It's amazing what humans beings will do for information. This reminds me of a time in 2007 where my friend was a teacher at an elementary school. The school blocked MySpace and Facebook to stop the students from visiting those sites. Somehow, the students figured out how to use proxies and get around the firewalls and what ended up happening is that the teachers were the only ones who couldn't figure out how to get around the firewalls. My friend came to me asking how the kids were getting around the firewall, but my explanation was over his head.
The solution I used to use in high school: add a period to the end of the domain name. E.g. "www.facebook.com" became "www.facebook.com.". Apparently, the last dot does nothing, but gets around almost all pattern matchings. Everyone I told was amazed, but it actually worked (and teachers/administration were clueless).
My high school put in a transparent squid-based filter for all HTTP content in my second year, and all traffic going to ports 80 and 443 went through it. They blocked all UDP traffic (even internal to the school, and all outbound TCP traffic except to ports 80, 443... and port 21, which the Yearbook people needed to upload files somewhere. Once I realized that the traffic on port 21 didn't go through an active sniffer, I just started running my SSH server at home on port 21, and bringing PuTTY around on my USB key.
My school did filtering on port 80 but allowed all TCP traffic out on port 443 so I just ran SSH there. I changed schools and it seems as though they did further filtering on packets (They close connections of 443 if the server sends data first - like happens with SSH), after some testing I managed to get OpenVPN using TCP on port 443 running great.
Hell, I remember this being common when I was in high school between 1999 - 2003. It started with the computer savvy kids figuring it out, but eventually the word spread and before you know it football players were using proxies to play stupid games on Newgrounds. Good times.
What's more amazing is why human beings try to block information in the first place, at least in places where its unnecessary, even for their own cause.
For instance, the Indian IT firm Infosys (many other similar companies in India too), block use of personal email, social networking sites etc. which I personally find pointless but probably can be argued about. But, what surprises me is they also have policies in place to not provide internet connectivity to software developer recruits who are new grads. And, these developers are provided internet access only after a few months and only if they obtain an approval from their manager that their work requires them to have internet access.
Centralized authority is weak against distributed desire and eyes. We will constantly attempt any potential hack. And as soon as a crack is found, it diffuses everywhere.
In communist countries people used to listen to radio from the same nationality people that lived in other countries (speaking the same language).
In fact, that's happening in North Korea right now, too. North Koreans who fled have radio stations in South Korea and some of them also smuggle some radio units in NK.
My biggest fear is once dictatorships/governments become aware of the ability to sidestep their bans, they'll begin blocking websites such as torproject.org. Keep in mind this traffic spike is because people who don't normally use Tor, started using it (i.e. they downloaded it). At that point I think we'll begin to see an arms race between the public and government which might finally bring us to decentralization of the Internet - or complete censorship.
The TOR website is blocked in mainland China, as is TOR itself, but it works via obfsproxy, all it requires is someone to send you the executable/source. Most people who bypass the great firewall use VPNs, however.
I once spoke with a student from China who told me bypassing the Great Firewall with a VPN is quite common. Not practiced by anything close to a majority of the population, but common enough that it would probably be used by e.g., that guy you know who couldn't tell Ruby from Python, and has never touched Linux, but is quite capable of figuring out how to fix his Windows box when it breaks.
I don't know the answer to this and of course the following was easily dismissed with a tinfoil hat comment, but when China decided recently to unban porn there were people suggesting it was to make bypassing the great firewall less 'necessary' for the average user.
> In February 2006, Google made a significant concession to the Great Firewall of China, in exchange for equipment installation on Chinese soil, by blocking websites which the Chinese government deemed illegal.
Or just send the program via email or through P2P. They can't make it less available, but unless they unplug the internet, the people will still be able to get it. Specially if there is a need. Just remember the days before the internet, the programs, songs, movies used to spread via magazines, floppy disks, tapes...
I tried hosting an exit relay, even with limited outbound ports, and my VPS provider immediately received about 9 DMCA requested within 24 hours. I was able to email them the Tor boilerplate response and it went away, but I won't be trying that again.
Freedom of speech. It always seem to be under attack.
I wonder though, do we have more or less freedom of speech over time? I tried to google those things, but I couldn't find the graph of freedomness over time.
(No, ancedotes don't count. Our perceptions can be skewed by media bias.)
I remember reading an article a couple weeks ago, I'm not sure where, but I think it was posted on HN, about democracy over time. While not the same, that's a good proxy for measuring freedom. It said that democracy reached a peak around 2000, and that it's declined a little since then, but much slower than it was increasing before then.
I think this article was either on The Atlantic, The Economist or BBC, if you want to go digging.
"Freedom score"? Really? Some number, representing "freedom", calculated from the US point of view - it's, how should I put it... Less than impartial. Not to mention method of calculating freedom.
It doesn't seem any less contrived than standard of living scores or happiness scores. It's obviously an imperfect metric, but while it might be useless for comparing the freedom of Germany and the US, it's perfectly adequate for comparing the freedom of the US and Croatia, or of Croatia and China. For the sake of calculating the overall freedom of the world over time, as in the case of the great-grandparent's question, it works as well as anything.
