Battle for Information : Combating Internet Censorship
نویسنده
چکیده
The Internet has become ubiquitous across the globe with more people getting connected to it, at more places, and through increasingly varied network-enabled devices. Unfortunately, Internet users face constant threats to their online security and privacy: repressive regimes deprive them of open access to the Internet, corporate networks monitor their online behavior, advertising companies collect and share their private information, and cybercriminals hurt them financially through security breaches. I am interested in building secure and privacy-preserving tools for Internet communications. Such tools can be deployed not only by dissidents and whistleblowers, but also by ordinary Internet users on a daily basis. More specifically, I assess the security and privacy provided by existing network protocols and services, and propose design adjustments or clean-slate architectures to retain users’ security and privacy. To this end, I combine the development of practical systems with rigorous theoretical analysis, and incorporate techniques from various disciplines such as computer networking, cryptography, and statistical analysis. The specific problems I have explored in the past include Internet censorship resistance, network tra c analysis, network situational awareness, social network malware, mobile security, and multimedia information hiding. My research has found flaws in popular privacy-preserving tools, and has led to the advent of novel designs to overcome these problems. My work has been publicized in the media through interviews, and I received the Best Practical Paper award from the IEEE Symposium on Security & Privacy 2013.
منابع مشابه
Censorship is Futile
The Internet has become the new battle ground between authoritarian regimes and ordinary individuals who want unimpeded access to information. The immense popularity of online activism and citizen journalism enabled by social media has instigated state level players to partially or completely block access to the Internet. In return, individuals and organizations have been employing various anti...
متن کاملIntroduction to Internet Censorship and Control
The Internet is and has always been a space where participants battle for control. The two core protocols that define the Internet – TCP and IP – are both designed to allow separate networks to connect to each other easily, so that networks that differ not only in hardware implementation (wired vs. satellite vs. radio networks) but also in their politics of control (consumer vs. research vs. mi...
متن کاملCommentary: Combating Sale of Counterfeit and Falsified Medicines Online: A Losing Battle
An article entitled “Combating Sale of Counterfeit and Falsified Medicines Online: A Losing Battle”, authored by Kah Seng Lee and colleagues, presented the cases of some countries, including China’s fight against counterfeit and falsified medicines (CFMs). Regarding to the formulation and enforcement of legislations in this aspect in China, we comment on the article by providing further informa...
متن کاملA Taxonomy of Censors and Anti-Censors: Part I-Impacts of Internet Censorship
The tug-of-war on the Internet between censor and anti-censor technologies is intensifying. With an aim to raise awareness on Internet censorship and its circumvention, this paper and its companion Part II present a conceptual study of Internet censorship and anti-censorship. This first paper focuses on Internet censorship. It outlines an historical account of censorship through the lens of new...
متن کاملInternet censorship circumvention technology use in human rights organizations: an exploratory analysis
Using an organizational informatics approach, this study explores the implications of human rights organizations’ use of censorship circumvention technologies. Through qualitative analyses of data collected through in-depth interviews, the research examines the factors influencing the use of circumvention technologies and the organizational effects of their use. The outcomes include a revised m...
متن کامل