Internet Censorship in Thailand: User Practices and Potential Threats

Total Page:16

File Type:pdf, Size:1020Kb

Internet Censorship in Thailand: User Practices and Potential Threats Internet Censorship in Thailand: User Practices and Potential Threats Genevieve Gebhart∗†1, Anonymous Author 2, Tadayoshi Kohno† ∗Electronic Frontier Foundation †University of Washington [email protected] [email protected] 1 Abstract—The “cat-and-mouse” game of Internet censorship security community has proposed novel circumvention and circumvention cannot be won by capable technology methods in response [10, 25, 38]. alone. Instead, that technology must be available, The goal of circumventing censorship and attaining freer comprehensible, and trustworthy to users. However, the field access to information, however, relies on those largely focuses only on censors and the technical means to circumvent them. Thailand, with its superlatives in Internet circumvention methods being available, comprehensible, use and government information controls, offers a rich case and trustworthy to users. Only by meeting users’ needs can study for exploring users’ assessments of and interactions with circumvention tools realize their full technical capabilities. censorship. We survey 229 and interview 13 Internet users in With this goal in mind, the field lacks sufficient inquiry Thailand, and report on their current practices, experienced into the range of user perceptions of and interactions with and perceived threats, and unresolved problems regarding censorship. How do users assess censored content? What is censorship and digital security. Our findings indicate that the range of their reactions when they encounter existing circumvention tools were adequate for respondents to censorship? How does censorship affect the way they not access blocked information; that respondents relied to some only access but also produce information? extent on risky tool selection and inaccurate assessment of blocked content; and that attempts to take action with In addition to guiding more thorough anti-circumvention sensitive content on social media led to the most concrete strategies, these questions about users and censorship can threats with the least available technical defenses. Based on act as a lens into broader security issues. Users’ these findings and in direct response to these problems, we perspectives on censorship have wide-ranging implications make recommendations for shifting objectives in anti- for security behaviors both on and offline [51, 55], censorship work, as well as for technical directions and future especially in the politically repressive, low-resource research to address users’ on-the-ground needs. environments in which common-sense censorship circumvention technologies are most needed. Looking at 1. Introduction users’ censorship circumvention strategies can produce insights into the vulnerabilities of those strategies and the The “cat-and-mouse” game of Internet censorship and varied content perceptions, risk assessments, and self- circumvention cannot be won by capable technology alone. censorship practices that inform them. Overall, these This ongoing struggle generally pits government-level questions can guide research priorities toward safer Internet censors seeking to block citizens’ access to content against use. researchers and developers devising ways to circumvent In order to address the gap in understanding around users such blocks. In the middle, users face the often-overlooked and censorship, we report on the results of online surveys task of putting these circumvention tools into action and and in-depth interviews with users of the Internet in reconciling them with on-the-ground conditions. Thailand. This effort represents a cross-disciplinary The bulk of research on censorship circumvention collaboration among authors from information science, focuses on the former two sides of this “game” and their sociology, and computer security, as well as Southeast deployment of increasingly sophisticated technologies Asian studies. Using standard sampling methodologies, we against each other. On one side, government censorship surveyed 229 and interviewed 13 respondents until policies have received in-depth study [28, 46, 54], and reaching a “point of saturation” at which new respondents corresponding technical measurements of censorship are did not reveal new information. These methods were well developed [1, 14, 16, 47, 53]. On the other side, the approved through our institution’s IRB to protect respondents’ privacy and safety. This deep dive into users in a particular setting—in this 1. Genevieve Gebhart conducted this research at the University of case, Thailand under military dictatorship—allows us to Washington. She is now at the Electronic Frontier Foundation. have a concrete, informed discussion about the risks and 2. The second author is a Thai citizen and preferred to remain anonymous. challenges real individuals face with existing technologies in a repressive environment. We focus our investigation on directions to address respondents’ three unresolved Thailand for the superlatives it exhibits in information problems above: a browser extension to aid in content controls, government repression, and Internet use. assessment, tool delivery strategies to help with tool Conclusions about our sample provide lessons for efforts to selection, and changes to build plausible deniability into protect users in other politically repressive contexts, existing social media platforms. We hope these particularly in neighboring Southeast and East Asian states. recommendations for future action, and the findings on The challenges and nuances of this extreme environment which they draw, will inform a next generation of anti- can also motivate the development of