SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Internet Freedom and
     Technology
  tommi.karttaavi@isoc.fi
Repressive governments and the Internet

●   Many ways to stifle activism and dissidence on-line
    ●   Censorship
    ●   Blocking
    ●   Tracking
    ●   Disinformation and propaganda
    ●   Intimidation
    ●   Malware and hacking
    ●   Cutting connections altogether
Are Google, Facebook and Twitter activist's
                  best friends?
●    Companies are in it for the money, saving the world is not
     on their agenda
●    Microsoft, Google, Yahoo! and other companies have
     cooperated with the Chinese government in implementing
     a system of internet censorship in mainland China
●    Several Chinese dissidents have been sentenced to long
     prison terms with cooperation from Yahoo!
How to be an on-line freedom fighter and get
               away with it?
●   The same technologies that help activists organize themselves can
    also be used against them
●   Internet service providers or a social networking sites may be legally
    obligated to disclose user information to the authorities
●   Identities can also be revealed indirectly by combining data from
    social networks and public records
●   Technologies exist to provide anonymity and circumvent censorship
    ●   Distributed social networks
    ●   Anonymity networks
    ●   Ad hoc networking
Diaspora

●   Distributed social networking service, providing a
    decentralized alternative to social network services like
    Facebook
●   Users can set up their own server (or "pod") to host
    content
●   Pods can interact to share status updates, photographs
    and other social data
●   Allows users to host their data with a traditional web host,
    a cloud based host, an ISP, or a friend
●   https://joindiaspora.com/
Tor anonymity network

●   Composed of client software and a network of servers
●   Client is based on open source and the network is free to
    use
●   Protects users' personal freedom, privacy, and ability to
    conduct confidential business, by keeping their internet
    activities from being monitored
●   hides communication patterns by relaying data through
    volunteer servers
●   Also able to evade many internet censorship systems
●   https://www.torproject.org
Freenet

●   Decentralized, censorship-resistant distributed data store
●   Creates a private network where users can create
    websites, share files and send/receive emails between
    other members of the network
●   Content is hosted by sharing it amongst users of the
    network
●
    Users cannot select what content they host, and it is
    stored in an encrypted form
●   https://freenetproject.org/
Psiphon

●   Web proxy designed to help Internet users securely
    bypass the content-filtering systems used to censor the
    internet
●   No centralized control; hard to block but also hard for a
    user to find a server
●   No additional software needed
●   http://psiphon.ca/
Ad hoc networking

●   A wireless ad hoc network is a decentralized type of
    wireless network
●   Does not rely on a preexisting infrastructure, such as
    routers in wired networks or access points in managed
    (infrastructure) wireless networks
●   Each node participates in routing by forwarding data for
    other nodes, and so the determination of which nodes
    forward data is made dynamically based on the network
    connectivity
●   http://en.wikipedia.org/wiki/Wireless_ad_hoc_network
Netsukuku

●   Experimental peer-to-peer routing system, created to
    build up a distributed network
●   Anonymous and censorship-free
●   Fully independent but not necessarily separated from
    Internet
●   No need for servers or Internet service providers
●   No central authority, no backbone router or any routing
    equipment other than normal network interface cards
●   http://netsukuku.freaknet.org/
Delay tolerant networking

●   Background in ad-hoc and wireless networking
    development starting from the 70's
●   Later driven by the Interplanetary Internet research
    iniative
●   Could be used in a situation where existing internet
    connections are down
●   http://en.wikipedia.org/wiki/Delay-tolerant_networking
Thank you!



    Contact:
    tommi.karttaavi@isoc.fi

Mais conteúdo relacionado

Mais procurados (20)

Dark web
Dark webDark web
Dark web
 
Darknet
DarknetDarknet
Darknet
 
CarolinaCon 2006 Reverse Engineering 101
CarolinaCon 2006 Reverse Engineering 101CarolinaCon 2006 Reverse Engineering 101
CarolinaCon 2006 Reverse Engineering 101
 
Basics of Blockchain Technology
Basics of Blockchain TechnologyBasics of Blockchain Technology
Basics of Blockchain Technology
 
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
Dark Web Impact on Hidden Services in the Tor-based Criminal Ecosystem Dr.
 
