SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
Anti-Censorship Technologies




                 Nart Villeneuve
     PHD Candidate, Senior Research Fellow
Citizen Lab , Munk Centre for International Studies
               University of Toronto
Censorship Circumvention

   The use of censorship circumvention and
    anonymity technology is global.
   There are a wide variety of anti-censorship
    tools from which to choose.
   Knowing the threats one faces is critical to
    determining which technology to use.
# of Censors Increasing
Corporate Censors
Exporting Censorship

   SmartFilter – Saudi Arabia, Tunisia, Oman,
    Sudan, United Arab Emirates, and formerly in
    Iran
   Websense  Bluecoat – Yemen
   Fortinet – Myanmar/Burma
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools
Anti-Censorship Tech: Circumvention Tools

Contenu connexe

Similaire à Anti-Censorship Tech: Circumvention Tools

Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2DroneSec
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...Assem mousa
 
A Framework for the safe implementation of mobile technology #COMIT2017
A Framework for the safe implementation of mobile technology #COMIT2017A Framework for the safe implementation of mobile technology #COMIT2017
A Framework for the safe implementation of mobile technology #COMIT2017Comit Projects Ltd
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesKatina Michael
 
Surviving in a Digital World
Surviving in a Digital WorldSurviving in a Digital World
Surviving in a Digital WorldAnupam Saraph
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionBitglass
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Business Finland
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastMOTC Qatar
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorKnowledge Group
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyNovoQuad
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...DroneSec
 
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.Donna Sims
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.Trilateral Research
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking TRACE Project
 
Alexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmisAlexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmisIgnite_Athens
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfBenjamin Ang
 

Similaire à Anti-Censorship Tech: Circumvention Tools (20)

Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
Drone Security & Law Enforcement (Chris Church) - DroneSec GDSN#2
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...Universal adoption of clout tech in fighting coronavirus spreading in the ent...
Universal adoption of clout tech in fighting coronavirus spreading in the ent...
 
A Framework for the safe implementation of mobile technology #COMIT2017
A Framework for the safe implementation of mobile technology #COMIT2017A Framework for the safe implementation of mobile technology #COMIT2017
A Framework for the safe implementation of mobile technology #COMIT2017
 
From Identity to Ownership Theft
From Identity to Ownership TheftFrom Identity to Ownership Theft
From Identity to Ownership Theft
 
The Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security TechnologiesThe Benefits and Harms of National Security Technologies
The Benefits and Harms of National Security Technologies
 
Surviving in a Digital World
Surviving in a Digital WorldSurviving in a Digital World
Surviving in a Digital World
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Attitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle EastAttitudes to Cybersafety and Online Privacy in the Middle East
Attitudes to Cybersafety and Online Privacy in the Middle East
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
The Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public SafetyThe Role of Anti-Drone Systems in Ensuring Public Safety
The Role of Anti-Drone Systems in Ensuring Public Safety
 
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
The Need for Drone Forensic Investigation Standardisation (Evangelos Mantas) ...
 
It and safety
It and safetyIt and safety
It and safety
 
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
 
TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.TRACE - The role of technology in human trafficking.
TRACE - The role of technology in human trafficking.
 
The role of technology in human trafficking
The role of technology in human trafficking The role of technology in human trafficking
The role of technology in human trafficking
 
Alexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmisAlexandros Papanikolaou PROmis
Alexandros Papanikolaou PROmis
 
Technology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdfTechnology Disruption Digital Inclusion and the Law.pdf
Technology Disruption Digital Inclusion and the Law.pdf
 

Dernier

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Dernier (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Anti-Censorship Tech: Circumvention Tools

  • 1. Anti-Censorship Technologies Nart Villeneuve PHD Candidate, Senior Research Fellow Citizen Lab , Munk Centre for International Studies University of Toronto
  • 2. Censorship Circumvention  The use of censorship circumvention and anonymity technology is global.  There are a wide variety of anti-censorship tools from which to choose.  Knowing the threats one faces is critical to determining which technology to use.
  • 3. # of Censors Increasing
  • 5. Exporting Censorship  SmartFilter – Saudi Arabia, Tunisia, Oman, Sudan, United Arab Emirates, and formerly in Iran  Websense Bluecoat – Yemen  Fortinet – Myanmar/Burma