stronger security censorship tools even more closely tied to real users’ measures valuable to users in any setting. practices and challenges. We organize our findings around users’ current practices, threats, and unresolved problems, as well as other pertinent 2. Background and Related Work observations. Here we preview the takeaways from each section: To provide the necessary context for our respondents’ • Current practices. Most respondents were able to survey and interview responses, we offer brief background access censored content with existing technical tools on Internet censorship in Thailand before situating our and ad hoc methods. However, respondents tended study within three areas of related work: user practices and to search for new tools every time they encountered needs, censorship circumvention and resistant systems, and blocked content, an incident-driven strategy that left the impact of censorship on user behavior. them vulnerable to malware and surveillance. Further, respondents did not always accurately assess the actors and methods behind blocked 2.1. Internet Censorship in Thailand content. Respondents also took extensive precautions on social media to avoid consequences With unique censorship implementation and rationale, as from their peers as well as from the government. well as an escalating environment of direct and indirect • Threats. Respondents faced direct, concrete threats censorship, Thailand represents a valuable case study in on social media, primarily from politically motivated how users interact with Internet censorship. peers. Respondents’ perceived, hypothetical threats Internet censorship in Thailand was formally legislated revolved around uncertain, self-contradictory with the Computer Crime Act of 2007. Among other conceptions of government capacity and will. These provisions, this act criminalized the concealment of one’s vague perceptions nevertheless informed IP address, a key element of technical censorship respondents’ behavior. We also highlight threats that circumvention strategies, thus ushering in “much more respondents may have overlooked, including draconian Internet censorship than in China, Saudi Arabia, government phishing and malicious proxies. Iran, or even Vietnam” [56]. The act has faced international • Unresolved problems. Respondents’ most urgent criticism in particular for the broad discretion it gives the unresolved problems were with content assessment, government to interpret what does or does not constitute a tool selection, and safe engagement on social media. computer crime violation [49]. • Additional observations. Both quantitative and Since then, the volume, range, and methods for qualitative evidence pointed to a correlation between restricting blocked content have accelerated. Tests in 2006, how often respondents encountered blocked content 2010, and after the most recent military coup in 2014 found and their tendency to self-censor. Further, blocked that implementation of censorship was highly inconsistent content had complicated meaning and symbolism among Thai ISPs in terms of content filtered, mechanisms even to respondents who did not want or need to used to filter it, and block pages visible to users as a result access it. Finally, respondents did not exhibit [40, 41, 48]. Such large-scale variation poses a challenge to exclusively pro- or anti-censorship attitudes. technical measurements, making user testimony particularly valuable. Together, these findings motivate a discussion about The defining characteristic of censorship in Thailand is shifting objectives in censorship work in particular and lèse majesté, a Thai law that criminalizes insulting, security research in general. Our findings demonstrate that threatening, or defaming Thailand’s monarchy, particularly fighting censorship requires more than access to blocked the late King Bhumibol. With 70 years on the throne and content;
Recommended publications
  • Thailand's Red Networks: from Street Forces to Eminent Civil Society
    Southeast Asian Studies at the University of Freiburg (Germany) Occasional Paper Series www.southeastasianstudies.uni-freiburg.de Occasional Paper N° 14 (April 2013) Thailand’s Red Networks: From Street Forces to Eminent Civil Society Coalitions Pavin Chachavalpongpun (Kyoto University) Pavin Chachavalpongpun (Kyoto University)* Series Editors Jürgen Rüland, Judith Schlehe, Günther Schulze, Sabine Dabringhaus, Stefan Seitz The emergence of the red shirt coalitions was a result of the development in Thai politics during the past decades. They are the first real mass movement that Thailand has ever produced due to their approach of directly involving the grassroots population while campaigning for a larger political space for the underclass at a national level, thus being projected as a potential danger to the old power structure. The prolonged protests of the red shirt movement has exceeded all expectations and defied all the expressions of contempt against them by the Thai urban elite. This paper argues that the modern Thai political system is best viewed as a place dominated by the elite who were never radically threatened ‘from below’ and that the red shirt movement has been a challenge from bottom-up. Following this argument, it seeks to codify the transforming dynamism of a complicated set of political processes and actors in Thailand, while investigating the rise of the red shirt movement as a catalyst in such transformation. Thailand, Red shirts, Civil Society Organizations, Thaksin Shinawatra, Network Monarchy, United Front for Democracy against Dictatorship, Lèse-majesté Law Please do not quote or cite without permission of the author. Comments are very welcome. Requests and inquiries concerning reproduction and rights should be addressed to the author in the first instance.
