NO ACCESS LGBTIQ Website Censorship in Six Countries
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Internet Censorship and Resistance May 15, 2009 1 / 32 Historical Censorship
INTERNET CENSORSHIP AND RESISTANCE Joseph Bonneau [email protected] (thanks to Steven Murdoch) Computer Laboratory Gates Scholars' Symposium 2010 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 1 / 32 Historical Censorship He who controls the past controls the future, and he who controls the present controls the past —George Orwell, Nineteen Eighty Four, 1949 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 2 / 32 Historical Censorship He who controls the past controls the future, and he who controls the present controls the past —George Orwell, Nineteen Eighty Four, 1949 Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 2 / 32 Information as a Human Right Everyone has the right to freedom of opinion and expres- sion; this right includes freedom to hold opinions without inter- ference and to seek, receive and impart information and ideas through any media and regardless of frontiers. —Article 19, UN Declaration of Human Rights (1948) Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 3 / 32 Information as a Human Right The final freedom, one that was probably inherent in what both President and Mrs. Roosevelt thought about and wrote about all those years ago, ... is the freedom to connect—the idea that governments should not prevent people from con- necting to the internet, to websites, or to each other... a new information curtain is descending across much of the world. —Hillary Clinton, US Secretary of State (2010) Joseph Bonneau (University of Cambridge) Internet Censorship and Resistance May 15, 2009 3 / 32 The Internet Dream The Net treats censorship as damage and routes around it. -
Jury Convicts Man in Mount Vernon Double Murder by Steve Charing Hearing a Wisecrack from One of the Men
AN INDEPENDENT VOICE FOR THE LESBIAN, GAY, BISEXUAL, AND TRANSGENDER COMMUNITIES OUT August 21, 2015 | Volume XIII, Issue 8 Jury Convicts Man in Mount Vernon Double Murder BY STEVE CHARING hearing a wisecrack from one of the men. Although both Three years after a botched robbery led to A third unidentified man was also involved victims were gay, the murder of two men in Mount Vernon, a in the robbery but identified Bass from a police ruled out a Baltimore jury convicted Quinton Decarlo photo lineup, according to the Baltimore hate crime as they Bass, 28 where he faces two life sentenc- Sun. determined that the es plus 140 years for fatally shooting Law- Three weeks after the shooting, po- motive for the attack rence Peterson, 56, and Joseph Alexander lice said that Bass, a drifter from Raleigh, was robbery. Ulrich, “Alex” Ulrich, Jr., 40. North Carolina, was ar- an actor who Ulrich died from gunshot wounds that rested on gun charges on had worked day. Peterson died in May 2014 following August 31, 2012. Officers ‘A case of with special- multiple surgeries and rehabilitation as a took Bass, who had a pre- senseless needs chil- result of shots to his torso. vious criminal record, into dren, had re- Larry Peterson and Alex Ulrich The victims were standing on the front custody after they found violence’ cently moved steps of a bed and breakfast – Empire him and four others drink- to Baltimore to start a photography as well as robbery and handgun counts. House, an historic 1874 brownstone – that ing alcohol in East Mount career. -
Review of the EU Copyright Framework
Review of the EU copyright framework European Implementation Assessment Review of the EU copyright framework: The implementation, application and effects of the "InfoSoc" Directive (2001/29/EC) and of its related instruments European Implementation Assessment Study In October 2014, the Committee on Legal Affairs (JURI) requested from the European Parliament Research Service (EPRS) an Ex Post Impact Assessment on Directive 2001/29/EC on the harmonisation of certain aspects of copyright and related rights in the information society (InfoSoc). This EPRS publication was originally commissioned in the context of JURI's own- initiative implementation report, which was adopted in Plenary in July 2015, Rapporteur Julia Reda MEP. However, it is also relevant to the work of JURI Committees' Working Group on Intellectual Property Rights and Copyright (CWG), chaired by Jean Marie Cavada MEP. Furthermore, this request was made in the wider context of the Commission's review of the EU legislative framework on copyright, and the ensuing legislative proposals, which have been a long time in the planning and which are now expected for the 4th quarter of 2015. The objective of these proposals is to modernise the EU copyright framework, and in particular the InfoSoc Directive, in light of the digital transformation. Accordingly, in response to the JURI request, the Ex-Post Impact Assessment Unit of the European Parliament Research Service decided to produce a "European Implementation Assessment on the review of the EU copyright framework". Implementation reports of EP committees are now routinely accompanied by European Implementation Assessments, drawn up by the Ex-Post Impact Assessment Unit of the Directorate for Impact Assessment and European Added Value, within the European Parliament's Directorate-General for Parliamentary Research Services. -
