796 shaares
15 results
tagged
Censure
Refusez PRISM, le programme de surveillance globale des données de la NSA. Arrêtez de déclarer vos activités en ligne au gouvernement américain avec ces alternatives libres aux logiciels propriétaires.
Il se passe quelque chose d’assez extraordinaire actuellement sur Internet suite à la tragique disparition d’Aaron Swartz : des centaines de professeurs et scientifiques du monde entier ont décidé de publier spontanément leurs travaux en Libre Accès !
Il faut dire que sa mort devient chaque jour plus controversée, les pressions judiciaires dont il était l’objet n’étant peut-être pas étrangères à son geste. Comme on peut le lire dans Wikipédia : « En juillet 2011, le militant américain pour la liberté de l’Internet Aaron Swartz fut inculpé pour avoir téléchargé et mis à disposition gratuitement un grand nombre d’articles depuis JSTOR. Il se suicide le 11 janvier 2013. En cas de condamnation, il encourait une peine d’emprisonnement pouvant atteindre 35 ans et une amende s’élevant jusqu’à 1 million de dollars. »
On peut suivre l’évolution du mouvement derrière le hashtag #pdftribute (pdf hommage) qui a déjà son site et son compte Twitter dédiés.
Dans la foulée nous avons décidé de traduire ensemble un autre article important d’Aaron Swartz (rédigé à 21 ans), en lien direct avec la motivation de tous ceux qui lui rendent ainsi un vibrant, concret et utile hommage : Guerilla Open Access Manifesto.
Ce manifeste s’achève sur cette interrogation : « Serez-vous des nôtres ? »
Il faut dire que sa mort devient chaque jour plus controversée, les pressions judiciaires dont il était l’objet n’étant peut-être pas étrangères à son geste. Comme on peut le lire dans Wikipédia : « En juillet 2011, le militant américain pour la liberté de l’Internet Aaron Swartz fut inculpé pour avoir téléchargé et mis à disposition gratuitement un grand nombre d’articles depuis JSTOR. Il se suicide le 11 janvier 2013. En cas de condamnation, il encourait une peine d’emprisonnement pouvant atteindre 35 ans et une amende s’élevant jusqu’à 1 million de dollars. »
On peut suivre l’évolution du mouvement derrière le hashtag #pdftribute (pdf hommage) qui a déjà son site et son compte Twitter dédiés.
Dans la foulée nous avons décidé de traduire ensemble un autre article important d’Aaron Swartz (rédigé à 21 ans), en lien direct avec la motivation de tous ceux qui lui rendent ainsi un vibrant, concret et utile hommage : Guerilla Open Access Manifesto.
Ce manifeste s’achève sur cette interrogation : « Serez-vous des nôtres ? »
Un certain nombre de textes tournent actuellement sur le Net suite au décès d’Aaron Swartz. Parmi eux on trouve « La Conscience d’un hacker » (ou « Le Manifeste du hacker ») datant de… 1986 et que d’aucuns trouvent particulièrement adapté aux circonstances. Et pour cause…
Nous vous le proposons traduit ci-dessous[1]. Il a été rédigé par Loyd Blankenship, (alias The Mentor) juste après son arrestation.
« Oui, je suis un criminel. Mon crime est celui de la curiosité. »
Nous vous le proposons traduit ci-dessous[1]. Il a été rédigé par Loyd Blankenship, (alias The Mentor) juste après son arrestation.
« Oui, je suis un criminel. Mon crime est celui de la curiosité. »
Many activists have been tracked via their mobile phones, and some countries conduct surveillance more extensively than others. You need to assess the risk for your own activities given the practices used in your country, how high-profile your work is, and what others in your community have experienced.
Phone companies have the capability to track and collect information about your use of mobile phones, including your location, and may share that information with the government if so requested. There is also the possibility of installing surveillance software on a phone that runs in the background without the user noticing. There is a risk of this, if your handset has been physically out of your hands for a period of time.
Phone companies have the capability to track and collect information about your use of mobile phones, including your location, and may share that information with the government if so requested. There is also the possibility of installing surveillance software on a phone that runs in the background without the user noticing. There is a risk of this, if your handset has been physically out of your hands for a period of time.
Plus de 200 milliards d’emails sont envoyés dans le monde chaque jour. Si l’email est un moyen extrêmement pratique pour échanger des informations, c’est également un outil très vulnérable : interception, usurpation d’identité, surveillance de boîte mail etc., sont autant de problèmes auxquels peuvent être confrontés les utilisateurs de boîtes emails. Il existe pourtant des moyens simples d’assurer la confidentialité de vos échanges sur Internet.