    [Show full text]
  • Reporters Without Borders TV5 Monde Prize 2015 Nominees
    Reporters Without Borders ­ TV5 Monde Prize 2015 Nominees Journalist Category Mahmoud Abou Zeid, aka Shawkan (Egypt) “I am a photojournalist, not a criminal,” Shawkan wrote from Tora prison in February. “My ​ ​ ​ indefinite detention is psychologically unbearable. Not even animals would survive in these conditions." ​ Shawkan is an Egyptian freelance photojournalist who has been in pre­trial detention for more than 760 days. He was arrested on 14 August 2013 while providing the US photojournalism agency Demotix and the US digital media company Corbis with coverage of ​ ​ ​ ​ the violence used to disperse demonstrations by deposed President Mohamed Morsi’s supporters in Rabiaa Al­Awadiya Square. Three journalists were killed that day in connection with their work Aged 28, Shawkan covered developments in Egypt closely from Mubarak’s fall to Morsi’s overthrow and on several occasions obtained striking shots of the popular unrest. His detention became illegal in August of this year because, under Egyptian law, pre­trial detention may surpass two years only in exceptional cases. Few people in Egypt have ever been held pending trial as long as him. A date has finally been set for the start of his trial, 12 December 2015, when he will be prosecuted before a Cairo criminal court along with more than 700 other defendants including members of the Muslim Brotherhood, which was declared a terrorist organization in December 2013. Many charges have been brought against him without any evidence, according to his lawyer, Karim Abdelrady. The most serious include joining a banned organization [the Muslim Brotherhood], murder, attacking the security forces and possession of weapons.
    [Show full text]
  • The Limits of Commercialized Censorship in China
    The Limits of Commercialized Censorship in China Blake Miller∗ September 27, 2018 Abstract Despite massive investment in China's censorship program, internet platforms in China are rife with criticisms of the government and content that seeks to organize opposition to the ruling Communist Party. Past works have attributed this \open- ness" to deliberate government strategy or lack of capacity. Most, however, do not consider the role of private social media companies, to whom the state delegates information controls. I suggest that the apparent incompleteness of censorship is largely a result of principal-agent problems that arise due to misaligned incentives of government principals and private media company agents. Using a custom dataset of annotated leaked documents from a social media company, Sina Weibo, I find that 16% of directives from the government are disobeyed by Sina Weibo and that disobedience is driven by Sina's concerns about censoring more strictly than com- petitor Tencent. I also find that the fragmentation inherent in the Chinese political system exacerbates this principal agent problem. I demonstrate this by retrieving actual censored content from large databases of hundreds of millions of Sina Weibo posts and measuring the performance of Sina Weibo's censorship employees across a range of events. This paper contributes to our understanding of media control in China by uncovering how market competition can lead media companies to push back against state directives and increase space for counterhegemonic discourse. ∗Postdoctoral Fellow, Program in Quantitative Social Science, Dartmouth College, Silsby Hall, Hanover, NH 03755 (E-mail: [email protected]). 1 Introduction Why do scathing criticisms, allegations of government corruption, and content about collective action make it past the censors in China? Past works have theorized that regime strategies or state-society conflicts are the reason for incomplete censorship.
    [Show full text]
  • Shedding Light on Mobile App Store Censorship
    Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China.
    [Show full text]
  • Threat Modeling and Circumvention of Internet Censorship by David Fifield
    Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements.
