has been hold in 2009, the results of March elections are now being regarded.

Share

The Internet regulating. 5 ambiguous ideas

Wednesday, December 26th, 2012
Share

In social Network with a passport

It is obvious to call the creation of the register of domain names and sites with prohibited information as the main initiative of this year. The attempt to divide sites on “good” and “bad” caused an outrages of a part of users and experts. This register have started its work on November 1. Within the first month such popular Internet resources as “Lurkmore”, Google and Youtube have been included in this register for several times. But this was not the only attempt to bring an order to the Russian Internet. There are 5 more deputies and business representatives initiatives which caused  resonance in the Runet in this year. Vadim Dengin, the deputy of the State Government and the member of the LDPR offers to pass the law of the obligatory passport data’s granting for users registration in social neworks. Then he explained that it can be not only a passport but also a mobile phone, that is tie to the passport. The head of the respective committee explained that it was a personal decision of the Vladimir Dengin and that none of the measures towards this question had been done.

Wifi using limits. Child under 18 must not use WiFi!

Maksim Ksenzov, the deputy administrator of the ROSCOMNADZOR during the meeting with the Internet- Media representatives offers to limit the WiFi access for users under 18 at public places. Before the ROSCOMNADZORs statement, providers thought about blocking the access to “adult sites” fro users under at 18 public places . But now ROSCOMNADZOR demands even to close free WiFi connecting at public places.

Anonymizers are prohibited

In September it is appeared the information about the State Duma is going to take into a consideration the project of prohibiting such a programmes (so called anonymizers), that hide users in the Internet. With the help of such programmes one can access the prohibited in Russia sites.

It is not hard to use such anonymizers. It is enough to put in the address line on a special site that you want to visit.

It is said that its using will be punished bu a fine and Internet disconnection. But experts think that such measures will not resolve the problem, because users will find an access to the sites that they want to visit anyway.

The Russian piracy party, by the way there was created a resource called “ RosKomSvoboda”, where one can find an information about blocked sites and know how to avoid blocking and collect a feedback from the users about blocked pages.

The prohibition of foreign Internet-shopping

In the beginning of November a number of Media wrote about the initiative of one of the Russian Internet-businessman to regulate purchases in foreign-shops of a private individuals, and supposedly, this initiative was supported by the Minister of Communication. The businessman supposed that the possibility to purchase  goods abroad makes Russian shops ( where the prices usually 2 times higher)  uncompetitive. But the Ministry have to disprove this information, explaining that the Ministry of Communication didn’t take any measures toward Internet-trade for abroad.

The mail for people-government connection

In December the Russian government will see the project about a postal service. This project is going to create a postal system. The official electronic mail box that will allow for citizens, companies, offices and state agencies to send and print documents. It is expected that the new system will be paid. The development, service and kipping the register will be the work of the Russian Post.

Experts are sceptical about this idea.

Share

Do You Believe the “right to be forgotten” is Not Censorship?

Wednesday, February 29th, 2012
Share

David Lindsay – Most of us leave in some kind digital trail ever growing that includes both information we publish about ourselves – for example facebook postings – information published about us while the ability for sharing personal information that can enhance our lives from the dark side. Photos being emarassed can later be used against us for very very various purposes, such as the employment context.

Our personal lives can become more visible, it may be that attitudes will adjust so we become more and more tolerant and forgive personal lapses or foibles. One of the paradoxes of the digital age is that our lives become more and more transparent, attitudes seem to have become intolerant and less forgiving. In what we call attention economy is not only public figures but ordinary are subject to more scrutiny than ever.

Current default settings of the internet maximize openness and access. Once the information has been published than it becomes easily accessed especially via search engines. Yet people’s interest and operation of search algorithms means that the most accessible information about us is often the most embarrassing or hurtful.

Search ability, accessibility and permanence clearly benefit the business interests of some of the world’s largest companies. The business in Facebook or Google are in present time are based on commerce information. It is hardly surprising that it is notoriously very difficult to delete your Facebook account.

The European union is proposing introduces new laws for updating privacy for taking into account changes in technology, including the growth of social communities and social networks. The proposed laws include a right to be forgotten , it means the right of a users to ensure some of that information held about them to be erased. The proposal has generated a lot of commentary much of it is alarmist and overwrought.

