Comments

ArronJune 23, 2009 9:29 AM

There is always a way to communicate through acl's and firewalls. Any censoring government should reasonably know that these types of actions will only slow the spread of news. Time will tell if Iran can be considered one of these countries. If not then we will see a travesty.

Phil MJune 23, 2009 9:42 AM

see also: NedaNet [1], "a network of hackers formed to support the democratic revolution in Iran. [NedaNet's] mission is to help the Iranian people by setting up networks of proxy severs, anonymizers, and any other appropriate technologies that can enable them to communicate and organize -- a network beyond the censorship or control of the Iranian regime." As of a couple days ago, Eric S. Raymond is the public contact for NedaNet [2].

References:

[1]: http://www.catb.org/esr/nedanet/
[2]: http://esr.ibiblio.org/?p=1096

BateauJune 23, 2009 10:09 AM

There is a paper, Covert channel vulnerabilities in anonymity systems, which will likely be of great use should deep packet inspection become a real threat (though I doubt on such a large scale it could be used effectively)

www.cl.cam.ac.uk/techreports/UCAM-CL-TR-706.pdf

I would highly recommend it.

kashmarekJune 23, 2009 11:18 AM

Let's see, they should just turn off the electricity, perform the cleansing rituals, clean up, and turn the electricity back on.

By the way, don't we have satellites watching this stuff? Where is that output?

Anonymous Coward EJune 23, 2009 11:37 AM

Blowback from USA meddling is going to happen to those arrested, and potential unwanted unstable results might follow. I hope some overt methods fall from use and proper ways become more directed.

Cheeleading on this caliber, requires special care and sophistication on all levels. Proxy sophistication requires state handling to be top level.

Sadly, what is needed is in short supply, and now is the time for what we do not have. Enough said.

A science fiction movie might be a good guide, but ethically, things look pretty bad.

An errie silence is problematic, and real support is uncertain. The USA is too divided and too corrupt to handle such old world complexities righteously. Iraq was a major disaster, that bare a problem that is only getting worse, while we ignore the real problems, pogo applies. Better ways of helping people exist, and walking over people is filled with bad history and results. I hope a better world can come from these victims of a police society gone bad.

SwatneJune 23, 2009 1:46 PM

I really like this line in the report -

"Perhaps games provide a possible source of covert channels (e.g. “Bring your elves to the castle on the island of Azeroth and we’ll plan the next Ahmadinejad protest rally?”) "

ChazJune 23, 2009 2:37 PM

@Phil M "[NedaNet's] mission is to help the Iranian people by setting up networks of proxy severs..."

I know someone who set up a proxy server. He mentioned that the instructions he got suggested leaving the logging off. What are the chances that the right people are using the proxy servers for the right purposes?

ShaneJune 23, 2009 3:29 PM

@Phil

"As of a couple days ago, Eric S. Raymond is the public contact for NedaNet"

Well, there goes that project. Hahaha.

Kid AnarchyJune 23, 2009 4:36 PM

"Tor is well-known for allowing citizens of oppressive regimes to navigate around their country's internet filtering software and firewalls. It's likely that it's in use right now in Iran, as the protests over the presidential election results continue, having led the government to heavily censor the country's internet access."
http://www.readwriteweb.com/archives/researchers_to_debut_veiled_the_darknet_powered_by_a_web_browser.php
If a government attacks the Internet, people are going to use a work around. The government response is, "let's shut off the Internet." Let's turn off the lights and curse the darkness. If Iran cuts the lights, people will resort to lighting new fires. They seem to want to go back to the stone age.
But, "Iran's mullahs are finding out the hard way that medieval methods of control are no match for 21st--century technology." Newsweek reports. Welcome to 2009.

Davi OttenheimerJune 23, 2009 7:54 PM

I thought the more interesting aspect of the situation is that Iran is leaving communication flowing. They aren't blocking it all. Arbor also points this out.

That means it is more important than even to authenticate even tweets. Although it's great that social platforms are spreading, far too many do not seem to realize how easily their information can be intentionally manipulated. Fake meeting places are easy to interject, people can be told to change plans or cancel tactics, as I've mentioned before with regard to protests in Egypt and militias in Somalia...

http://davi.poetry.org/blog/?p=4297

AnatolyJune 24, 2009 7:21 AM

Fear of 9/11. The founder of CIA have an code 7-11. Do you prepare to 2010.09.11?

Jonathan WilsonJune 25, 2009 3:12 AM

I wonder if they have blocked Second Life. To me, that seems like a good way to meet up and organize (especially since IIRC they have voice chat now)

Interesting that SSH is the most blocked/restricted protocol (although I expect large chunks of that is being tunneled through SSH.

Jonadab the Unsightly OneJune 26, 2009 7:43 AM

The internet, in practice, cannot be *reliably* censored, unless you're willing to block everything by default and just whitelist a few specific approved things.

Of course, you can censor it *unreliably*, i.e., block a percentage of the stuff you're trying to block.

OldSpewyJune 28, 2009 8:06 AM

Deep packet inspection is useless on an encrypted connection ... Tor is not to be trusted as many exit nodes are known to be in the wrong hands eg German telecom security department... i have had first hand experiance of this ... also many other governments are suspected of running huge exit nodes washington also comes to mind... if i was in Iran and wanted a secure/safe way to use the net first would be a decent vpn/ssh connection and secondly only if needed a proxy....

Leave a comment

Allowed HTML: <a href="URL"> • <em> <cite> <i> • <strong> <b> • <sub> <sup> • <ul> <ol> <li> • <blockquote> <pre>

Photo of Bruce Schneier by Per Ervland.

Schneier on Security is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc..