[AusNOG] Conroy censoring dissent?
Sean K. Finn
Sean.Finn at ozservers.com.au
Wed Nov 12 13:58:16 EST 2008
I don't think they'll care all that much if you are getting around the filters, Here's why:
http://www.acma.gov.au/webwr/_assets/main/lib310554/isp-level_internet_content_filtering_trial-report.pdf
of the filters tested, they rated the probability of circumvention against each type of content filtered, so they're already aware that it WILL be worked around. Think of circumvention as collateral damage that they are prepared to accept.
'Low' circumvention probably means 'anyone with a clue and who cares'.
Yes, the members of this list are able to get around it in a thousand creative ways, but for Joe average are they really going to be bothered setting up a VPN or workaround, or just say 'stuff it, off to the pub', and commit their sins in Meatspace instead?
It's crowd control, as long as they establish filtering as 'normal' then they've won the battle, regardless of if you can get around it or not.
-Sean.
-----Original Message-----
From: ausnog-bounces at lists.ausnog.net [mailto:ausnog-bounces at lists.ausnog.net] On Behalf Of Curtis Bayne
Sent: Wednesday, 12 November 2008 12:11 PM
To: ausnog at ausnog.net
Subject: Re: [AusNOG] Conroy censoring dissent?
If the controlling group publishes a list of blocked content then we could combine the two - why not publish a "best of the censored internet" torrent? (sans the unconscionable material, but that goes without saying)
Not only would you get your uncensored content, you'd also get a visit from two fine ladies/gentlemen in dark sunglasses and a free ride in an unmarked Police car! (Perhaps a *little* over-exaggerated, but I digress...)
Speaking of which, what will the penalties for attempted/successful censorship evasion be? How do we prove that these users are, indeed, attempting to evade the filter and it's not just a piece of spyware/an exploited machine? What about users behind corporate proxies - will it be the business' responsibility to ensure that all internal access is logged so that these attempts can be investigated?
Regards,
Curtis
-----Original Message-----
From: ausnog-bounces at lists.ausnog.net [mailto:ausnog-bounces at lists.ausnog.net] On Behalf Of Bruce Forster
Sent: Wednesday, 12 November 2008 12:02 PM
To: Mark Newton
Cc: ausnog at ausnog.net
Subject: Re: [AusNOG] Conroy censoring dissent?
> The Technical Testing Framework asks participants to detect and log
> "Circumvention attempts". It doesn't offer any guidance about what
> a circumvention attempt might be, however. For instance, does employing
> the use of a protocol that the filter doesn't know about (e.g.,
> BitTorrent)
> count as a circumvention?
HAhah! Thats great so every scrape to a tracker that the bt client does
is going to be a "circumvention" pretty funny stuff...
Regards,
Bruce
_______________________________________________
AusNOG mailing list
AusNOG at lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog
_______________________________________________
AusNOG mailing list
AusNOG at lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog
More information about the AusNOG
mailing list