There are two main criticisms of the proposed right: that it would result in unjustifiable censorship and that it is unworkable. These claims are based on a misreading of the European proposal, as well as a simplistic understanding of privacy and freedom of expression.

The proposed European law is a modest attempt for restoring some balance in favour of individuals able to control their data. The proposed right for deleting data is indeed higly qualified. The right that only arises certain conditions is satisfied such as that the data is no longer needed where the data is collected or processed with a person’s consent that is later withdrawn.

The proposed right is also subject to important exceptions. For example, it does not apply where it would conflict with the freedom of expression of journalists, or with freedom of artistic or literary expression. Claims that the proposal will stifle the press are therefore untrue – there is an express exception for journalists. There is also an exception for individuals engaged in purely personal or household activities.

The proposed right is some kind of subject that is too important for exceptions. For example it does not apply the conflict with the freedom of expression of journalists or with freedom of artistic or literary expression. The proposals will stifle the press therefore untrue- there is an express exception for journalists.

A couple of points should be made in response for claiming that the proposed right is a form of censorship. Privacy is not necessarily the opposite of freedom expression. If people feel they are assured they have some control over their information they are more likely to share it. On the other hand if people are aware they say and do online will be accessible for all time they may be more likely to self – censor. The negative consequences of the current internet changes that easily promote culture of conformity.

Secondly some steps indeed organized are being taken by people to manage the digital trails. Especially in the united states we have seen the emergence of reputation services which in return for a fee offer sanitize the internet of embarrassing or harmful information. Such services can have some great success. While approaching to websites we often simply take down information. It raises the spectre of private censorship. Why should people pay to protect their information.

Those who oppose the right to be forgotten are correct when they say getting the balance between privacy or freedom of expression. However people are often unaware of the consequences of the information provided to them. It this is preferable for this to be done in a law which incorporates appropriate checks and balances rather then being left to the vagaries of the unregulated market.

Arguments that a right for deleting information on the web is unworkable, it is true and due to the information, it is impossible or difficult to ensure the information can be erased. It is true that regulating the webspace is a real challenge, and it is important that laws do not infringe freedoms.

Like many laws the proposed “right to be forgotten” can be seen as an overall. The most it can do is restoring control to individuals, and providing check on some of harmful practices. Judicious laws are needed to protect individual rights, to ensure the effective operation of markets. It is more productive for debates to focus on the kind of laws and regulation that are desirable, rather than to resort to utopian fantasies of the internet as a regulation-free zone.

We grapple the challenges of technological change, public debate about the rules of regulating. People can disagree, our understanding of these issues is not helped by hostility to regulation, by alarmist and claims. Australia could do worse than to consider following the European example.

Source: http://www.monash.edu.au/news/show/the-right-to-be-forgotten-is-not-censorship

Share

Sending Money Anonymously Online

Monday, February 6th, 2012
Share

Sending money is honor and humility I it is done anonymously, in case of charity. Anonymous payment means you are doing everything from the bottom of your heart and with a great desire to help people. Donating anonymously is beneficial too especially in preventing address and name from being placed in mailing lists. It is possible to choose sending on-line donation for an individual, for example one who is loved and is in need or someone needs the help.

Do establish anonymous email account. It can be necessary to sign up for web accounts and some services sending the payment on someone’s behalf. It can be done with the help of key combinations: “John Smith” or simply “anonymous donor”

Some other web systems can be used in online money transfers : MoneyGram.com or WesternUninon.com. choose a location in the replacement of the recipient and acquire a credit card for processing a transactions. Send anonymous email for the recipient with the money password and some instructions where the retrieve can be realized. Point out the reason of the sending the finance and regard your personality as “anonymous concerned party” so that the person can be urged that this is not the same type of scam.

Establish a premier PayPal or business account. The first type of account allows you to register with a fictitious name or nickname (though your full name is preferred). Add your anonymous email account to the list of email addresses attached to the account. You can then send money to the recipient’s email address from the anonymous address.

Visit JustGive to send donation on-line anonymously. Realize your payments and the check the option for withholding your name and contacting charity information . Donorschoose.org and NetworkforGood.org are two major sites that support charities too. Give the opinion towards donating with a login or nickname or anonymously.

Also you can use SmartHide to make anonymous email and send your messages without any fear. Also you can use free online proxy or request for full version for several days.

