Skip to main content

The Use of Liberation Technology

  • Chapter
  • First Online:

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 7))

Abstract

This Chapter briefly describes, with a more technological approach, instruments and techniques used in critical contexts to circumvent filters, to give to the user a good level of anonymity, to encrypt data, to connect to sites banned by several regimes, to spread sensitive information using blog platforms and other means. After a first introduction to the concept of “liberation technology” and to the most common strategies used to operate safely in repressive contexts, the Chapter will list, with a short comment, the most used software tools, such as Tor, the proxies system and the best techniques to make information circulating free.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    See Sect. 6.2.7.

  2. 2.

    Concerning the interesting (technical) issue of how to circumvent the Great Firewall of China (from an introductory point of view), see Copeland notes and his dialogue with a dissident (Copeland 2012): “When I saw Leah (last name withheld until she’s back in the U.S.) in May a week before she left for a 3-month trip to China, she admitted it would be difficult to break her Facebook and Twitter habit. But, like any good addict, it took Leah less than a week to get settled and circumvent the Great Firewall of China. Along the way, she learned it was a relatively easy process. Leah, a 21-year-old student at the college where I teach, emailed me this week. She figured out that for about $9, she can download a virtual private network, which effectively nullifies China’s efforts to block access to certain websites. Every time she logs onto the Internet, she also signs into the VPN, which gives her access to Facebook, Twitter and all the other sites the Chinese government tries to censor. “It was fairly easy for me to set up,” Leah said. China did try to crack down on VPNs last year, but the effort seemed to primarily focus on university and corporate connections. Home users were largely unaffected. China, of course, is not trying to block all users from accessing those sites. An all-encompassing censorship strategy for all of the country’s 513.1 million Internet users is not feasible or practical. The government’s hope is that if it can make access to Facebook, Twitter and other sites enough of a pain, it will deter most people from bothering […] Six years after Google launched a government-monitored version of its search engine in China, and 2 years after Google said it would stop self-censoring in the country, Leah said few people still use it. They instead opt for the more widely popular Baidu. “Most people wouldn’t even think to use Google for online searches the way I would,” she said. “I actually had an experience like this the other day when I was asked how I found some information, and I said in an obvious tone that I Googled it, not remembering that normally they wouldn’t even think to use Google as a search engine. Leah also noted that Weibo, a Chinese social network that combines Twitter- and Facebook-like features, remains hugely popular as an alternative to the better-known but banned American social networks. And QQ is also gaining traction as an instant messenger, video chat and file-sharing client”. (Copeland 2012).

  3. 3.

    See Sect. 6.2.14.

  4. 4.

    See Sect. 6.2.6.

  5. 5.

    See the web page of the project at https://alkasir.com/.

  6. 6.

    See Sect. 6.2.12.

  7. 7.

    For a complete overview see the Grimmelmann’s study regarding this strange start-up (Grimmelmann 2012).

  8. 8.

    See the web site of the project at the address http://tails.boum.org/. Accessed 24 November 2011.

  9. 9.

    See the web site of the project at the address https://ssd.eff.org/. Accessed 24 November 2011.

  10. 10.

    See the web page of this tool at the address http://www.dit-inc.us/dynaweb. Accessed 27 November 2011.

  11. 11.

    See the web page of the project at the address http://www.internetfreedom.org/FreeGate. Accessed 24 November 2011.

  12. 12.

    See the web page of the project at the address http://www.internetfreedom.org/Gtunnel. Accessed 24 November 2011.

  13. 13.

    See the web site at the address http://hotspotshield.com/. Accessed 24 November 2011.

  14. 14.

    See the web site at the address http://anon.inf.tu-dresden.de/index_en.html. Accessed 24 November 2011.

  15. 15.

    See the web site at the address http://psiphon.ca/. Accessed 24 November 2011.

  16. 16.

    See the Tor web site at the address https://www.torproject.org/.

  17. 17.

    See the web site at the address http://ultrasurf.us/. Accessed 24 November 2011.

  18. 18.

    See the web site at the address http://your-freedom.net/. Accessed 21 November 2011.

  19. 19.

    See the web page of Roger Dingledine at the address http://freehaven.net/∼arma/cv.html. Accessed 21 November 2011. See, also, his interesting recent studies regarding trust-based anonymous communications (Johnson et al. 2011), concerning Tor (Ngan et al. 2010) and on statistical data in the Tor anonymity network (Loesing et al. 2010). Of fundamental interest is, also, his paper with one of the first accurate descriptions of the Tor network (Dingledine et al. 2004) and, before Tor, of the Free Haven Project (Dingledine et al. 2000).

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giovanni Ziccardi .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media Dordrecht

About this chapter

Cite this chapter

Ziccardi, G. (2013). The Use of Liberation Technology. In: Resistance, Liberation Technology and Human Rights in the Digital Age. Law, Governance and Technology Series, vol 7. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5276-4_5

Download citation

Publish with us

Policies and ethics