SlideShare une entreprise Scribd logo
1  sur  44
Navigating the Censored Web
WordCamp Toronto - 2017
John P. Gamboa
Technical Success Manager, WP Engine
@jgamboa
Shanghai, China
CROP IMAGE
TO GRAY BOX
Blocked in China
UNTIL...
April 12, 2012
CROP IMAGE
TO GRAY BOX
China HTTP Traffic to Cloudflare
April 12, 2012
● How do we reach as many people as
possible on a censored Internet?
● Can WordPress do this?
● How do we make a WordPress site so that it
can’t be blocked?
● What can we do if the site gets blocked?
You are not operating
on a level playing field
Freedom on the Net Report 2016
Is WordPress the right
tool in a closed network?
👍
🏽
“WordPress is used by 59.4% of all the
websites whose content management system
we know. This is 28.5% of all websites.”
Internet Sovereignty
Internet management, network infrastructure,
surveillance and content restrictions are the
sovereign right of nation-states. The Internet follows
terrestrial boundaries and borders.
Ideas on Internet Sovereignty
are quickly being adopted by
countries that are known to be
“enemies of Internet” to
legitimize censorship of all
speech
How are WordPress
sites censored globally?
Blocking Sites Outright
- Iran: SmartFilter
- Russia: Roskomnadzor,
government agency
- China: “Golden Shield Project,” aka
Great Firewall of China
- Turkey: Judicial blocks based on
political needs
Forced Data Localization
- Russia requires local registration of bloggers with more than
3,000 followers
- Apple removed VPN software in the Chinese app store
- China
- Germany
- India
- Indonesia
- Kazakhstan
- South Korea
- Nigera
- Russia
- Turkey
- Vietnam
DDoS For Hire
- WP Engine customer based out of Phillipines often the target of
Chinese DDoS. Likely for criticizing Duterte government.
- /wp-login.php is a ripe location for lazy script kiddies triying to get
into to sites to deface and take down content.
DNS Poisoning
SSL
- Very important for security and
SEO
- Emerging Internet markets have
lower adoption
- Entire sites are more likely to be
blocked
Why do WordPress
sites get blocked?
South Korea
Turkey
- Political Dissent
- Terrorism
- Religious Protection
- Kurdish Independence
Russia
- Memes
- “Protection of children”
- Anti-Putin
- Crimea Annexation
China
- All content CCP can’t control
or influence is blocked
- Allows for compliant local
variations of social media
sites
- River Crabs (河蟹), 50
Centers (五毛) and Big
Mamas (大妈)
Blocked in China
Designing around censorship
- Know if your plugins
communicate externally
- Ie: Jetpack
- Decide if hosting overseas or
registering in-country
- Run tests around the world:
Geopeeker.com
- Full SSL could result in full
site censorship
- PHP 7 is a must
- External advertising services
and APIs
- Consider global CDNs
How do I know if my site is blocked?
- Greatfire.org
🇨🇳
- BlockedinIran.org
🇮🇷
- Rublacklist.net
🇷🇺
- CloudMonitor.CA.com
🌍
- Engelliweb.org
🇹🇷
What do I do if my site is blocked?
- Check if recourse is
available
- Move to a new server
- Decide on hosting in-
country or overseas
- Check for noisy
neighbors
- Check if your domain or
IP is blocked
- There may be nothing
you can do
- Net Neutrality
- Walled
Gardens/Closed
Networks
- Continued push for
Internet
Sovereignty
What does the future hold?
John P. Gamboa
@jgamboa
jpgamboa.com
Q&A

Contenu connexe

Similaire à Navigating the Censored Web with WordPress

Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Building An Awesome Company Culture with WordPress
Building An Awesome Company Culture with WordPressBuilding An Awesome Company Culture with WordPress
Building An Awesome Company Culture with WordPressEng Chin Gan
 
How to get access to blocked websites
How to get access to blocked websitesHow to get access to blocked websites
How to get access to blocked websitesWebSitePulse
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5惠子 李
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017Otto Kekäläinen
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Property Portal Watch
 