Face à ces constats, la seule voie praticable semble être de devenir capables d’imaginer et de mettre en place des politiques de sécurité adéquates. Tout l’enjeu de ce guide est de fournir cartes, sextant et boussole à quiconque veut cheminer sur cette route.
Un guide à lire, relire, pratiquer, en solitaire ou à plusieurs, à faire découvrir et à partager… ou comment affiner l’art de la navigation dans les eaux troubles du monde numérique.
Un guide à lire, relire, pratiquer, en solitaire ou à plusieurs, à faire découvrir et à partager… ou comment affiner l’art de la navigation dans les eaux troubles du monde numérique.
Flash proxies are a new way of providing access to a censorship circumvention system such as Tor. A flash proxy is a miniature proxy that runs in a web browser. It checks for clients that need access, then conveys data between them and a Tor relay.
Tor has bridge relays, but in some cases even these can be blocked despite the fact that their addresses are handed out only a few at a time. The purpose of this project is to create many, generally ephemeral bridge IP addresses, with the goal of outpacing a censor's ability to block them. Rather than increasing the number of bridges at static addresses, we aim to make existing bridges reachable by a larger and changing pool of addresses.
"Flash proxy" is a name that should make you think "quick" and "short-lived." Our implementation uses standard web technologies: JavaScript and WebSocket.
If your browser runs JavaScript and has support for WebSockets then while you are viewing this page your browser is a potential proxy available to help censored Internet users.
Tor has bridge relays, but in some cases even these can be blocked despite the fact that their addresses are handed out only a few at a time. The purpose of this project is to create many, generally ephemeral bridge IP addresses, with the goal of outpacing a censor's ability to block them. Rather than increasing the number of bridges at static addresses, we aim to make existing bridges reachable by a larger and changing pool of addresses.
"Flash proxy" is a name that should make you think "quick" and "short-lived." Our implementation uses standard web technologies: JavaScript and WebSocket.
If your browser runs JavaScript and has support for WebSockets then while you are viewing this page your browser is a potential proxy available to help censored Internet users.
WE FIGHT CENSORSHIP: Sheltering news and information
WeFightCensorship.org (WeFC) is a Reporters Without Borders project that aims to combat censorship and promote the flow of news and information.
Publishing censored and banned content : The WeFC website is used to publish content that has been censored or banned or has led to reprisals against its creator (murder, arrest, harassment, pressure and so on). The site hosts content (articles, photos, videos and sound files) in their original language (including Chinese, Arabic, Russian and Spanish) and in translation (above all in French and English). Reporters Without Borders took the initiative of creating this website because it wants to make censorship obsolete, to show that depriving content creators of their freedom, seizing copies of a newspaper or blocking access to a website containing a video will not prevent the content from being seen throughout the world – quite the contrary. The content posted on this website includes both raw content and content that has been written, edited or processed by journalists. So that its importance can be appreciated, WeFC adds an explanation of the context. Before selected content is posted on the site, the WeFC editorial committee verifies that it meets a series of very precise criteria.
WeFightCensorship.org (WeFC) is a Reporters Without Borders project that aims to combat censorship and promote the flow of news and information.
Publishing censored and banned content : The WeFC website is used to publish content that has been censored or banned or has led to reprisals against its creator (murder, arrest, harassment, pressure and so on). The site hosts content (articles, photos, videos and sound files) in their original language (including Chinese, Arabic, Russian and Spanish) and in translation (above all in French and English). Reporters Without Borders took the initiative of creating this website because it wants to make censorship obsolete, to show that depriving content creators of their freedom, seizing copies of a newspaper or blocking access to a website containing a video will not prevent the content from being seen throughout the world – quite the contrary. The content posted on this website includes both raw content and content that has been written, edited or processed by journalists. So that its importance can be appreciated, WeFC adds an explanation of the context. Before selected content is posted on the site, the WeFC editorial committee verifies that it meets a series of very precise criteria.
We’ve covered a couple of DNS tools in the past, such as the DNS propagation checker, which are useful for anyone that owns a domain. The problem is that you generally have to jump around to a bunch of different sites in order to do simple things like reverse IP lookups, traceroutes, Chinese firewall tests, propagation checks, and more. Normally you need to find a site that is dedicated to do each of those things, but ViewDNS.info pulls that all together into a single site with a simple interface.
