Blog Posts Tagged with "Censorship"

7ddc1f3000a13e4dfec28074e9e7b658

Congress Demands Answers for DHS Domain Name Seizures

September 10, 2012 Added by:Electronic Frontier Foundation

After a year control over dajaz1.com was handed back to the owners with no apology and no explanation. It is disturbing enough that DHS has been acting as the tax-funded hired gun of the content industry, but, even more horrifying it censored the wrong targets for no good reason...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

OpJapan: Anonymous vs. Japan and its War on Piracy

June 27, 2012 Added by:Pierluigi Paganini

"Anonymous strongly believes that the implementation of this law will... solve nothing. To the government of Japan and the Recording Industry Association of Japan, you can now expect us the same way we have come to expect you in violating our basic rights to privacy and to an open internet..."

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Hacking Strikes Fear in the Heart of Texas Bureau of Prisons

June 24, 2012 Added by:Electronic Frontier Foundation

Whether you call them hackers, makers, tinkerers, or information security researchers, people on the hacking spectrum have been a boon to society for decades. They power innovation in all sectors and operate as a valuable check on the security and stability of the technology that forms the basis for our society...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Oh No, UN Control!

June 19, 2012 Added by:Jayson Wylie

The problem is that we have a bunch of ‘Bad Actors’ seeking to undermine the United States' plan for a global internet presence and freedom of information, and replace it with their own agenda of propaganda, isolationism and censorship of their populace. There is no logical course of events here...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Congressional Witnesses Agree: Multistakeholders Right for Internet Regulation

June 15, 2012 Added by:Electronic Frontier Foundation

The threat posed by the International Telecommunication Union (ITU) is not limited to an outright "takeover" by Russia or China. ITU's vision of Internet policy-making is more like "taking control" than the transparent and bottom-up multi-stakeholder process typically associated with Internet governance...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

It’s the 90′s All Over Again, Except This Time Online...

June 15, 2012 Added by:Infosec Island Admin

It’s one thing to make something criminal, and another to attempt to force behavioral modifications that infringe on our first amendment rights. We are at the tipping point with all the cyber hubbub over warfare and criminality, and Congress will likely frak us all with their swift pens of “justice”...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Pirate Bay Labels DDoS Attacks as Censorship

May 09, 2012 Added by:Headlines

Critics of DDoS attacks conducted by movements like Anonymous have long held that it is hypocritical to profess the defense of free speech by engaging in a tactic that undermines one's right to freely communicate, whether the interest is sociopolitical or an effort to engage in commerce...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Now Interested in the Great Firewall of China

February 17, 2012 Added by:Pierluigi Paganini

Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DDoS Attacks Against Government and Entertainment Websites Escalate

January 19, 2012 Added by:Headlines

Multiple websites appear to be under DDoS attack, including the DoJ's http://justice.gov, the Recording Industry Association of America's http://riaa.com, and music publisher Universal Music's http://universalmusic.com...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

SOPA/PIPA: The Internet Goes to Washington on January 18

January 13, 2012 Added by:Electronic Frontier Foundation

Representative Darrell Issa, an outspoken SOPA critic and the author of alternative legislation called the OPEN Act, has announced that Congress will hold a hearing to hear from actual technical experts, technology job creators, Internet investors and legal scholars...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Hacktivism: The End Result Versus the End Goal

December 31, 2011 Added by:Rafal Los

Unless your cave doesn't get the news, you've seen the barrage of and hacking over the past several months. If experience teaches us anything these folks are holding the final nail in the coffin of Internet freedom as it's driven in by the government they fear...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

On 2011: The Year of System Failure

December 30, 2011 Added by:Infosec Island Admin

If you really want to see why so much has happened with Anonymous, WikiLeaks, Manning, and OWS you need only look toward Capitol Hill and smell the rank problem that is our governing body. We have are at an apex that has reached the lows of the Roman empire in its decline...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Internet Architects Oppose SOPA and PIPA Legislation

December 19, 2011 Added by:Headlines

Eighty-three innovators, inventors and engineers signed the letter that specifically calls for Congress to reject the Stop Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA) in an attempt to prevent government efforts to codify broad Internet censorship powers...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Western Companies in Collusion with Chinese Oppression

September 21, 2011 Added by:Headlines

"Entering into the Chinese market as a search engine or social media provider is an ethical mine field. In the hands of authorities determined to police their subjects, search engines and social media platforms such as Facebook can become a potent tool of online repression..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Researchers Develop No-Proxy Anonymity System

July 18, 2011 Added by:Headlines

"The client secretly marks the connection as a Telex request by inserting a cryptographic tag into the headers. We construct this tag using a mechanism called public-key steganography... only the Telex service (using a private key) can recognize that a connection has been tagged..."

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Protect IP Act Would Allow Government to Block Websites

May 16, 2011 Added by:Headlines

The legislation would also require search engines to eliminate references to the offending sites from their search indexing, as well as require advertising networks and payment services to cease business with the blacklisted sites...

Comments  (0)

Page « < 1 - 2 > »