Understanding word press security wwc-4-7-17
Understanding word press security wwc-4-7-17Understanding word press security wwc-4-7-17
Understanding word press security wwc-4-7-17Nicholas Batik
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hackingsumit dimri
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinPhillip Maddux
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
061203_futurewebapps_tempo
061203_futurewebapps_tempo061203_futurewebapps_tempo
061203_futurewebapps_tempocjin cheng
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information securityRashad Aliyev
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...Rachel Wandishin
 

Similaire à Navigating the Censored Web with WordPress (20)

Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Building An Awesome Company Culture with WordPress
Building An Awesome Company Culture with WordPressBuilding An Awesome Company Culture with WordPress
Building An Awesome Company Culture with WordPress
 
How to get access to blocked websites
How to get access to blocked websitesHow to get access to blocked websites
How to get access to blocked websites
 
Internet research for HRD Profession
Internet research for HRD ProfessionInternet research for HRD Profession
Internet research for HRD Profession
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research-1200691875464541-5
Internet research-1200691875464541-5Internet research-1200691875464541-5
Internet research-1200691875464541-5
 
Internet research
Internet researchInternet research
Internet research
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Cyber threat trends
Cyber threat trendsCyber threat trends
Cyber threat trends
 
WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017WordPress security 101 - WP Turku Meetup 2.2.2017
WordPress security 101 - WP Turku Meetup 2.2.2017
 
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
Distil Network Sponsor Presentation at the Property Portal Watch Conference -...
 
Understanding word press security wwc-4-7-17
Understanding word press security wwc-4-7-17Understanding word press security wwc-4-7-17
Understanding word press security wwc-4-7-17
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
C:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical HackingC:\Fakepath\Ethical Hacking
C:\Fakepath\Ethical Hacking
 
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and FrankensteinHoneypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
061203_futurewebapps_tempo
061203_futurewebapps_tempo061203_futurewebapps_tempo
061203_futurewebapps_tempo
 
Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 

Plus de wcto2017

Word camp toronto 2017 secrets to a successful website building business fi...
Word camp toronto 2017   secrets to a successful website building business fi...Word camp toronto 2017   secrets to a successful website building business fi...
Word camp toronto 2017 secrets to a successful website building business fi...wcto2017
 
Better social wp_wcto
Better social wp_wctoBetter social wp_wcto
Better social wp_wctowcto2017
 
Creating word press community with the human voice
Creating word press community with the human voiceCreating word press community with the human voice
Creating word press community with the human voicewcto2017
 
Word press and containers
Word press and containersWord press and containers
Word press and containerswcto2017
 
New programs-17-09-29
New programs-17-09-29New programs-17-09-29
New programs-17-09-29wcto2017
 
Wordcamp 2017-toronto-sam lalonde
Wordcamp 2017-toronto-sam lalondeWordcamp 2017-toronto-sam lalonde
Wordcamp 2017-toronto-sam lalondewcto2017
 
Word camp ga 2017 4
Word camp ga 2017   4Word camp ga 2017   4
Word camp ga 2017 4wcto2017
 
Woo commerce fundamentals
Woo commerce fundamentalsWoo commerce fundamentals
Woo commerce fundamentalswcto2017
 
Becoming knownwcto1
Becoming knownwcto1Becoming knownwcto1
Becoming knownwcto1wcto2017
 
Locol media mikepun wcto2017 v08
Locol media  mikepun  wcto2017 v08Locol media  mikepun  wcto2017 v08
Locol media mikepun wcto2017 v08wcto2017
 
Leveling up on building forms
Leveling up on building formsLeveling up on building forms
Leveling up on building formswcto2017
 
Joshua wold
Joshua woldJoshua wold
Joshua woldwcto2017
 
Word press beyond websites toronto
Word press  beyond websites torontoWord press  beyond websites toronto
Word press beyond websites torontowcto2017
 
Word camp toronto presentation centofanti
Word camp toronto presentation centofantiWord camp toronto presentation centofanti
Word camp toronto presentation centofantiwcto2017
 
Website optimization through quality experimentation (2)
Website optimization through quality experimentation (2)Website optimization through quality experimentation (2)
Website optimization through quality experimentation (2)wcto2017
 
Wp, uxd, and you
Wp, uxd, and youWp, uxd, and you
Wp, uxd, and youwcto2017
 
Little Things Make a Difference - Michelle Ames
Little Things Make a Difference - Michelle AmesLittle Things Make a Difference - Michelle Ames
Little Things Make a Difference - Michelle Ameswcto2017
 