Free Net
Free NetFree Net
Free Net
 
Microformats
MicroformatsMicroformats
Microformats
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
The dark web
The dark webThe dark web
The dark web
 
Dark net
Dark netDark net
Dark net
 
HTTPS
HTTPSHTTPS
HTTPS
 
Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
 
Blockchain technology | Bitcoins
Blockchain technology | BitcoinsBlockchain technology | Bitcoins
Blockchain technology | Bitcoins
 
Deepweb darknet mansukhani
Deepweb darknet mansukhaniDeepweb darknet mansukhani
Deepweb darknet mansukhani
 
Resume harris 19
Resume harris 19Resume harris 19
Resume harris 19
 
Darknet
DarknetDarknet
Darknet
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
A visit to the darknet
A visit to the darknetA visit to the darknet
A visit to the darknet
 

Destaque

Open kvarken2011 04-27karttaavi
Open kvarken2011 04-27karttaaviOpen kvarken2011 04-27karttaavi
Open kvarken2011 04-27karttaaviTommi Karttaavi
 
Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26
Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26
Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26Tommi Karttaavi
 
Avoin lähdekoodi julkisessa hallinnossa
Avoin lähdekoodi julkisessa hallinnossaAvoin lähdekoodi julkisessa hallinnossa
Avoin lähdekoodi julkisessa hallinnossaTommi Karttaavi
 
Tietohallinnon johtamisen ja suunnittelun viitekehykset
Tietohallinnon johtamisen ja suunnittelun viitekehyksetTietohallinnon johtamisen ja suunnittelun viitekehykset
Tietohallinnon johtamisen ja suunnittelun viitekehyksetTommi Karttaavi
 

Destaque (7)

Open kvarken2011 04-27karttaavi
Open kvarken2011 04-27karttaaviOpen kvarken2011 04-27karttaavi
Open kvarken2011 04-27karttaavi
 
Dae2011 04-28
Dae2011 04-28Dae2011 04-28
Dae2011 04-28
 
Kuntakapa2015-09-09
Kuntakapa2015-09-09Kuntakapa2015-09-09
Kuntakapa2015-09-09
 
Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26
Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26
Avoimet ohjelmistot julkisessa hallinnossa 2011-05-26
 
Semic2011 05-18
Semic2011 05-18Semic2011 05-18
Semic2011 05-18
 
Avoin lähdekoodi julkisessa hallinnossa
Avoin lähdekoodi julkisessa hallinnossaAvoin lähdekoodi julkisessa hallinnossa
Avoin lähdekoodi julkisessa hallinnossa
 
Tietohallinnon johtamisen ja suunnittelun viitekehykset
Tietohallinnon johtamisen ja suunnittelun viitekehyksetTietohallinnon johtamisen ja suunnittelun viitekehykset
Tietohallinnon johtamisen ja suunnittelun viitekehykset
 

Semelhante a Socialforum2011 04-02

UNIT2_ - Internet and Intranet.pptxhjjjjjjjjh
UNIT2_ - Internet and Intranet.pptxhjjjjjjjjhUNIT2_ - Internet and Intranet.pptxhjjjjjjjjh
UNIT2_ - Internet and Intranet.pptxhjjjjjjjjhcksojitra08
 
Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseRiskIQ, Inc.
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkSudhriti Gupta
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using themAnjan Mahanta
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksGeekNightHyderabad
 
computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.bushraphd2022
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet abhinavkeesari
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacyPECB
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Introduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectIntroduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectRichard King
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetIRJET Journal
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 

Semelhante a Socialforum2011 04-02 (20)

UNIT2_ - Internet and Intranet.pptxhjjjjjjjjh
UNIT2_ - Internet and Intranet.pptxhjjjjjjjjhUNIT2_ - Internet and Intranet.pptxhjjjjjjjjh
UNIT2_ - Internet and Intranet.pptxhjjjjjjjjh
 
Blockade.io : One Click Browser Defense
Blockade.io : One Click Browser DefenseBlockade.io : One Click Browser Defense
Blockade.io : One Click Browser Defense
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
PPTS DS UNIT-1.pptx
PPTS DS UNIT-1.pptxPPTS DS UNIT-1.pptx
PPTS DS UNIT-1.pptx
 
Networks and the effects of using them
Networks and the effects of using themNetworks and the effects of using them
Networks and the effects of using them
 
