"While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that gene
...
rates a large number of short-lived proxies. Clients using the system seamlessly hop from one proxy to the next as these browserbased proxies appear and disappear. We discuss a number of technical challenges that had to be overcome for this system to work and report on its performance and security. We show that browser-based short-lived proxies provide adequate bandwidth for video delivery and argue that blocking them can be challenging." (Abstract)
more
"This report evaluates the risks and vulnerabilities of mobile phone services and apps in 12 specified countries: the Republic of Azerbaijan, the Republic of Belarus, the People’s Republic of China, the Arab Republic of Egypt, the Islamic Republic of Iran, Libya, the Sultanate of Oman, the Kingdom
...
of Saudi Arabia, the Syrian Arab Republic, the Tunisian Republic, the Republic of Uzbekistan, and the Socialist Republic of Vietnam. Rather than focus on a single innovation, this study analyzes multiple mobile technologies – including operating systems, applications and mobile protocols – to determine their capacity to protect security and privacy and to combat censorship and surveillance. Throughout this study the protection of mobile phone users was of paramount importance." (Executive summary)
more
"This publication seeks to identify the relationship between freedom of expression and Internet privacy, assessing where they support or compete with each other in different circumstances. The publication maps out the issues in the current regulatory landscape of Internet privacy from the viewpoint
...
of freedom of expression. It provides an overview of legal protection, self-regulatory guidelines, normative challenges, and case studies relating to the topic." (Foreword, page 5)
more
"Speak safe" introduces reporters, journalists and bloggers to simple yet effective practices for maintaining control of important information and communications. Thirteen short chapters, of two to four pages each, provide basic knowledge about issues such as safe emailing, surfing, Wi-Fi, data dele
...
tion, the risks of sharing data online, or mobile phone safety. Several online resources are introduced, where additional information, tutorials and software can be found." (CAMECO Update November 2013)
more
"Internet censorship poses a large and growing challenge to online freedom of expression around the world. Censorship circumvention tools are critical to bypass restrictions on the internet and thereby to protect free expression online. Circumvention tools are primarily designed to bypass internet f
...
iltering. Therefore, the core principle behind these technologies is to find alternative paths for data packets. These alternative paths use one or more collaborative servers in order to bypass the network of blocking mechanisms. This document provides a comparison among different circumvention tools, both in terms of their technical merits, as well as how users of these tools describe their experience with them. The countries included in this report are Azerbaijan, Burma, China and Iran." (Executive summary, page 9)
more
"In this report we describe the results of a survey of 98 bloggers in the Middle East and North Africa (MENA) carried out in May 2011 in order to study bloggers’ perceptions of online risk and the actions they take to address digital communications security, including both Internet and cell phone
...
use. The survey was implemented in the wake of the Arab spring and documents a proliferation of online security problems among the respondents. In the survey, we address the respondents’ perceptions of online risk, their knowledge of digital security practices, and their reported online security practices. The survey results indicate that there is much room for improving online security practices, even among this sample of respondents who are likely to have relatively high technical knowledge and experience." (Introduction)
more
"Warum findet Facebook jeden meiner Bekannten? Auf welche Datenspuren hat der Staat Zugriff? Und was kann man aus ihnen herauslesen? Die Experten für Informationssicherheit, Constanze Kurz und Frank Rieger, weisen uns den Weg zu einer neuen digitalen Mündigkeit. Sachkundig und verständlich erklä
...
ren sie, was sich hinter den Benutzeroberflächen tatsächlich verbirgt. Aus dem Strom scheinbar harmloser Daten, die wir tagtäglich im Netz hinterlassen, werden geldwerte Informationen geschöpft, deren Ausmaß und Gehalt wir uns gar nicht vorstellen können. Ob der Staat oder Google, alle bedienen sich am Datensatz Mensch. Es ist an der Zeit, das eigene digitale Schicksal wieder selbst in die Hand zu nehmen." (Verlagsbeschreibung)
more
"While the safety of children and young people in digital spaces has become an important issue of qualitative as well as quantitative research in the developed world and has led to a significant body of knowledge, the research efforts in the developing nations, with few exceptions, are still relativ
...
ely early stage. A brief analysis of digitally relevant developing world characteristics suggests that various contextual factors such as technological, economic, market, educational, and cultural parameters need to be taken into account at the levels of risk analysis and risk evaluation and with regard to response strategies." (Summary/conclusions, page 30)
more
"The Guide contains six main chapters. After an Introduction (Chapter 1) the Guide provides an overview of the phenomena of cybercrime (Chapter 2). This includes descriptions of how crimes are committed and explanations of the most widespread cybercrime offences such as hacking, identity theft and d
...
enial-of-service attacks. The Guide also provides an overview of the challenges as they relate to the investigation and prosecution of cybercrime (Chapters 3 and 4). After a summary of some of the activities undertaken by international and regional organizations in the fight against cybercrime (Chapter 5), the Guide continues with an analysis of different legal approaches with regard to substantive criminal law, procedural law, international cooperation and the responsibility of Internet Service Providers (Chapter 6), including examples of international approaches as well as good-practice examples from national solutions." (Introduction)
more
"Este manual está dividido en cuatro partes que pueden leerse en cualquier orden. El lector no requiere conocimientos especiales, aunque tener unas nociones básicas del funcionamiento del ordenador y de Internet le ayudaría. Los capítulos que contienen información de carácter más técnico est
...
