SlideShare uma empresa Scribd logo
1 de 26
do censorship & repression kill content online?




           sami ben gharbia, re:publica10, Berlin, April 15, 2010
silencing online speech, how-to do it?
                                               




 censorship                                           hacking &
                                                        DDOS
                                    @
                                   DPI   ❺
atmosphere                                          punishing &
    of fear                                          persecuting




                                               
e-journalists & bloggers represent 45% of all media workers in prison (CPJ)
threatened voices: country profile page




                 103                     124
threatened voices: blogger profile




                  103               124
threatened voices, who, where, when, what and why?




                 103                   124
threatened voices: data visualization per country




                  103                    124
227 threatened bloggers worldwide - April 2010 (most repressive region)


                       Arab World         Rest Of the World




                                    Arab World
                                       41%
              Rest Of the World
                    59%

                 135                     92
227 threatened bloggers worldwide - April 2010 (most repressive region)


                       Middle East         Rest Of the World




              Rest Of the World
                    45%              Middle East
                                        55%


                 103                      124
voices threatened vs. years in power :)




                  103                     124


                                                credit: anasqtiesh.com
blogs of threatened bloggers, before & after (exp. from Saudi Arabia and Iran)




before                                                                            after




                              103                    124
digital activists networks and censorship (Tunisia)




                                                      credit: Fieke Jansen
is censorship killing content? (Tunisia)




                                           dead websites/blogs
34% of those 67 blocked websites are dead (Tunisia)


                             Dead Websites         Alive




                       44             23
                                   Dead Websites
                                       34%

                     Alive
                     66%
blocked websites, before & after (exp. from Tunisia)




http://www.ltdh.org/ website of the Tunisian League for Human Rights (LTDH) becoming a chinese website!!!
blocked websites, before & after (exp. from Tunisia)




http://www.cnlt98.org/ website the National Council for Liberties in Tunisia (CNLT) becoming a website with sponsored links!!!
blocked websites, before & after (exp. from Tunisia)




      http://tounes.naros.info/ website of another Tunisian NGO, DNS reserved but empty!!!
keyword filtering killing content (images non-visible for users in Tunisia)
deep packet inspection (DPI) killing content inside emails




email as seen from
 outside Tunisia




same email as seen
   from Tunisia
general consequences of online censorship for bloggers & webmasters


   short-term: some publicity & support (tiny % of bloggers)
   long-term: blogger will be left alone
   isolating the blogger from his/her environment
   significant decrease in readership
   significant decrease in interactivity and conversation
   shift from blogging to protest
   doubting the values of blogging
   scaring out and discouraging others bloggers
   killing content
website/blog blocked, what next?
    creating a new blog/website (easy)
          losing page ranking + loosing referring links + confusing
          readership
    migrating (advanced/impossible)
    redirecting to a new DNS (advanced/costly/impossible)
    setting up mirror blog (advanced/costly/impossible)
    setting up a secure website -https- (advanced/costly/
    temporarily/impossible)
    become an “exiled blogger” (temporarily)
    relying on facebook and other web 2.0 platforms as “safe”
    haven (temporarily)
    self-censorship
    stop blogging (RIP ?%)
micro-pipeline as unblockable infrastructure?
cross-posting & mirroring, not always working!
playing with platforms: from youtube to google earth, maps, etc.
sponsored links as unblockable information!
an endless cat-and-mouse game...
                                   thank you
                                   sami ben gharbia

                                   work
                                   advocacy.globalvoicesonline.org
                                   threatened.globalvoicesonline.org

                                   blog & projects
                                   samibengharbia.com
                                   nawaat.org
                                   babtounes.com
                                   cybversion.org
                                   twitter.com/ifikra

                                   email
                                   advocacy@globalvoicesonline.org

Mais conteúdo relacionado

Destaque

Technology Is Annoying
Technology Is AnnoyingTechnology Is Annoying
Technology Is AnnoyingHarper Reed
 
Web Security Overview and Demo
Web Security Overview and DemoWeb Security Overview and Demo
Web Security Overview and DemoTony Bibbs
 