Everyone's Guide to Bypassing Internet Censorship
EVERYONE’S GUIDE TO BY-PASSING INTERNET CENSORSHIP FOR CITIZENS WORLDWIDE A CIVISEC PROJECT The Citizen Lab The University of Toronto September, 2007 cover illustration by Jane Gowan Glossary page 4 Introduction page 5 Choosing Circumvention page 8 User self-assessment Provider self-assessment Technology page 17 Web-based Circumvention Systems Tunneling Software Anonymous Communications Systems Tricks of the trade page 28 Things to remember page 29 Further reading page 29 Circumvention Technologies Circumvention technologies are any tools, software, or methods used to bypass Inter- net filtering. These can range from complex computer programs to relatively simple manual steps, such as accessing a banned website stored on a search engine’s cache, instead of trying to access it directly. Circumvention Providers Circumvention providers install software on a computer in a non-filtered location and make connections to this computer available to those who access the Internet from a censored location. Circumvention providers can range from large commercial organi- zations offering circumvention services for a fee to individuals providing circumven- tion services for free. Circumvention Users Circumvention users are individuals who use circumvention technologies to bypass Internet content filtering. 4 Internet censorship, or content filtering, has become a major global problem. Whereas once it was assumed that states could not control Internet communications, according to research by the OpenNet Initiative (http://opennet.net) more than 25 countries now engage in Internet censorship practices. Those with the most pervasive filtering policies have been found to routinely block access to human rights organi- zations, news, blogs, and web services that challenge the status quo or are deemed threatening or undesirable. -
Shedding Light on Mobile App Store Censorship
Shedding Light on Mobile App Store Censorship Vasilis Ververis Marios Isaakidis Humboldt University, Berlin, Germany University College London, London, UK [email protected] [email protected] Valentin Weber Benjamin Fabian Centre for Technology and Global Affairs University of Telecommunications Leipzig (HfTL) University of Oxford, Oxford, UK Humboldt University, Berlin, Germany [email protected] [email protected] ABSTRACT KEYWORDS This paper studies the availability of apps and app stores across app stores, censorship, country availability, mobile applications, countries. Our research finds that users in specific countries do China, Russia not have access to popular app stores due to local laws, financial reasons, or because countries are on a sanctions list that prohibit ACM Reference Format: Vasilis Ververis, Marios Isaakidis, Valentin Weber, and Benjamin Fabian. foreign businesses to operate within its jurisdiction. Furthermore, 2019. Shedding Light on Mobile App Store Censorship. In 27th Conference this paper presents a novel methodology for querying the public on User Modeling, Adaptation and Personalization Adjunct (UMAP’19 Ad- search engines and APIs of major app stores (Google Play Store, junct), June 9–12, 2019, Larnaca, Cyprus. ACM, New York, NY, USA, 6 pages. Apple App Store, Tencent MyApp Store) that is cross-verified by https://doi.org/10.1145/3314183.3324965 network measurements. This allows us to investigate which apps are available in which country. We primarily focused on the avail- ability of VPN apps in Russia and China. Our results show that 1 INTRODUCTION despite both countries having restrictive VPN laws, there are still The widespread adoption of smartphones over the past decade saw many VPN apps available in Russia and only a handful in China. -
Sexual Preferences and Presentation on Geosocial Networking Apps by Indian Men Who Have Sex with Men in Maharashtra
JMIR MHEALTH AND UHEALTH Rhoton et al Original Paper Sexual Preferences and Presentation on Geosocial Networking Apps by Indian Men Who Have Sex With Men in Maharashtra Jayson Rhoton1*, MA; J Michael Wilkerson1*, MPH, PhD; Shruta Mengle2*, MSc; Pallav Patankar2, MBA; BR Simon Rosser3*, LP, MPH, PhD; Maria L Ekstrand4, PhD 1Department of Health Promotion and Behavioral Sciences, The University of Texas Health Sceince Center Houston, Houston, TX, United States 2The Humsafar Trust, Mumbai, Maharashtra, India 3School of Public Health, University of Minnesota, Minneapolis, MN, United States 4Center for AIDS Prevention Studies, University of California San Francisco, San Francisco, CA, United States *these authors contributed equally Corresponding Author: Jayson