    [Show full text]
  • Array AG 9.4 CLI Handbook
    Array AG 9.4 CLI Handbook Copyright Statement Copyright Statement Copyright©2000-2018 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved. This document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and compilation. No part of this document can be reproduced in any form by any means without prior written authorization of Array Networks. Documentation is provided “as is” without warranty of any kind, either express or implied, including any kind of implied or express warranty of non-infringement or the implied warranties of merchantability or fitness for a particular purpose. Array Networks reserves the right to change any products described herein at any time, and without notice. Array Networks assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to in writing by Array Networks. The use and purchase of this product does not convey a license to any patent copyright, or trademark rights, or any other intellectual property rights of Array Networks. Warning: Modifications made to the Array Networks unit, unless expressly approved by Array Networks, could void the user’s authority to operate the equipment. Declaration of Conformity We, Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, CA 95035, 1-866-692-7729; declare under our sole responsibility that the product(s) Array Networks, Array Appliance complies with Part 15 of FCC Rules. Operation is subject to the following two conditions: (1) this device can not cause harmful interference, and (2) this device must accept any interference received, including interference that can cause undesired operation.
    [Show full text]
  • An Internet-Wide, Longitudinal Censorship Observatory
    Session 1A: Anonymous Routing and Censorship CCS '20, November 9–13, 2020, Virtual Event, USA Censored Planet: An Internet-wide, Longitudinal Censorship Observatory Ram Sundara Raman, Prerana Shenoy, Katharina Kohls∗, Roya Ensafi University of Michigan, ∗Ruhr University Bochum {ramaks, pbshenoy, ensafi}@umich.edu,∗[email protected] ABSTRACT 1 INTRODUCTION Remote censorship measurement techniques offer capabilities for The Internet Freedom community’s understanding of the current monitoring Internet reachability around the world. However, op- state and global scope of censorship remains limited: most work erating these techniques continuously is labor-intensive and re- has focused on the practices of particular countries, or on the reach- quires specialized knowledge and synchronization, leading to lim- ability of limited sets of online services from a small number of ited adoption. In this paper, we introduce Censored Planet, an online volunteers. Creating a global, data-driven view of censorship is a censorship measurement platform that collects and analyzes mea- challenging proposition, since practices are intentionally opaque, surements from ongoing deployments of four remote measurement censorship mechanisms may vary, and there are numerous loca- techniques (Augur, Satellite/Iris, Quack, and Hyperquack). Cen- tions where disruptions can occur. Moreover, the behavior of the sored Planet adopts a modular design that supports synchronized network can vary depending on who is requesting content from baseline measurements on six Internet protocols as well as cus- which location. tomized measurements that target specific countries and websites. Established efforts to measure censorship globally utilize dis- Censored Planet has already collected and published more than tributed deployments or volunteer networks of end-user devices [7, 21.8 billion data points of longitudinal network observations over 104].
    [Show full text]
  • A Privacy Threat for Internet Users in Internet-Censoring Countries
    A Privacy Threat for Internet Users in Internet-censoring Countries Feno Heriniaina R. College of Computer Science, Chongqing University, Chongqing, China Keywords: Censorship, Human Computer Interaction, Privacy, Virtual Private Networks. Abstract: Online surveillance has been increasingly used by different governments to control the spread of information on the Internet. The magnitude of this activity differs widely and is based primarily on the areas that are deemed, by the state, to be critical. Aside from the use of keywords and the complete domain name filtering technologies, Internet censorship can sometimes even use the total blocking of IP addresses to censor content. Despite the advances, in terms of technology used for Internet censorship, there are also different types of circumvention tools that are available to the general public. In this paper, we report the results of our investigation on how migrants who previously had access to the open Internet behave toward Internet censorship when subjected to it. Four hundred and thirty-two (432) international students took part in the study that lasted two years. We identified the most common circumvention tools that are utilized by the foreign students in China. We investigated the usability of these tools and monitored the way in which they are used. We identified a behaviour-based privacy threat that puts the users of circumvention tools at risk while they live in an Internet-censoring country. We also recommend the use of a user-oriented filtering method, which should be considered as part of the censoring system, as it enhances the performance of the screening process and recognizes the real needs of its users.