Is MongoDB Right For Your Project (or Organization)
Is MongoDB Right For Your Project (or Organization)Is MongoDB Right For Your Project (or Organization)
Is MongoDB Right For Your Project (or Organization)Tony Bibbs
 
20070921 Uni Softwareengineering
20070921 Uni Softwareengineering20070921 Uni Softwareengineering
20070921 Uni SoftwareengineeringTony Bibbs
 
What the web platform (and your app!) can learn from Node.js
What the web platform (and your app!) can learn from Node.jsWhat the web platform (and your app!) can learn from Node.js
What the web platform (and your app!) can learn from Node.jswbinnssmith
 
Computational Linguistics FCIS'13 - ASU -- Part(I)
Computational Linguistics FCIS'13 - ASU -- Part(I)Computational Linguistics FCIS'13 - ASU -- Part(I)
Computational Linguistics FCIS'13 - ASU -- Part(I)Abdelrahman Othman Helal
 
Offshore Guys Presentation
Offshore Guys PresentationOffshore Guys Presentation
Offshore Guys PresentationCésar Trujillo
 
Improving Untestable Code
Improving Untestable CodeImproving Untestable Code
Improving Untestable CodeTony Bibbs
 
Fueling Future Transportation - Accelerating Energy Innovation
Fueling Future Transportation - Accelerating Energy InnovationFueling Future Transportation - Accelerating Energy Innovation
Fueling Future Transportation - Accelerating Energy Innovationntillmann
 
Summer Summit Marketing Presentation 2013
Summer Summit Marketing Presentation 2013Summer Summit Marketing Presentation 2013
Summer Summit Marketing Presentation 2013Temple University
 
Cross Site Request Forgery
Cross Site Request ForgeryCross Site Request Forgery
Cross Site Request ForgeryTony Bibbs
 

Destaque (12)

Technology Is Annoying
Technology Is AnnoyingTechnology Is Annoying
Technology Is Annoying
 
Web Security Overview and Demo
Web Security Overview and DemoWeb Security Overview and Demo
Web Security Overview and Demo
 
Is MongoDB Right For Your Project (or Organization)
Is MongoDB Right For Your Project (or Organization)Is MongoDB Right For Your Project (or Organization)
Is MongoDB Right For Your Project (or Organization)
 
Nerd Herding
Nerd HerdingNerd Herding
Nerd Herding
 
20070921 Uni Softwareengineering
20070921 Uni Softwareengineering20070921 Uni Softwareengineering
20070921 Uni Softwareengineering
 
What the web platform (and your app!) can learn from Node.js
What the web platform (and your app!) can learn from Node.jsWhat the web platform (and your app!) can learn from Node.js
What the web platform (and your app!) can learn from Node.js
 
Computational Linguistics FCIS'13 - ASU -- Part(I)
Computational Linguistics FCIS'13 - ASU -- Part(I)Computational Linguistics FCIS'13 - ASU -- Part(I)
Computational Linguistics FCIS'13 - ASU -- Part(I)
 
Offshore Guys Presentation
Offshore Guys PresentationOffshore Guys Presentation
Offshore Guys Presentation
 
Improving Untestable Code
Improving Untestable CodeImproving Untestable Code
Improving Untestable Code
 
Fueling Future Transportation - Accelerating Energy Innovation
Fueling Future Transportation - Accelerating Energy InnovationFueling Future Transportation - Accelerating Energy Innovation
Fueling Future Transportation - Accelerating Energy Innovation
 
Summer Summit Marketing Presentation 2013
Summer Summit Marketing Presentation 2013Summer Summit Marketing Presentation 2013
Summer Summit Marketing Presentation 2013
 
Cross Site Request Forgery
Cross Site Request ForgeryCross Site Request Forgery
Cross Site Request Forgery
 

Semelhante a do censorship & repression kill content online?