Presentation (6).pptx
Presentation (6).pptxPresentation (6).pptx
Presentation (6).pptx
 
FreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networksFreedomBox & Community Wi-Fi networks
FreedomBox & Community Wi-Fi networks
 
computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.computer network introduction. psc notes . Assisant professor in cse.
computer network introduction. psc notes . Assisant professor in cse.
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Decentralized internet
Decentralized  internet Decentralized  internet
Decentralized internet
 
Internet
InternetInternet
Internet
 
Recent developments and future challenges in privacy
Recent developments and future challenges in privacyRecent developments and future challenges in privacy
Recent developments and future challenges in privacy
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Using Network
Using NetworkUsing Network
Using Network
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Introduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring projectIntroduction to the open rights group censorship monitoring project
Introduction to the open rights group censorship monitoring project
 
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, FreenetComparison of Anonymous Communication Networks-Tor, I2P, Freenet
Comparison of Anonymous Communication Networks-Tor, I2P, Freenet
 
intro to iot.pdf
intro to iot.pdfintro to iot.pdf
intro to iot.pdf
 
The Internet 2017.
The Internet 2017.The Internet 2017.
The Internet 2017.
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 

Socialforum2011 04-02

  • 1. Internet Freedom and Technology tommi.karttaavi@isoc.fi
  • 2. Repressive governments and the Internet ● Many ways to stifle activism and dissidence on-line ● Censorship ● Blocking ● Tracking ● Disinformation and propaganda ● Intimidation ● Malware and hacking ● Cutting connections altogether
  • 3. Are Google, Facebook and Twitter activist's best friends? ● Companies are in it for the money, saving the world is not on their agenda ● Microsoft, Google, Yahoo! and other companies have cooperated with the Chinese government in implementing a system of internet censorship in mainland China ● Several Chinese dissidents have been sentenced to long prison terms with cooperation from Yahoo!
  • 4. How to be an on-line freedom fighter and get away with it? ● The same technologies that help activists organize themselves can also be used against them ● Internet service providers or a social networking sites may be legally obligated to disclose user information to the authorities ● Identities can also be revealed indirectly by combining data from social networks and public records ● Technologies exist to provide anonymity and circumvent censorship ● Distributed social networks ● Anonymity networks ● Ad hoc networking
  • 5. Diaspora ● Distributed social networking service, providing a decentralized alternative to social network services like Facebook ● Users can set up their own server (or "pod") to host content ● Pods can interact to share status updates, photographs and other social data ● Allows users to host their data with a traditional web host, a cloud based host, an ISP, or a friend ● https://joindiaspora.com/
  • 6. Tor anonymity network ● Composed of client software and a network of servers ● Client is based on open source and the network is free to use ● Protects users' personal freedom, privacy, and ability to conduct confidential business, by keeping their internet activities from being monitored ● hides communication patterns by relaying data through volunteer servers ● Also able to evade many internet censorship systems ● https://www.torproject.org
  • 7. Freenet ● Decentralized, censorship-resistant distributed data store ● Creates a private network where users can create websites, share files and send/receive emails between other members of the network ● Content is hosted by sharing it amongst users of the network ● Users cannot select what content they host, and it is stored in an encrypted form ● https://freenetproject.org/
  • 8. Psiphon ● Web proxy designed to help Internet users securely bypass the content-filtering systems used to censor the internet ● No centralized control; hard to block but also hard for a user to find a server ● No additional software needed ● http://psiphon.ca/
  • 9. Ad hoc networking ● A wireless ad hoc network is a decentralized type of wireless network ● Does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks ● Each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity ● http://en.wikipedia.org/wiki/Wireless_ad_hoc_network
  • 10. Netsukuku ● Experimental peer-to-peer routing system, created to build up a distributed network ● Anonymous and censorship-free ● Fully independent but not necessarily separated from Internet ● No need for servers or Internet service providers ● No central authority, no backbone router or any routing equipment other than normal network interface cards ● http://netsukuku.freaknet.org/
  • 11. Delay tolerant networking ● Background in ad-hoc and wireless networking development starting from the 70's ● Later driven by the Interplanetary Internet research iniative ● Could be used in a situation where existing internet connections are down ● http://en.wikipedia.org/wiki/Delay-tolerant_networking
  • 12. Thank you! Contact: tommi.karttaavi@isoc.fi