This site makes it extremely easy to perform all of the things I mentioned earlier plus some. In fact it has over 20 different tools you can use on any domain and IP address you might have. Many of the tests, such as the DNS report, are essential tools for determining the health of the DNS for your site.
This site makes it extremely easy to perform all of the things I mentioned earlier plus some. In fact it has over 20 different tools you can use on any domain and IP address you might have. Many of the tests, such as the DNS report, are essential tools for determining the health of the DNS for your site.
Plusieurs grands acteurs des moyens de paiement (Visa, Western Union, PayPal, ou Mastercard, etc.) bloquent depuis le Cablegate de décembre 2010 les dons vers Wikileaks. L’initiative de Julian Assange a trouvé cependant un moyen pour hacker ce verrouillage qui reste d'actualité : elle a fait appel à l’association FDNN, l’émanation de French Data Network, qui soutient les projets défendant la neutralité du Net et la liberté d’expression.
Le 05 septembre 2011, tous les Syriens qui se sont connectés à Internet ont eu la surprise de découvrir une page contenant des instructions permettant de détourner la censure mise en place par le gouvernement de Bachar el- Assad et d’assurer la sécurité de leurs correspondances privées, leur donnant ainsi la possibilité de communiquer librement entre eux et avec le reste du monde, publiant au passage des fichiers log des dispositifs de surveillance syrien. Quelques membres de Telecomix, groupe décentralisé de hackers européens, constitué en 2009 contre les lois restreignant la liberté d’expression sur le net – sont à l’origine de ce qu’ils appellent “OpSyria”. Okhin, l’un des membres actifs de cette cellule, également proche de la Quadrature du net, nous donne sa vision du hacking et de la liberté.
Mark Zuckerberg a fait le rêve d’une communauté parfaite et compte sur le social reporting – "signalement social" – pour le réaliser. Lancée en 2011, l’opération consiste à faire des membres de Facebook les petits rapporteurs des violations des conditions générales d’utilisation du réseau. Depuis quelques jours, ils doivent confirmer l'identité de leurs amis utilisant un pseudonyme. Une seule exigence affichée pour cette armée mexicaine : la transparence.
One of the problems hacktivists ran into when trying to disseminate useful information to people in Syria and Egypt was how to get through to people when DNS and web access are being filtered or outright blocked. Putting up web pages containing phone numbers of ISPs volunteering dialup access was something of a crapshoot because there was no guarantee that people would be able to view them. Someone (I don't remember whom) hit on the idea of contacting sysadmins in the Middle East by leaving messages in the access and error logs of their web servers. This works but pumping an entire list of phone numbers, usernames, and passwords by hand over HTTP requests gets old fast, to say the least.
Just read the story on BBC that the P2P traffic in the UK is back to the normal amounts after the block of TPB was instated.
We never really noticed a blockade. Traffic from the UK looks the same to us, we only keep track of which countries traffic comes from, not ISP or something else (hey, we like privacy so we don't log stuff, only meta data about data). The only thing we noticed were comments on blog posts and lots of journalists e-mailing us more about UK than other things for once (like why we're blocked in Saudi, china and other countries that also do not enjoy democracy). We never bothered to reply, so journalists wrote what they wanted us to say. In a few days everything was back to normal for everyone.
We never really noticed a blockade. Traffic from the UK looks the same to us, we only keep track of which countries traffic comes from, not ISP or something else (hey, we like privacy so we don't log stuff, only meta data about data). The only thing we noticed were comments on blog posts and lots of journalists e-mailing us more about UK than other things for once (like why we're blocked in Saudi, china and other countries that also do not enjoy democracy). We never bothered to reply, so journalists wrote what they wanted us to say. In a few days everything was back to normal for everyone.
This week, I made a parody music video criticising Lord Finesse for being a copyright draconian. Guess the fuck what. He had my video pulled down, claiming it infringed his copyright. Which proves my point more than anything I could have said myself. Techdirt has written an article on the issue here: http://bit.ly/NUffTy
Anyway, in response to that, I got my Michael Moore on and have made this video. Ridiculously, I have had to avoid showing you any segment of the censored video, or of the song which I am discussing, for fear that Finesse will try to have THIS video removed too. With that in mind, please mirror and share as much as possible in case this one gets hit with a takedown aswell.
Anyway, in response to that, I got my Michael Moore on and have made this video. Ridiculously, I have had to avoid showing you any segment of the censored video, or of the song which I am discussing, for fear that Finesse will try to have THIS video removed too. With that in mind, please mirror and share as much as possible in case this one gets hit with a takedown aswell.