    [Show full text]
  • Forbidden Feeds: Government Controls on Social Media in China
    FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and
    [Show full text]
  • Of Contemporary Popular Music
    Vanderbilt Journal of Entertainment & Technology Law Volume 11 Issue 2 Issue 2 - Winter 2009 Article 2 2009 The "Spiritual Temperature" of Contemporary Popular Music Tracy Reilly Follow this and additional works at: https://scholarship.law.vanderbilt.edu/jetlaw Part of the Entertainment, Arts, and Sports Law Commons, and the First Amendment Commons Recommended Citation Tracy Reilly, The "Spiritual Temperature" of Contemporary Popular Music, 11 Vanderbilt Journal of Entertainment and Technology Law 335 (2020) Available at: https://scholarship.law.vanderbilt.edu/jetlaw/vol11/iss2/2 This Article is brought to you for free and open access by Scholarship@Vanderbilt Law. It has been accepted for inclusion in Vanderbilt Journal of Entertainment & Technology Law by an authorized editor of Scholarship@Vanderbilt Law. For more information, please contact [email protected]. The "Spiritual Temperature" of Contemporary Popular Music: An Alternative to the Legal Regulation of Death-Metal and Gangsta-Rap Lyrics Tracy Reilly* ABSTRACT The purpose of this Article is to contribute to the volume of legal scholarship that focuses on popular music lyrics and their effects on children. This interdisciplinary cross-section of law and culture has been analyzed by legal scholars, philosophers, and psychologists throughout history. This Article specifically focuses on the recent public uproar over the increasingly violent and lewd content of death- metal and gangsta-rap music and its alleged negative influence on children. Many legal scholars have written about how legal and political efforts throughout history to regulate contemporary genres of popular music in the name of the protection of children's morals and well-being have ultimately been foiled by the proper judicial application of solid First Amendment free-speech principles.
    [Show full text]
  • Blocking-Resistant Communication Through Domain Fronting
    Proceedings on Privacy Enhancing Technologies 2015; 2015 (2):46–64 David Fifield*, Chang Lan, Rod Hynes, Percy Wegmann, and Vern Paxson Blocking-resistant communication through domain fronting Abstract: We describe “domain fronting,” a versatile 1 Introduction censorship circumvention technique that hides the re- mote endpoint of a communication. Domain fronting Censorship is a daily reality for many Internet users. works at the application layer, using HTTPS, to com- Workplaces, schools, and governments use technical and municate with a forbidden host while appearing to com- social means to prevent access to information by the net- municate with some other host, permitted by the cen- work users under their control. In response, those users sor. The key idea is the use of different domain names at employ technical and social means to gain access to the different layers of communication. One domain appears forbidden information. We have seen an ongoing conflict on the “outside” of an HTTPS request—in the DNS re- between censor and censored, with advances on both quest and TLS Server Name Indication—while another sides, more subtle evasion countered by more powerful domain appears on the “inside”—in the HTTP Host detection. header, invisible to the censor under HTTPS encryp- Circumventors, at a natural disadvantage because tion. A censor, unable to distinguish fronted and non- the censor controls the network, have a point working fronted traffic to a domain, must choose between allow- in their favor: the censor’s distaste for “collateral dam- ing circumvention traffic and blocking the domain en- age,” incidental overblocking committed in the course of tirely, which results in expensive collateral damage.
    [Show full text]
  • The Impact of Media Censorship: Evidence from a Field Experiment in China
    The Impact of Media Censorship: Evidence from a Field Experiment in China Yuyu Chen David Y. Yang* January 4, 2018 — JOB MARKET PAPER — — CLICK HERE FOR LATEST VERSION — Abstract Media censorship is a hallmark of authoritarian regimes. We conduct a field experiment in China to measure the effects of providing citizens with access to an uncensored Internet. We track subjects’ me- dia consumption, beliefs regarding the media, economic beliefs, political attitudes, and behaviors over 18 months. We find four main results: (i) free access alone does not induce subjects to acquire politically sen- sitive information; (ii) temporary encouragement leads to a persistent increase in acquisition, indicating that demand is not permanently low; (iii) acquisition brings broad, substantial, and persistent changes to knowledge, beliefs, attitudes, and intended behaviors; and (iv) social transmission of information is statis- tically significant but small in magnitude. We calibrate a simple model to show that the combination of low demand for uncensored information and the moderate social transmission means China’s censorship apparatus may remain robust to a large number of citizens receiving access to an uncensored Internet. Keywords: censorship, information, media, belief JEL classification: D80, D83, L86, P26 *Chen: Guanghua School of Management, Peking University. Email: [email protected]. Yang: Department of Economics, Stanford University. Email: [email protected]. Yang is deeply grateful to Ran Abramitzky, Matthew Gentzkow, and Muriel Niederle
    [Show full text]