Rhoton, MA Department of Health Promotion and Behavioral Sciences The University of Texas Health Sceince Center Houston 7000 Fannin Street 2610 I Houston, TX, 77030 United States Phone: 1 713 500 9757 Fax: 1 713 500 9750 Email: [email protected] Abstract Background: The affordability of smartphones and improved mobile networks globally has increased the popularity of geosocial networking (GSN) apps (eg, Grindr, Scruff, Planetromeo) as a method for men who have sex with men (MSM) to seek causal sex partners and engage with the queer community. As mobile penetration continues to grow in India, it is important to understand how self-presentation on GSN app is relevant because it offers insight into a population that has not been largely studied. There is very little information about how Indian MSM discuss their sexual preferences and condom preferences and disclose their human immunodeficiency virus (HIV) status with potential sex partners on Web-based platforms. -
Psiphon User Guide
PSIPHON USER GUIDE Psiphon is a free and open source web proxy that helps internet users bypass content-filtering systems used by governments in countries like China, Iran, Saudi Arabia, and Vietnam. It was developed by the Citizen Lab's CiviSec Project at the University of Toronto and was first released in December 2006. In this how to guide, learn how to provide a proxy service to someone behind a firewall with psiphon . If you are behind a firewall and want to learn how to connect to psiphon and access blocked content, check out this how to guide . Psiphon, unlike other circumvention services, is not intended to be a public, open proxy service. It’s based on a “web of trust” system so psiphon nodes are harder to block. What this means is that a person in an unrestricted location (one that is not behind a firewall) provides a psiphon proxy service to a person they are familiar with who is going online in a place where online access is limited. This is known as a psiphonode . A psiphonite is a psiphon user living in a censored country. The psiphonite connects to a psiphonode (set up by someone they know and trust) to access information freely. NOTE: Psiphon only works on Windows and Linux. There is no Mac version yet. Step 1. First, you should be in a location where you have open access to the internet. You should know someone in another location where access is limited. You will be providing a psiphonode for this person. Tip! If you do not know any psiphon users, but still want to provide a psiphonode, you can find users on psiphon’s Facebook page or Twitter page. -
Threat Modeling and Circumvention of Internet Censorship by David Fifield
Threat modeling and circumvention of Internet censorship By David Fifield A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor J.D. Tygar, Chair Professor Deirdre Mulligan Professor Vern Paxson Fall 2017 1 Abstract Threat modeling and circumvention of Internet censorship by David Fifield Doctor of Philosophy in Computer Science University of California, Berkeley Professor J.D. Tygar, Chair Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities|such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations. My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. -
Best VPN Services in 2017 (Speed, Cost & Usability Reviews)
10/8/2017 Best VPN Services in 2017 (Speed, Cost & Usability Reviews) Best VPN Services VPN Reviews & In-Depth Comparisons Brad Smith Sep 18, 2017 With the help of John & Andrey (https://thebestvpn.com/contact-us/), we’ve put together a list of best VPNs. We compared their download/upload speed, support, usability, cost, servers, countries and features. We also analyzed their TOS to see if they keep logs or not and whether they allow P2P and work with Netflix. here’s a link to the spreadsheet (https://docs.google.com/spreadsheets/d/11IZdVCBjVvbdaKx2HKz2hKB4F Z_l8nRJXXubX4FaQj4/) You want to start using a VPN, but don’t know which software/service to use? In this page, we’ve reviewed 30+ most popular VPN services (on going process). In order to find out which are best VPNs, we spent some time on research and speed testing: 1. Installed 30+ VPN software on our personal devices, such as Windows, Mac, Android and iOS and compared their usability. 2. Performed Download/Upload speed tests on speedtest.net to see which had best performing servers. 3. Double checked if they work with Netflix and allow P2P. 4. Read their TOS to verify if they keep logs or not. 5. Compared security (encryption and protocols). That means we’ve dug through a large number of privacy policies (on logging), checked their features, speed, customer support and usability. If you know a good VPN provider that is not listed here, please contact us and we’ll test it out as soon as possible. 5 Best VPNs for Online Privacy and Security Here are the top 5 VPN services of 2017 after our research, analysis, monitoring, testing, and verifying. -
Gay Immigrants and Grindr: Revitalizing Queer Urban Spaces?