Sami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphereSami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphereKrystian Cieślak
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speechGlobal Voices
 
Sami Ben Gharbia - YLSMC Beirut Vol.01
Sami Ben Gharbia - YLSMC Beirut Vol.01Sami Ben Gharbia - YLSMC Beirut Vol.01
Sami Ben Gharbia - YLSMC Beirut Vol.01YLSMC
 
The Use of Social Media (openEd 2.0 Course / Module 1)
The Use of Social Media (openEd 2.0 Course / Module 1)The Use of Social Media (openEd 2.0 Course / Module 1)
The Use of Social Media (openEd 2.0 Course / Module 1)Andreas Meiszner
 
Cyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle EastCyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle East3wv
 
Social Technology leveraging during the Arab Spring - Euromed june 2013
Social Technology leveraging during the Arab Spring - Euromed june 2013Social Technology leveraging during the Arab Spring - Euromed june 2013
Social Technology leveraging during the Arab Spring - Euromed june 2013Fabrice Epelboin
 
Micro-Blogging, Futurism, and the Agora
Micro-Blogging, Futurism, and the AgoraMicro-Blogging, Futurism, and the Agora
Micro-Blogging, Futurism, and the AgoraThe New School
 
How to make people happy with tech
How to make people happy with techHow to make people happy with tech
How to make people happy with techNoah Bloom
 
Social Media CCE 586
Social Media CCE 586Social Media CCE 586
Social Media CCE 586jpaularae
 
Internet Ministry Summit - Christian Leadership Alliance
Internet Ministry Summit - Christian Leadership AllianceInternet Ministry Summit - Christian Leadership Alliance
Internet Ministry Summit - Christian Leadership AllianceCynthia Ware
 
News writing and reporting: Leveraging new media
News writing and reporting: Leveraging new mediaNews writing and reporting: Leveraging new media
News writing and reporting: Leveraging new mediaSanjana Hattotuwa
 
Presentation on social media
Presentation on social mediaPresentation on social media
Presentation on social mediaRumeel Ahmad
 
The gender-less web (Clara Mancini)
The gender-less web (Clara Mancini)The gender-less web (Clara Mancini)
The gender-less web (Clara Mancini)Women&Technologies
 
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?Dan York
 
Michele Payn-Knoper - Farming Your Online Community: Social Networks and Beyond
Michele Payn-Knoper - Farming Your Online Community: Social Networks and BeyondMichele Payn-Knoper - Farming Your Online Community: Social Networks and Beyond
Michele Payn-Knoper - Farming Your Online Community: Social Networks and Beyondguest5147da
 
Michele Payn-Knoper - Twittering Techniques for Ag Tweeps
Michele Payn-Knoper - Twittering Techniques for Ag TweepsMichele Payn-Knoper - Twittering Techniques for Ag Tweeps
Michele Payn-Knoper - Twittering Techniques for Ag TweepsJohn Blue
 
Hate Speech, Polarization and Online Data
Hate Speech, Polarization and Online DataHate Speech, Polarization and Online Data
Hate Speech, Polarization and Online DataIngmar Weber
 

Semelhante a do censorship & repression kill content online? (20)

Sami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphereSami Ben Gharbia - State of free speech in world blogosphere
Sami Ben Gharbia - State of free speech in world blogosphere
 
Digital activism & online free speech
Digital activism & online free speechDigital activism & online free speech
Digital activism & online free speech
 
Sami Ben Gharbia - YLSMC Beirut Vol.01
Sami Ben Gharbia - YLSMC Beirut Vol.01Sami Ben Gharbia - YLSMC Beirut Vol.01
Sami Ben Gharbia - YLSMC Beirut Vol.01
 
The Use of Social Media (openEd 2.0 Course / Module 1)
The Use of Social Media (openEd 2.0 Course / Module 1)The Use of Social Media (openEd 2.0 Course / Module 1)
The Use of Social Media (openEd 2.0 Course / Module 1)
 
Cyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle EastCyber Activism And Online Campaigns In Middle East
Cyber Activism And Online Campaigns In Middle East
 
Social Technology leveraging during the Arab Spring - Euromed june 2013
Social Technology leveraging during the Arab Spring - Euromed june 2013Social Technology leveraging during the Arab Spring - Euromed june 2013
Social Technology leveraging during the Arab Spring - Euromed june 2013
 
