Self-censorship: Why We Do the Censors’ Work for Them

نویسنده

  • Paul Sturges
چکیده

Governments, even the most liberal and enlightened, all consider it necessary to suppress at least some information and comment. Indeed, the key statements on intellectual freedom recognise that this may happen and that it can in certain types of case be considered legitimate. For instance, the European Convention on Human Rights, after setting out the essential rights to information and communication in its Article 10, says that: The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary in a democratic society, in the interests of national security, territorial integrity or public safety, for the prevention of disorder or crime, for the protection of health or morals, for the protection of the reputation or the rights of others, for preventing the disclosure of information received in confidence, or for maintaining the authority and impartiality of the judiciary. (Council of Europe, 1950)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Censorship and Two Types of Self-Censorship∗†

We propose and defend a distinction between two types of self-censorship: public and private. In public self-censorship, individuals restrain their expressive attitudes in response to public censors. In private self-censorship, individuals do so in the absence of public censorship. We argue for this distinction by introducing a general model which allows us to identify, describe, and compare a ...

متن کامل

Poster: Games Without Frontiers: Investigating Video Games as a Covert Channel

Censorship circumvention tools face an arms race as they work to evade increasingly motivated censors. Tools which have distinctive features can be detected and blocked by censors (e.g., Tor is actively targeted by censors around the world). As a result, there is increasing interest in disguising censorship circumvention traffic as benign protocols. SkypeMorph [1] and StegoTorus [2] are two plu...

متن کامل

Inferring Mechanics of Web Censorship Around the World

While mechanics of Web censorship in China are well studied, those of other countries are less understood. Through a combination of personal contacts and Planet-Lab nodes, we conduct experiments to explore the mechanics of Web censorship in 11 countries around the world, including China. Our work provides insights into the diversity of modus operandi of censors around the world and can guide fu...

متن کامل

Censorship Resistance Revisited

“Censorship resistant” systems attempt to prevent censors from imposing a particular distribution of content across a system. In this paper, we introduce a variation of censorship resistance (CR) that is resistant to selective filtering even by a censor who is able to inspect (but not alter) the internal contents and computations of each data server, excluding only the server’s private signatur...

متن کامل

CloudTransport: Using Cloud Storage for Censorship-Resistant Networking

Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by these systems is disjoint from normal network traffic, it is easy to recognize and block, and once the censors identify network servers (e.g., Tor bridges) assisting in circumvention, they can locate all of their users. CloudTransport is a new censorship-resistant comm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010