Geert Lovink on Wed, 22 Feb 2006 14:03:31 +0100 (CET)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

<nettime> Citizen Lab releases Psiphon


Hi, has anyone tried this one out yet? I wonder how many nettimers keep 
track what Citizenlab is doing and if you are, like me, also promoting 
things like www.ngoinabox.org. /geert

---

OLIVER MOORE
Toronto Globe & Mail
Monday, February 13, 2006

TORONTO -- More than fifteen years after the Berlin Wall was shattered 
with hammers and bulldozers, a Canadian-designed computer program is 
preparing to break through what activists call the great firewall of 
China.

The program, in the late stages of development in a University of 
Toronto office, is designed to help those trapped behind the blocking 
and filtering systems set up by restrictive governments. If successful, 
it will equip volunteers in more open countries to help those on the 
other side of digital barriers, allowing a free flow of information and 
news into and out of even the most closed societies.

The program is part of a quiet war over freedom of information. Even as 
countries considered repressive, such as China, North Korea, Iran and 
Saudi Arabia, pour money into stopping the free exchange of data, small 
groups of activists keep looking for ways around the technological 
barriers.

At the University of Toronto, in the small basement office of Citizen 
Lab, researchers are getting ready for the release of Psiphon, the 
latest weapon in the fight.

"I was always interested in the idea of using computers for social and 
political change," said Nart Villeneuve, who has been dabbling with the 
project for about two years. "It was a matter of creating a program for 
really non-technical people that was easy and effective."

Psiphon is designed to eliminate a drawback of anti-filter programs: 
incriminating the users behind the firewall. If found by authorities, 
that anti-filter software can lead to coercive interrogation, a bid to 
uncover the suspect's Internet travel secrets using a tactic known to 
insiders as "rubber-hose cryptoanalysis."

Mr. Villeneuve built a system that won't leave dangerous footprints on 
computers. In simple terms, it works by giving monitored computer users 
a way to send an encrypted request for information to a computer 
located in a secure country. That computer finds the information and 
sends it back, also encrypted.

An elegant wrinkle is that the data will enter users' machines through 
computer port 443. Relied on for the secure transfer of data, this port 
is the one through whichreams of financial data stream constantly 
around the world.
"Unless a country wanted to cut off all connections for any financial 
transactions they wouldn't be able to cut off these transmissions," 
said Professor Ronald Deibert, the director of Citizen Lab.

A drawback to Psiphon is that the person behind the firewall has to be 
given a user name and password by the person offering up the computer. 
With this kind of setup, Mr. Villeneuve said, activists may end up 
working with specific dissidents and people in repressive countries may 
rely on relatives abroad to help them get connected. Canadians, with 
ties to every country in the world, are in a particularly good position 
to use such a system.

Although this reduces the program's reach, a relationship-based system 
could also minimize improper use. People who know the owner of their 
proxy computer are less likely to abuse their system, the logic goes.

"The big novel thing here is that you have a one-to-one connection," 
said Danny O'Brien, activism co-ordinator at the Electronic Frontier 
Foundation, a San Francisco-based group. "That's a great innovation, 
because so many people have computers that are always on, and this lets 
you deal with someone you can trust."

If the remote user begins to view illegal material, their access can be 
limited in several ways, such as allowing access to text only. In 
extreme cases, Mr. Villeneuve said, people found with evidence of 
illegal activity on their computer would be able to prove through 
forensic analysis that it had been done by the remote user.

The team at Citizen Lab is now racing to put the final touches on the 
program in time for its public debut at the international congress of 
the free-speech group PEN in May. Billed as a uniquely Canadian 
approach to "hactivism," the first generation of Psiphon will then be 
made publicly available.

Its release is set to come against a backdrop of ever-diminishing free 
access to the Internet. Just last month the popular search engine 
Google agreed to self-censor, restricting access to certain content and 
websites in order to gain access to the Chinese market.

Sharon Hom, executive director of Human Rights in China, an 
international NGO, said the country has managed to create "a culture of 
fear and self-censorship." They are helped, she added, by Western 
countries willing to sell Internet-monitoring equipment to Beijing and 
bend to its terms.

Mr. O'Brien noted that public knowledge of monitoring can have as major 
an effect as the surveillance itself.

"You don't need to arrest every dissident and you don't need to take 
down every website. You just need to give the impression that you're 
watching," he said. "Merely establishing that you are being watched has 
a great effect on freedom of expression."

Activist groups around the world work to shine a spotlight on such 
repression, hoping that publicity and pressure will bring about change.

Although Psiphon is a purely Citizen Lab project, Prof. Deibert's team 
is also part of the Open Net Initiative. It's a partnership that 
includes Harvard and Cambridge universities and tries to document the 
extent of state interference on the Internet.

In Prof. Deibert's words, they try "to turn the tables on the watchers, 
to watch the watchers."


#  distributed via <nettime>: no commercial use without permission
#  <nettime> is a moderated mailing list for net criticism,
#  collaborative text filtering and cultural politics of the nets
#  more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body
#  archive: http://www.nettime.org contact: nettime@bbs.thing.net