Sass presentation
Sass presentationSass presentation
Sass presentationwcto2017
 
9 step-seo-healthcheck-points-for-your-word press-website
9 step-seo-healthcheck-points-for-your-word press-website9 step-seo-healthcheck-points-for-your-word press-website
9 step-seo-healthcheck-points-for-your-word press-websitewcto2017
 
Oooh shiny
Oooh shinyOooh shiny
Oooh shinywcto2017
 

Plus de wcto2017 (20)

Word camp toronto 2017 secrets to a successful website building business fi...
Word camp toronto 2017   secrets to a successful website building business fi...Word camp toronto 2017   secrets to a successful website building business fi...
Word camp toronto 2017 secrets to a successful website building business fi...
 
Better social wp_wcto
Better social wp_wctoBetter social wp_wcto
Better social wp_wcto
 
Creating word press community with the human voice
Creating word press community with the human voiceCreating word press community with the human voice
Creating word press community with the human voice
 
Word press and containers
Word press and containersWord press and containers
Word press and containers
 
New programs-17-09-29
New programs-17-09-29New programs-17-09-29
New programs-17-09-29
 
Wordcamp 2017-toronto-sam lalonde
Wordcamp 2017-toronto-sam lalondeWordcamp 2017-toronto-sam lalonde
Wordcamp 2017-toronto-sam lalonde
 
Word camp ga 2017 4
Word camp ga 2017   4Word camp ga 2017   4
Word camp ga 2017 4
 
Woo commerce fundamentals
Woo commerce fundamentalsWoo commerce fundamentals
Woo commerce fundamentals
 
Becoming knownwcto1
Becoming knownwcto1Becoming knownwcto1
Becoming knownwcto1
 
Locol media mikepun wcto2017 v08
Locol media  mikepun  wcto2017 v08Locol media  mikepun  wcto2017 v08
Locol media mikepun wcto2017 v08
 
Leveling up on building forms
Leveling up on building formsLeveling up on building forms
Leveling up on building forms
 
Joshua wold
Joshua woldJoshua wold
Joshua wold
 
Word press beyond websites toronto
Word press  beyond websites torontoWord press  beyond websites toronto
Word press beyond websites toronto
 
Word camp toronto presentation centofanti
Word camp toronto presentation centofantiWord camp toronto presentation centofanti
Word camp toronto presentation centofanti
 
Website optimization through quality experimentation (2)
Website optimization through quality experimentation (2)Website optimization through quality experimentation (2)
Website optimization through quality experimentation (2)
 
Wp, uxd, and you
Wp, uxd, and youWp, uxd, and you
Wp, uxd, and you
 
Little Things Make a Difference - Michelle Ames
Little Things Make a Difference - Michelle AmesLittle Things Make a Difference - Michelle Ames
Little Things Make a Difference - Michelle Ames
 
Sass presentation
Sass presentationSass presentation
Sass presentation
 
9 step-seo-healthcheck-points-for-your-word press-website
9 step-seo-healthcheck-points-for-your-word press-website9 step-seo-healthcheck-points-for-your-word press-website
9 step-seo-healthcheck-points-for-your-word press-website
 
Oooh shiny
Oooh shinyOooh shiny
Oooh shiny
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Navigating the Censored Web with WordPress

