back

Cat & Mouse: Evading the Censors in 2018

Preserving access to the open Internet with circumvention technology

If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!

Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.

Video duration
00:55:05
Language
English
Abstract
The deepening of global Internet infrastructure comes accompanied with an invigorated capacity and intent by adversaries to control the information that flows across it. Inextricably, political motivations and embedded power structures underlie the networks through which we interpret and understand our societies and our world - censorship threatens the integrity of the public sphere itself. The increasing technical sophistication of information controls deployed by censors in adversarial network environments around the world can be uniquely viewed and researched by circumvention tool providers, whose work continues to preserve access to the open Internet for all communities. Through this presentation, we endeavour to share insights gained from the front lines of this technical contest.

The deepening of global Internet infrastructure comes accompanied with an invigorated capacity and intent by adversaries to control the information that flows across it. Inextricably, political motivations and embedded power structures underlie the networks through which we interpret and understand our societies and our world - censorship threatens the integrity of the public sphere itself. The increasing technical sophistication of information controls deployed by censors in adversarial network environments around the world can be uniquely viewed and researched by circumvention tool providers, whose work continues to preserve access to the open Internet for all communities. Through this presentation, we endeavour to share insights gained from the front lines of this technical contest.

The following key questions will be answered in this session:
- What are circumvention tools conceptually and how do they work?
- How have the techniques of adversaries evolved?
- What are the latest innovations in circumvention technology?
- How have emerging economies been affected, where censorship and and surveillance hardware and software are built-in to newly established ICT infrastructure?
- How do circumvention trends follow censorship events and social/political movements?
- Where do we see these technical advances leading the next generation of censorship and circumvention technology?

This is a Foundations talk. No prior understanding of circumvention technology is required to enjoy this, but the presentation will hopefully be enjoyable to all experience levels.

Talk ID
9964
Event:
35c3
Day
4
Room
Clarke
Start
2:10 p.m.
Duration
00:50:00
Track
Resilience
Type of
lecture
Speaker
kmc
Talk Slug & media link
35c3-9964-cat_mouse_evading_the_censors_in_2018
English
0.0% Checking done0.0%
0.0% Syncing done0.0%
0.0% Transcribing done0.0%
100.0% Nothing done yet100.0%
  

Work on this video on Amara!

English: Transcribed until

Last revision: 7 months, 4 weeks ago