Share

Internet Censorship and Human Rights

Thursday, February 2nd, 2012
Share

Vinton Gray “Vint” Cerf, the famous computer scientist regarded as one of the “Fathers of the Internet,” has provided article in the New York Times declaring the idea that the Internet must be a human right. While Cerf understands the power of the Internet, makes arguments from a mechanical perspective and fails to perceive the Internet in any fashion.

He breaks the article into two sections making the point. Firstly, he argues that the Internet cannot be considered as a human right. Cerf makes a solid point in the first portion of the piece. Technology cannot be considered as a human right. Cerf illustrates the point that one point in time, if you didn’t have a horse, it was hard to earn a living. Cerf is correct in this regard. Human rights, often thought of as natural rights, that are fundamental to our existence, like access to food and water.

The second point made by Cerf is valid too. In the second portion of the article, the author argues the Internet is not a civil right. Civil rights, that ensure our personal liberty, are vast and or expanding the information technology expands the difficulty of civic discourse. Nothing makes this clearer than the challenges provided to civil rights bills such as the Stop Online Privacy Act and National Defense Authorization Act.

The Internet gives freedom of speech, traded, shared and expounded. The Internet should be considered a civil right, it allows citizens the right for free speech, presenting a foundational civil right.

Cerf is right in dividing rights into human and civil rights, he is wrong in arguing that the web is not a civil right.

 

Share

Users and Hackers Ponder Over the Notions of Censoring and Surveying the Internet

Wednesday, February 1st, 2012
Share

Among corporations who expand international membership Telecomix is leading

Once upon a time in summer protests in Arabian countries and government crackdowns led to the loss of thousand people , strange events happened in Syria web space too. Instead of main searching machines such as Google and facebook Arabic users have found strange Arabic script.

Then the webpage screened switched to a white colour gave some instructions on using free encryption, anonymity software like Tor, true crypt which evade censorship. The text placed above was round there also were some mysterious symbols hovering around pyramid decorated by lightning bolts. There were placed symbols like Telecomix and the moto: “We come in peace”.

Telecomix is a team of international hackers who scan the Syrian webspace in a massive sweep together with 700 000 target connections, they have its members in Germany, France, U.S. what they do is compromising cisco systems network switches finding other devices passwords

Hackers also post their findings in a document. American member of the group uses handle Punkbo that is built by the Sunnyvale. The Syrian machine’s logs showed web activity of thousands users. On the whole he had discovered American technology that uses a brutal dictatorship spy on its citizens.

In order to understand the exact actions of Syria one should track source that providing the technology. The company did not respond to Forbes requests for being interviewed. The industry faces new questions about tech issues for how their products are deployed.

Telecomix observes that blue coat discovery as a point in the group mission. Fighting for free speech including any Western tech firm aiding the wrong side. The only solution is to hack a few boxes , it is the motivation driving hackers deeper in the networks.

Hackers of Telecomix break into great number of Syrian home routers and set them to show users warning web page about wrong actions of surveillance.

Telecomix break Syrian law. Some traditional appreciate their work. Active hacking networks is some kind of a game for Telecomix. Unlike hacker’s group it began with opposing the European Union, industry influenced laws would cut web access for copyright files.

With juvenile pranks , Telecomix was born political. This group is created at a conference in 2009.

The hackers published the phone numbers of members of EU parliament convincing the copyright Swedish site that posted a link on homepage. At the time the site got high level of attendance.

There exist some kind of a humour, the group is serious about its work, uprisings of the Arab spring have brought its goals into the sharper focus. Few days of protests in Egypt Hosni Mubarak led to the shutting down the web access in this countries.

A fateful fluke of stumbling onto the Blue Coat led to the Telecomix scanning of the Syrian web space.

There were disputes devoted to ethical and unethical use of products is simply to distinguish.

Documents published by WikiLeaks show 160 firms advertising surveillance gear. British firm Gamma International brags can spy users of Gmail, iTunes, Skype.

Share

Internet Сensorship Weekly Report: Russia, Venezuela, South Korea ,Thailand

Thursday, January 19th, 2012
Share

Russia

Recently famous blogger and a leader of anti-corruption protest, Alexei Navalny was taken to prison for 15 days on charges. This person was one arrested last week in protests against political corruptive actions in the country. Navalny is leading voice in demanding political and social reform in Russian Federation, spreadheading on-line campaign directed against present Prime Minister V.Putin for the past couple of years.