  • 1.
  • 2. Navigating the Censored Web WordCamp Toronto - 2017 John P. Gamboa Technical Success Manager, WP Engine @jgamboa
  • 5.
  • 6.
  • 7.
  • 9.
  • 10.
  • 11.
  • 15. China HTTP Traffic to Cloudflare April 12, 2012
  • 16.
  • 17.
  • 18.
  • 19. ● How do we reach as many people as possible on a censored Internet? ● Can WordPress do this? ● How do we make a WordPress site so that it can’t be blocked? ● What can we do if the site gets blocked?
  • 20. You are not operating on a level playing field
  • 21. Freedom on the Net Report 2016
  • 22. Is WordPress the right tool in a closed network?
  • 24. “WordPress is used by 59.4% of all the websites whose content management system we know. This is 28.5% of all websites.”
  • 25. Internet Sovereignty Internet management, network infrastructure, surveillance and content restrictions are the sovereign right of nation-states. The Internet follows terrestrial boundaries and borders.
  • 26. Ideas on Internet Sovereignty are quickly being adopted by countries that are known to be “enemies of Internet” to legitimize censorship of all speech
  • 27. How are WordPress sites censored globally?
  • 28. Blocking Sites Outright - Iran: SmartFilter - Russia: Roskomnadzor, government agency - China: “Golden Shield Project,” aka Great Firewall of China - Turkey: Judicial blocks based on political needs
  • 29. Forced Data Localization - Russia requires local registration of bloggers with more than 3,000 followers - Apple removed VPN software in the Chinese app store - China - Germany - India - Indonesia - Kazakhstan - South Korea - Nigera - Russia - Turkey - Vietnam
  • 30. DDoS For Hire - WP Engine customer based out of Phillipines often the target of Chinese DDoS. Likely for criticizing Duterte government. - /wp-login.php is a ripe location for lazy script kiddies triying to get into to sites to deface and take down content.
  • 32. SSL - Very important for security and SEO - Emerging Internet markets have lower adoption - Entire sites are more likely to be blocked
  • 33. Why do WordPress sites get blocked?
  • 35. Turkey - Political Dissent - Terrorism - Religious Protection - Kurdish Independence
  • 36. Russia - Memes - “Protection of children” - Anti-Putin - Crimea Annexation
  • 37. China - All content CCP can’t control or influence is blocked - Allows for compliant local variations of social media sites - River Crabs (河蟹), 50 Centers (五毛) and Big Mamas (大妈)
  • 39. Designing around censorship - Know if your plugins communicate externally - Ie: Jetpack - Decide if hosting overseas or registering in-country - Run tests around the world: Geopeeker.com - Full SSL could result in full site censorship - PHP 7 is a must - External advertising services and APIs - Consider global CDNs
  • 40. How do I know if my site is blocked? - Greatfire.org 🇨🇳 - BlockedinIran.org 🇮🇷 - Rublacklist.net 🇷🇺 - CloudMonitor.CA.com 🌍 - Engelliweb.org 🇹🇷
  • 41.
  • 42. What do I do if my site is blocked? - Check if recourse is available - Move to a new server - Decide on hosting in- country or overseas - Check for noisy neighbors - Check if your domain or IP is blocked - There may be nothing you can do
  • 43. - Net Neutrality - Walled Gardens/Closed Networks - Continued push for Internet Sovereignty What does the future hold?

Notes de l'éditeur

  1. The first thing they think of smog: like this photo from my apartment.
  2. 2. They think of the great firewall
  3. This is when I realized that the Great Firewall wasn’t quite like your corporate work network that stops you from wasting company hours on Facebook. This was much of complex than that. Since then, I’ve spent a lot of my free time reading and learning about the Great Firewall, and understanding how it affects business, privacy and the global security of the web. I won’t be able to talk about everything I want to, but this is going to be a start.
  4. When I was working on that Shanghai Beer Week project in China, there were a few concerns the site owner had about building a site in a closed network. As such, we had to understand the limitations of the environment we were working in. Censorship in China was pervasive, and you had to know the rules of the game. One of the first rules I learned was:
  5. In almost all the of the countries I’ve listed, WordPress.org, the website used to acquire the open source WordPress software itself, is not blocked. This is great news for those that are self-hosting their sites in countries that have issues with Internet censorship.
  6. Because WordPress now powers 28% of the entire web, it would be an economic barrier from allowing people to use WordPress itself. It’s just a tool in this situation.
  7. To understand the limitations we first have to figure out why there are limitations to hosting on WordPress in the first place. The best way to understand internet censorship and WordPress is to understand Internet Sovereignty. The idea that your country’s internet works the same way as your local laws is antithetical to the purpose of the internet, but is also the basis for almost all types of Internet Censorship.
  8. Any rationale a country gives for blocking internet content in their country is wrapped up into the idea that it’s sovereign right to do so. So, the question becomes:
  9. Iran: US corporate management software used to block websites for the whole country Russia: Blocks sites based on complaints and broad legal precedent. Fairly transparent but bad for shared IP customers China: A complex system of DNS injections, IP & domain blocks, local content management and legislation
  10. Some Walled Gardens provide unequal access. Internet “Fast Lane” for preferred web services. Think: Free Spotify for T-Mobile