21
Internet Censorship and How It Is Resisted Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Node Tor Network Web server Tor user Encrypted tunnel Unencrypted TCP Tor Node Tor Node Tor Node Exit node Entry node Middle node Steven J. Murdoch http://www.cl.cam.ac.uk/users/sjm217/ Computer Laboratory www.torproject.org Cambridge University Student Pugwash Society, 30 October 2008, Cambridge, UK

Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Internet Censorship and How It Is Resisted

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Encrypted tunnel

Unencrypted TCP

Tor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Steven J. Murdoch

http://www.cl.cam.ac.uk/users/sjm217/

Computer Laboratory www.torproject.org

Cambridge University Student Pugwash Society, 30 October 2008, Cambridge, UK

Page 2: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Construction of the Internet

• Internet Service Providers (ISPs) give people access to theInternet, and allow people to host services such as websites

• ISPs connect to other ISPs so the customers of one ISP cancommunicate with those of others

• Some ISPs have international connections, others use those ofthe bigger ISPs

• ISPs are typically based in one country and governed by thelaws of that country

• Often governments control international Internet connections,either directly or via regulation

Page 3: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Construction of the Internet

Diagram: China Internet Network Information Center

Page 4: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

What is being blocked, and why

• Out of the 40 countries studied bythe OpenNet Initiative in 2006, 26censored the Internet in some way

• The types of material censoredvaried depending on country, e.g.:

• Human Rights (blocked in China)• Religion (blocked in Saudi Arabia,

UAE, Iran, Bahrain)• Pornography (blocked in Saudi

Arabia, UAE, Iran, Bahrain,Singapore, Burma, . . . )

• Other issues censored include:military and militant websites; sexeducation, alcohol/drugs, music; gayand lesbian websites; news

Page 5: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

What is being blocked, and why

• Out of the 40 countries studied bythe OpenNet Initiative in 2006, 26censored the Internet in some way

• The types of material censoredvaried depending on country, e.g.:

• Human Rights (blocked in China)• Religion (blocked in Saudi Arabia,

UAE, Iran, Bahrain)• Pornography (blocked in Saudi

Arabia, UAE, Iran, Bahrain,Singapore, Burma, . . . )

• Other issues censored include:military and militant websites; sexeducation, alcohol/drugs, music; gayand lesbian websites; news

Page 6: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

What is being blocked, and why

• Out of the 40 countries studied bythe OpenNet Initiative in 2006, 26censored the Internet in some way

• The types of material censoredvaried depending on country, e.g.:

• Human Rights (blocked in China)• Religion (blocked in Saudi Arabia,

UAE, Iran, Bahrain)• Pornography (blocked in Saudi

Arabia, UAE, Iran, Bahrain,Singapore, Burma, . . . )

• Other issues censored include:military and militant websites; sexeducation, alcohol/drugs, music; gayand lesbian websites; news

Page 7: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Even if a site is accessible, it may beremoved from search engine results

Searching for “Tiananmen Square” on Google.com and Google.cn

Page 8: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Blocking with technology

• When a country’s government controls international connectivity,they can block requests for banned websites

• There are a number of different approaches (URL blocking,keyword blocking, IP address blocking)

• Software may be produced in-country, but often is an adaptedcommercial product

• These companies not only make the software, but provide acontinuously updated list of websites to be blocked

See “Tools and Technology of Internet Filtering”, a chapter in AccessDenied: The Practice and Policy of Global Internet Filtering, edited byRonald Deibert, John Palfrey, Rafal Rohozinski, Jonathan Zittrain.Available at http://opennet.net/accessdenied.

Page 9: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Blocking through laws, fear, andintimidation

• ISPs may be forced to block sitesthemselves, or implementself-regulation

• People can be intimidated into nottesting rules through fear ofdetection and retribution

• These may be through laws, socialpressure or extra-legal punishment

• All these approaches may be usedat the same time, and complementeach other

Page 10: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Limitations of blocking

• Censorship systems block legitimatecontent and fail to block bannedcontent

• It is fairly easy for readers andpublishers to circumvent thetechnical measures

• Building and maintaining censorshipsystems is expensive

• Blocking one type of contentencourages other types to beblocked

• Often the process of censorship isnot transparent

Photograph: David Gaya

Page 11: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Measuring censorship

The OpenNet Initiative test and analyse Internet censorship

http://opennet.net/

Page 12: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Censorship resistance systems

• Software to resist censorship should• Hide where user is visiting (to prevent blocking)• Hide who the user is (to protect them from intimidation)

• These properties should be maintained even if the censorshipresistance system is partially compromised

Page 13: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Limitations of censorship resistance

• Censorship resistance is thought controversial – especially bythe censors

• There is something for everyone to like, and something foreveryone to dislike, going on with censorship resistance systems

• Bad people do use them to do bad things (for many differentdefinitions of bad people)

• It is impossible to block bad uses, even if we could come up witha common definition of bad content

• The systems are not perfect, so it is possible some people will becaught

Page 14: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Tor hides communication patterns byrelaying data through volunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Diagram: Robert Watson

Page 15: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Tor hides communication patterns byrelaying data through volunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor userTor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Diagram: Robert Watson

Page 16: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Tor hides communication patterns byrelaying data through volunteer servers

Tor Node

Tor Node

Tor Node

Tor Node

Tor NodeTor Node

Tor Node

Tor Node

Tor Network

Web server

Tor user

Encrypted tunnel

Unencrypted TCP

Tor Node

Tor Node

Tor Node

Exit node

Entry nodeMiddle node

Diagram: Robert Watson

Page 17: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Tor hidden services allow censorshipresistant hosting of services

Page 18: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Freenet is an anonymous contentdistribution network

• While Tor allows access to theInternet, Freenet creates a privatenetwork

• Users can create websites, sharefiles and send/receive emailsbetween other members of thenetwork

• Content is hosted by sharing itamongst users of the network

• Users cannot select what contentthey host, and it is stored in anencrypted form

Page 19: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Psiphon a is censorship resistancesystem with different tradeoffs to Tor

• There is no centralized control, so itis hard to block but also hard foruser to find a server

• Users do not have to downloadsoftware, but this limits the strengthof protection

• If the user cannot modify browsersettings or install software, Psiphonis still usable

• Users within a censored country canask someone they trust outside ofthe country to install the Psiphonserver

Page 20: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Ethical issues in censorship resistance

• People take risks in using censorship resistance systems, andcontributing to them – many of these risks are not wellunderstood

• Censorship resistance systems are used for evil, as well as forgood – does the latter outweigh the former

• Censorship does serve a useful purpose for some people –when is it acceptable

• Is it appropriate to develop censorship software, deploying incountries with poor human right records, building list of blockedsites, designing surveillance systems

Page 21: Tor Node Internet Censorship and How It Is Resisted · • Censorship resistance systems are used for evil, as well as for good – does the latter outweigh the former • Censorship

Ethical issues in censorship resistance

• People take risks in using censorship resistance systems, andcontributing to them – many of these risks are not wellunderstood

• Censorship resistance systems are used for evil, as well as forgood – does the latter outweigh the former

• Censorship does serve a useful purpose for some people –when is it acceptable

• Is it appropriate to develop censorship software, deploying incountries with poor human right records, building list of blockedsites, designing surveillance systems

Discuss