Micro-Blogging, Futurism, and the Agora
Micro-Blogging, Futurism, and the AgoraMicro-Blogging, Futurism, and the Agora
Micro-Blogging, Futurism, and the Agora
 
How to make people happy with tech
How to make people happy with techHow to make people happy with tech
How to make people happy with tech
 
Social Media CCE 586
Social Media CCE 586Social Media CCE 586
Social Media CCE 586
 
Internet Ministry Summit - Christian Leadership Alliance
Internet Ministry Summit - Christian Leadership AllianceInternet Ministry Summit - Christian Leadership Alliance
Internet Ministry Summit - Christian Leadership Alliance
 
News writing and reporting: Leveraging new media
News writing and reporting: Leveraging new mediaNews writing and reporting: Leveraging new media
News writing and reporting: Leveraging new media
 
Presentation on social media
Presentation on social mediaPresentation on social media
Presentation on social media
 
Sparxup
SparxupSparxup
Sparxup
 
Tech@State
Tech@StateTech@State
Tech@State
 
The gender-less web (Clara Mancini)
The gender-less web (Clara Mancini)The gender-less web (Clara Mancini)
The gender-less web (Clara Mancini)
 
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?
 
Michele Payn-Knoper - Farming Your Online Community: Social Networks and Beyond
Michele Payn-Knoper - Farming Your Online Community: Social Networks and BeyondMichele Payn-Knoper - Farming Your Online Community: Social Networks and Beyond
Michele Payn-Knoper - Farming Your Online Community: Social Networks and Beyond
 
Michele Payn-Knoper - Twittering Techniques for Ag Tweeps
Michele Payn-Knoper - Twittering Techniques for Ag TweepsMichele Payn-Knoper - Twittering Techniques for Ag Tweeps
Michele Payn-Knoper - Twittering Techniques for Ag Tweeps
 
Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...
Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...
Penetrationtestinglovesfreesoftware libreplaner2017-christianfernandez-hispag...
 
Hate Speech, Polarization and Online Data
Hate Speech, Polarization and Online DataHate Speech, Polarization and Online Data
Hate Speech, Polarization and Online Data
 

Mais de Global Voices

Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifGlobal Voices
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal PresentationGlobal Voices
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغربGlobal Voices
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyGlobal Voices
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehGlobal Voices
 
Stephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology CollectiveStephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology CollectiveGlobal Voices
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouseGlobal Voices
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filteringGlobal Voices
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorshipGlobal Voices
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalistsGlobal Voices
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regimeGlobal Voices
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Global Voices
 

Mais de Global Voices (16)

Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain YousifLive Broadcasting Center, Bahrain Experience, by Hussain Yousif
Live Broadcasting Center, Bahrain Experience, by Hussain Yousif
 
Yemen Portal Presentation
Yemen Portal PresentationYemen Portal Presentation
Yemen Portal Presentation
 

بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
بروز الصحافة المواطِنة في المغرب

بروز الصحافة المواطِنة في المغرب
 
FOSS: Technologies Communities And Society
FOSS: Technologies Communities And SocietyFOSS: Technologies Communities And Society
FOSS: Technologies Communities And Society
 
Meedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas TawilehMeedan Presentation, by Anas Tawileh
Meedan Presentation, by Anas Tawileh
 
Live Broadcasting
Live  BroadcastingLive  Broadcasting
Live Broadcasting
 
Stephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology CollectiveStephanie Hankey talks about Tactical Technology Collective
Stephanie Hankey talks about Tactical Technology Collective
 
A game of cat and mouse
A game of cat and mouseA game of cat and mouse
A game of cat and mouse
 
Belarusian Internet filtering
Belarusian Internet filteringBelarusian Internet filtering
Belarusian Internet filtering
 
Filteringfinal
FilteringfinalFilteringfinal
Filteringfinal
 
Living with censorship
Living with censorshipLiving with censorship
Living with censorship
 
Self Censorship in media Role of citizen journalists
Self Censorship in media  Role of citizen journalistsSelf Censorship in media  Role of citizen journalists
Self Censorship in media Role of citizen journalists
 
Formation of a post-colonial censorship regime
Formation of a  post-colonial censorship regimeFormation of a  post-colonial censorship regime
Formation of a post-colonial censorship regime
 
Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”Exposing Corruption on YouTube “Targuist Sniper”
Exposing Corruption on YouTube “Targuist Sniper”
 
Filtering final
Filtering finalFiltering final
Filtering final
 
Bloguer Anonymement
Bloguer AnonymementBloguer Anonymement
Bloguer Anonymement
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

do censorship & repression kill content online?