án marcados “Para los techies”. La primera sección se dedica a comprender sus necesidades y vulnerabilidades de seguridad, con un enfoque no técnico al entorno digital. Le ofrece un método para identificar las amenazas que plantean situaciones concretas y, de este modo, ayudarlo a decidir las estrategias más adecuadas a la hora de aplicar las soluciones de privacidad y seguridad. En la segunda sección se enumeran diferentes elementos relativos a la seguridad en los ordenadores e Internet. Se presentan al lector las operaciones informáticas y la infraestructura de Internet. Se explican en de forma detallada métodos de asegurar los datos, esquivar la censura cibernética y protegerse contra ataques maliciosos. La tercera sección es un resumen de la legislación mundial para restringir y seguir el flujo de información y las comunicaciones. En ella se muestra la tendencia a la baja causada por el aumento de las restricciones a los derechos a la libertad de expresión, la privacidad y la comunicación en muchos países. Se presentan casos de defensores de los derechos humanos que actualmente se encuentran en prisión o perseguidos por su trabajo a través de Internet, como ejemplos de la forma que tienen algunos gobiernos de hacer cumplir estas leyes. En la cuarta sección se ofrece a los defensores de los derechos humanos y sus organizaciones posibles escenarios para abordar los problemas de inseguridad electrónica y garantizar la continuación de su trabajo. Los escenarios se refieren a los conceptos presentados en el manual y las soluciones se basan en acciones viables." (Página 3)
more
"Gewerkschaften und Datenschützer fürchten um die Pressefreiheit: Immer neue Gesetze erschweren die vertrauliche Kommunikation per Internet und Telefon. Besonders stark betroffen sind Berufsgruppen, die bislang nur in Sonderfällen ausgespäht werden durften: Journalisten, Juristen und Ärzte. Doc
...
h es ist möglich, die Kontrollen zu umgehen - ganz legal und ohne großen technischen Aufwand! Journalisten können auch weiterhin diskret Informanten kontaktieren. Oder Anwälte ihre Mandanten. Oder Ärzte ihre Patienten. Das Buch verrät, welche Techniken es gibt. Schritt für Schritt wird der Umgang mit Programmen gezeigt, die die Kommunikation anonymisieren, von der E-Mail über den Chat bis zur Internet-Telefonie. Der Leser erfährt, wie er Spuren auf Computern oder im World Wide Web verwischt. An praktischen Alltagsbeispielen wird gezeigt, welche Methode wann angewendet werden sollte. Dabei Setzt das Buch keine besonderen Computerkenntnisse voraus: Wer Surfen, Mailen und Office-Programme benutzen kann, bringt genug Wissen mit, um sich anonym im Internet zu bewegen. Das Buch behandelt außerdem zwei Spezialthemen: Wie kann man beim Telefonieren mit dem Handy seine Identität verschleiern? Und: Wie umgeht man die Zensur in Diktaturen? Das Buch eignet sich deshalb auch besonders für Auslandskorrespondenten und für Mitarbeiter von Hilfsorganisationen." (Verlagsbeschreibung)
more
"This guide is meant to introduce non-technical users to Internet censorship circumvention technologies, and help them choose which of them best suits their circumstances and needs." (Page 5)
"This manual is divided into four parts which can be read in any order. The reader does not require any special expertise, although some basic knowledge of computer and Internet operations would come handy. The chapters, containing information of a more technical nature, are marked ‘For Techies’
...
. The First Section is about understanding your security needs and vulnerabilities. It describes a non-technical approach to the digital environment. A method of mapping the threats, posed by a particular situation, is off e red to help you decide on the strategies for implementing privacy and security solutions. The Second Section lists various elements of computer and Internet security. It introduces the reader to computer operations and Internet infrastructure. Methods of securing data, bypassing Internet censorship and protecting yourself against malicious attacks are explained in detail. The Third Section is a summary of worldwide legislation to restrict and monitor information flow and communications. It shows the downward trend, caused by the growth of restrictions to the rights to freedom of expression, privacy and communication, in many countries. Cases of human rights defenders currently in prison or persecuted because of their work through the Internet are presented as examples of the ways some governments enforce these pieces of legislation. The Fourth Section drafts possible scenarios for human rights defenders and their organisations of dealing with problems of electronic insecurity and ensuring continuation of their work. The scenarios relate to the concepts presented throughout the book and solutions are based on realisable actions." (Page 3)
more