Political decent grows in this come country, state starts new affairs in the offensive sphere. Last week for example the interior ministry suggested some issues concerning internet anonymity. Major – general A. Moshkov stated: “social web with its advantages too often give a potential threat for the basics of society ”. He states the goal of the ban presented would be to strike political radical point of view not to provide a potential threat for society. The arrest of Navalny aroused much questions. This may be the beginning of campaign pressuring sites and tech companies, social media sites starting real name policies.

EFF stands by in providing the rights for user anonymity on-line, it opposes some attempts to impede the necessary rights in the name of government security.

Venezuela

Accounts on twitter where all the critics is placed , the critics about Chavez regime was attacked by the wave of hacking the past months by a group of presidents’ policies. Global voices gave a report recently that collected some reactions of activists, artists, scholars who had the accounts compromised.

Many speculated that the government is responsible for the hacking. The group N33 prepared a press release made in Spanish. They claimed their motivation to silence critics of the president. They have even asked Twitter closing paradoic accounts of Chavez, the company continues ignoring the requests.

Thailand

On Thursday American blogger recently sentenced to two and half years in Thai prison for publishing and translating excerpts of King Bhumibol Adulyadej biography on his blog , a Thai- born U.S. citizen denied the charges but pleaded some guilty in October for lessening the sentence.

We are witnessing a game of command imposed on Thai netizens. Since then it office, Prime Minister Yingluck shinawarta has shown it to be much more worse then it was expected.

The U.S. government acknowledged the news that stated that it is a great trouble of the incident, it is not known exactly what the state department would take as an action on behalf.

EFF gives the Reports With no Borders in the arrest of activists, bloggers, journalists in this country.

South Korea

The Communication Standards commission of this country recently launched a campaign monitoring ‘’illicit content” on social sites. A team that numbers eight members will be charged with the task of studying sites such twitter, Facebook, smartphone applications for illegal content that refers to gambling, false information, drug abuse etc.”

Officials claim they enacted the program in order to limit North Korean propaganda as a part of wide crackdown on national sympathies for the neighboring states. Critics of the program however dispute it is a cover for the real motivation of silencing voices dissident to the government. The commission should immediately cease its anachronistic act of freedom of expression.

EFF expresses negative opinions concerning attacks of free on-line expression specially for South Korea’s history of censorship and legalizing in the name of copyright.

Share

Users and Hackers Ponder Over the Notions of Censoring and Surveying the Internet

Friday, January 13th, 2012
Share
Access Web Anywhere in the World
www.smarthide.com
Chat with your friends in social sites, watch online TV and many others.

Among corporations who expand international membership Telecomix is leading Once upon a time in summer protests in Arabian countries and government crackdowns led to the loss of thousand people, strange events happened in Syria web space too. Instead of main searching machines such as Google and facebook Arabic users have found strange Arabic script.

Then the webpage screened switched to a white colour gave some instructions on using free encryption, anonymity software like Tor, true crypt which evade censorship. The text placed above was round there also were some mysterious symbols hovering around pyramid decorated by lightning bolts. There were placed symbols like Telecomix and the moto: “We come in peace”.

Telecomix is a team of international hackers who scan the Syrian webspace in a massive sweep together with 700 000 target connections, they have its members in Germany, France, U.S. what they do is compromising cisco systems network switches finding other devices passwords.

Hackers also post their findings in a document. American member of the group uses handle Punkbo that is built by the Sunnyvale. The Syrian machine’s logs showed web activity of thousands users. On the whole he had discovered American technology that uses a brutal dictatorship spy on its citizens.

In order to understand the exact actions of Syria one should track source that providing the technology. The company did not respond to Forbes requests for being interviewed. The industry faces new questions about tech issues for how their products are deployed.

Telecomix observes that blue coat discovery as a point in the group mission. Fighting for free speech including any Western tech firm aiding the wrong side. The only solution is to hack a few boxes, it is the motivation driving hackers deeper in the networks.

Hackers of Telecomix break into great number of Syrian home routers and set them to show users warning web page about wrong actions of surveillance.

Telecomix break Syrian law. Some traditional appreciate their work. Active hacking networks is some kind of a game for Telecomix. Unlike hacker’s group it began with opposing the European Union, industry influenced laws would cut web access for copyright files.