  • 1. do censorship & repression kill content online? sami ben gharbia, re:publica10, Berlin, April 15, 2010
  • 2. silencing online speech, how-to do it?   censorship hacking & DDOS @ DPI ❺ atmosphere punishing & of fear persecuting  
  • 3. e-journalists & bloggers represent 45% of all media workers in prison (CPJ)
  • 4. threatened voices: country profile page 103 124
  • 5. threatened voices: blogger profile 103 124
  • 6. threatened voices, who, where, when, what and why? 103 124
  • 7. threatened voices: data visualization per country 103 124
  • 8. 227 threatened bloggers worldwide - April 2010 (most repressive region) Arab World Rest Of the World Arab World 41% Rest Of the World 59% 135 92
  • 9. 227 threatened bloggers worldwide - April 2010 (most repressive region) Middle East Rest Of the World Rest Of the World 45% Middle East 55% 103 124
  • 10. voices threatened vs. years in power :) 103 124 credit: anasqtiesh.com
  • 11. blogs of threatened bloggers, before & after (exp. from Saudi Arabia and Iran) before after 103 124
  • 12. digital activists networks and censorship (Tunisia) credit: Fieke Jansen
  • 13. is censorship killing content? (Tunisia) dead websites/blogs
  • 14. 34% of those 67 blocked websites are dead (Tunisia) Dead Websites Alive 44 23 Dead Websites 34% Alive 66%
  • 15. blocked websites, before & after (exp. from Tunisia) http://www.ltdh.org/ website of the Tunisian League for Human Rights (LTDH) becoming a chinese website!!!
  • 16. blocked websites, before & after (exp. from Tunisia) http://www.cnlt98.org/ website the National Council for Liberties in Tunisia (CNLT) becoming a website with sponsored links!!!
  • 17. blocked websites, before & after (exp. from Tunisia) http://tounes.naros.info/ website of another Tunisian NGO, DNS reserved but empty!!!
  • 18. keyword filtering killing content (images non-visible for users in Tunisia)
  • 19. deep packet inspection (DPI) killing content inside emails email as seen from outside Tunisia same email as seen from Tunisia
  • 20. general consequences of online censorship for bloggers & webmasters short-term: some publicity & support (tiny % of bloggers) long-term: blogger will be left alone isolating the blogger from his/her environment significant decrease in readership significant decrease in interactivity and conversation shift from blogging to protest doubting the values of blogging scaring out and discouraging others bloggers killing content
  • 21. website/blog blocked, what next? creating a new blog/website (easy) losing page ranking + loosing referring links + confusing readership migrating (advanced/impossible) redirecting to a new DNS (advanced/costly/impossible) setting up mirror blog (advanced/costly/impossible) setting up a secure website -https- (advanced/costly/ temporarily/impossible) become an “exiled blogger” (temporarily) relying on facebook and other web 2.0 platforms as “safe” haven (temporarily) self-censorship stop blogging (RIP ?%)
  • 22. micro-pipeline as unblockable infrastructure?
  • 23. cross-posting & mirroring, not always working!
  • 24. playing with platforms: from youtube to google earth, maps, etc.
  • 25. sponsored links as unblockable information!
  • 26. an endless cat-and-mouse game... thank you sami ben gharbia work advocacy.globalvoicesonline.org threatened.globalvoicesonline.org blog & projects samibengharbia.com nawaat.org babtounes.com cybversion.org twitter.com/ifikra email advocacy@globalvoicesonline.org

Notas do Editor