Gay Immigrants and Grindr: Revitalizing Queer Urban Spaces? “Gay Dance Clubs on the Wane in the Age of Grindr,” proclaimed the journalist Michael Musto in the New York Times in 2016. Musto, who has reported on gay life in New York for decades, had noticed a decline in weekly dance parties. In speaking to club promoters and performers, Musto kept hearing the same thing: people would rather meet others via the comfort of their mobile phones than in a gay space. (“Clubs have been usurped by the right swipe”; “Social media changed the landscape of going out”; “Why pay an expensive cover charge and deal with rude bouncers when you can just swipe on your iPhone?” and so forth.) Similarly, a New Orleans bartender told gay reporter Chris Staudinger: “You could ask any bartender in New Orleans whether the apps have affected business in gay bars, and they would all say yes.” Scholarly research has also pointed to Grindr (and related platforms) as troublesome technologies that might obviate the need for urban gay spaces. Grindr (founded 2009) is a smartphone-only platform that allows mostly gay men (and also queer and trans people) to connect to others in their immediate vicinity via private messages. Related geo-social apps include gay platforms like Scruff, Hornet, Growler or Chappy, or the app versions of websites like Gaydar or PlanetRomeo, and mainstream equivalents like Tinder and Happn. These geo-locative platforms challenge the idea that a “gay space” needs to be a physical space distinct from a straight space, since the “grids of the Grindr interface can be overlaid atop any space” (Roth 2016: 441). -
Changing Gears
Equity. Dignity. Social Justice. Changing Gears: A guide to effective HIV service programming for gay men and other men who have sex with men in Asia Acknowledgements: This document was developed by an independent consultant, Jan W. de Lind van Wijngaarden, PhD, for UNAIDS Regional Support Team for Asia and the Pacific and APCOM. Invaluable comments, edits and suggestions to improve it were gratefully received from the following peer reviewers: Lou McCallum (APMG), Steve Mills (FHI 360), Niluka Perera and team (Youth Voices Count), Edmund Settle (UNDP Bangkok Regional Hub), Roy Wadia (UNFPA Asia Pacific Regional Office), Donn Colby (Thai Red Cross AIDS Research Centre), Eamonn Murphy (UNAIDS Myanmar), and Vladanka Andreeva, Manuel da Quinta, Tony Lisle and Aries Valeriano (UNAIDS Regional Support Team). EThis policy brief is licensed under a Attribution-NonCommercial-ShareAlike 4.0 International. This means that you are free to share and copy this content, provided APCOM and originating author(s) are acknowledged. Author: Jan W. de Lind van Wijngaarden, PhD Design and layout: Vaness Silpakhon Kongsakul Cover Photo: MStyle, delivering services CSO for LGBT people in Cambodia Source : UNAIDS Regional Support Team for Asia and the Pacific © APCOM 2016 Photo Captions: The photos used throughout this document, excluding the cover photo have all been taken during APCOM related events and workshops, and legally purchased via a online stock images website. These photos are being used without the individuals knowledge of this particular resource. -
EMIS): Design and Methods
Sex Res Soc Policy DOI 10.1007/s13178-013-0119-4 The European Men-Who-Have-Sex-With-Men Internet Survey (EMIS): Design and Methods Peter Weatherburn & Axel J. Schmidt & Ford Hickson & David Reid & Rigmor C. Berg & Harm J. Hospers & Ulrich Marcus & and the EMIS Network. # The Author(s) 2013. This article is published with open access at Springerlink.com Abstract Community-based opportunistic self-completion move towards harmonisation of existing systems. Six asso- surveying for sexual health programming is common among ciated partners (APs) recruited another 77 collaborating men-who-have-sex-with-men (MSM) in Europe, being used partners from academia, public health and civil society to generate evidence of unmet prevention need, for behav- across 35 countries. Partners’ existing MSM surveys were ioural surveillance and as a platform for advocating HIV collected and collated, producing a meta-survey which was precautions. However, comparing survey findings across discussed by all partners through rotating round-tables at a Europe is difficult because of varying measures and recruit- 2-day summit. Survey development continued iteratively ment designs, and surveying has not occurred in all coun- through user piloting and partner feedback until the English tries. EMIS (the European Men-who-have-sex-with-men language content was agreed. Transfer to an online survey Internet Survey) aimed to develop a pan-European Internet application was followed by further testing before on-screen survey on HIV-related male homosexual behaviours and translation into 24 other languages, final testing and sign- prevention needs both to increase research capacity and to off. The project’s visual identity and promotional materials were developed in close collaboration with national leads, : : : P.