With juvenile pranks, Telecomix was born political. This group is created at a conference in 2009.

The hackers published the phone numbers of members of EU parliament convincing the copyright Swedish site that posted a link on homepage. At the time the site got high level of attendance.

There exist some kind of a humour, the group is serious about its work, uprisings of the Arab spring have brought its goals into the sharper focus. Few days of protests in Egypt Hosni Mubarak led to the shutting down the web access in this countries.

A fateful fluke of stumbling onto the Blue Coat led to the Telecomix scanning of the Syrian web space.

There were disputes devoted to ethical and unethical use of products is simply to distinguish.

Documents published by WikiLeaks show 160 firms advertising surveillance gear. British firm Gamma International brags can spy users of Gmail, iTunes, Skype.

Share

Playing Judge

Tuesday, January 10th, 2012
Share
Get Rid Off Web Censorship In One Mouse Click
www.smarthide.com
Use the Internet freely and without worring about any censor.
Playing Judge

Playing Judge

I have asked several publications in order to get the idea proposed by web censorship in India, my views are not at all comprehensively represented anywhere, here is the conclusion one should be opened for the criticism.

Why not deal with defamatory in nature or something that is concerned with it. Mechanism in place where the content can be removed while the content is flagged, it violates the conditions and terms. The key problem who will play the judge. Perhaps Kapil Sibal is right person for playing judge. Is it Facebook or Twitter or Google? Do take IT rules analyzed in April, the government in India gives a judgment for the social networking sites that are in position for making a judgment or forcing to comply written requests for changing.

The method of looking at it is that I need to save my face that is why I will block it. If the networking site is not blocked then the government can pass to the ISP and then get the block access for the network site. So finally who must play judge? If there’s an issue, then take it to court, the society mandated the responsibility , Google or Sibal. Have a committee with the judges and then be transparent about the reasons.

What is happening for the present moment is the search for creating something for example a set of guidelines, the legal process is cumbersome, too long, it is impossible and unviable for someone to do it. Can you expect these people judging what kind of content people put online before it rises up? It will kill messaging system and reorganize meaningful conversations and discussions.

The IT rules usually provide safety, but they are flawed, one of my fears is that something may actually be used to make the IT rules look true too life. People will be furious about suggestions but in comparison accept arbitrary and opast post-censorship which is what the IT rules allow. The IT rules need to be amended.

How can we allow the government to settle the question about can be posted on the web and what not. I expect humans to go through what is personal message between us, it is really ridiculous. What can we tell about the privacy?

The construct of social communities can be considered into account. On Twitter every information can be visible to everyone. Using Facebook profile users can choose an image or message to friends or group. Google : one can showcase the content to different circles of audience. This space is evolving. It is private – this line gives the difference between the platforms and intentions. It should be poorly thought out how to protect the privacy.

Just target twitter, Facebook , Google? The entire web possess malicious content. What are you going to do about the entire expanse of the web? How will you stop it? It is like saying that there is a crime happened somewhere or something else, one can check the intent of every individual before he steps out.

What do they think about? Some abuse actions in the streets in India all the time, it is not the same in the net. The official representatives are using as a ruse for bringing to the web, it is taking the worst scenario and using justifying all forms of censorship. It is some kind of slippery slope that can be either made either as guidelines allowing arbitrary censorship, not transparent at all, they are not transparent at all – using national security as normal excuse.

I am not much of a lawyer but it seems to me there are laws for every single one of the concerns the government must have. Defamation is defamation and abuse is abuse. The viral nature of the web is some kind of issue, it can be an excuse for opening the web. We have a choice: according to it the adults can be responsible for the conduct and must choose the words they pronounce and also be responsible for their children.

I have some other concern and we must agree with it- we seem to have become very sensible. A certain sense of irreverence that has been lost in society and we are so touchy about it. The internet is the place where someone can start a hatshtag what is rather critique of the person.

Sibal is trying to address the wrong part of trouble – instead of the government that controls – they are trying to curtail some expression that can lead to violence, it is usually because of religious or political opportunism.

My vision of this is the Internet and its final frontier for freedom of expression, governments are now worried about organizing the opinion and activity that it allows, it is threatening the outdated ways of governing.

Share