Setting up a private bridge only helps if you have friends or family living living under an oppressive regime. Anyone who run an obfsproxy bridge will be helping the to alleviate the shortage of bridges.[1] The quickest and easiest way is to setup your free Amazon EC2 account with the Instructions at the Tor Cloud Project page[2]. It took me just a couple of minutes to install my free EC2 account. Another option is to donate money to pay for the bandwidth that Tor relay and exit nodes require.[3]
NOTE: A bridge is not the same as an exit node. Only exit nodes could possibly attract attention from authorities. If you are just running a bridge, you are only helping people circumvent government firewalls to join the Tor network. The default EC2 Tor Cloud images only run as a bridge.
From my experience in internet businesses in developing countries, you tend to get quite strong weekly patterns as a lot of people only have access to computers at work, so usage tends to drop on the weekend.
There was a huge spike in Mid 2013, cause by a botnet that installed tor. Before there was almost not oscillation. After that there is quite a bit. I think there are many infected PCs at companies.
It's touching that people want and have the means to help the Turks continue to communicate thanks to Tor. But it's too bad that running a Tor exit node, due to what Tor is so commonly used for by nature of anonymity, is such a glaring liability[1] to the operator -- and, due to how easily and commonly Tor exit nodes can be used nefariously, a liability to the users[2].
Hopefully uProxy, slated to be released this summer, will address these issues effectively by incorporating a trust model[3] into facilitating circumvention through such censorship walls. Meanwhile, more and more https[4] would be helpful.
Also:
"As the Turkish government’s effort to ban use of Twitter continued Friday, the country’s Internet users rushed to install apps such as Hotspot Shield, which had 270,000 downloads from Turkish users within 12 hours, according to David Gorodyansky, the company’s chief executive."
I think Tor's a bit of an overkill. This message sent over Hotspot Shield from Vietnam because of my Facebook addiction (blocked on and off here)
Why and how is Tor an overkill? With Hotspot Shield, you are trusting them with everything you are doing. With Tor, there is no trust with a single server because it is decentralized.
Tor is certainly far more decentralized, but you seem to harbor a common misconception that Tor doesn't reuqire trust. The exit node of your circuit (the last hop before the "real" internet) handles your directly. At best, the destination of your packets is unencrypted, giving the exit node a narrow but pertinent view into your communications. At worst, the entire packet is unencrypted, and the exit node can manipulate it in whatever way it wishes, undetectably. This is why you must, must, must layer other encryption on top of Tor, ie, HTTPS. As they say at the Tor Project, "plaintext over Tor is still plaintext," except that you've attracted a lot attention to send it.
Twitter yesterday, TOR tomorrow, what next FB and G+ and then what will they block to stem people speaking things about the Turkish government.
From what I understand the whole blocking twitter is due to the Turkish government not liking what is said about them on twitter. Now by their actions they have created more people saying things they will not like on many other platforms and with that, were will it end. Will they block of the entire internet or will they deal with the issues being raised about them in a constructive way beyond effectively gagging everybody as they are unable to put there hands over there ears.
Either way, this is a dangerous path they are taking and the fallout will be greater than the problem they perceive too be abating.
What amazes me in this mess is how ignorant the government (and the people running it) about methods to overcome censorship. They are, basically, computer-illiterate. Really very illiterate.
After the Tunisian revolution, there were thoughts and plans by politicians to do censorship again. This was dismissed as politicians, officials and government finally recognized that censorship can be overcome no matter what they try. Religious complaining about "porn" and that stuff can ask their ISP for a traffic filter.
I guess what they are going to do when Turkish government will buy some advanced DPI hardware with SVM (Support Vector Machines) which is capable of blocking TOR
TOR is effectively blocked in China, the only way to use it there is to setup a private obfsproxy somewhere abroad, but I believe it's beyond an average user skills.
I wonder if twitter alternatives have also become more popular in Turkey lately - it seems like if people are willing to setup Tor, they might also try App.net (you're of course loosing your network of followers, but your followers in Turkey can't see twitter anyway).
Of course then you can just block that other service as well.
I hope my tor bridge relay is helping:
Mar 23 13:44:08.000 [notice] Heartbeat: Tor's uptime is 9 days 17:59 hours, with 2 circuits open. I've sent 894.13 MB and received 1.04 GB.
I'd like to help, but without also facilitating paedos. Is there an easy way to limit my tor exits to Twitter and its subdomains? I.e., can I do the configuration in Tor rather than messing with routes/firewall on the OS?
Yes, it's really easy if you know what IPs and ports you want to allow. You can whitelist a handful of services in your torrc and reject all others by default. I've been running a mostly-relay node for years now with a few allowed exits, with never any trouble at all. Though, I don't think my node gets used as an exit node very often; whenever I've checked, it's just doing normal relaying, which is basically what I want/expect.
uProxy will be hopefully released a few months, which should help you help others in a censorship jam that you trust with greater confidence not to use your connection for such activity. And I imagine speech freedom will still need your help whenever it's released..
To whoever downvoted this, how is his question and concern not valid?
I was wondering if Twitter is doing anything to help the people in Turkey circumvent the censorship there. They should, but so far I've heard nothing about it. Hosting an onion server and an exit relay could help.
I know you're joking because of the twitter 140 character limit but accessing twitter directly by IP address won't help much. The govt can easily block a specific IP. So knowing the IP helps when DNS is down but, in the long run, it's not too helpful when someone is trying to block a site.