{"id":14661,"date":"2013-06-03T04:42:39","date_gmt":"2013-06-03T08:42:39","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/cryptography-as-a-means-to-counter-internet-censorship\/"},"modified":"2013-06-03T04:42:39","modified_gmt":"2013-06-03T08:42:39","slug":"cryptography-as-a-means-to-counter-internet-censorship","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/cryptography-as-a-means-to-counter-internet-censorship\/","title":{"rendered":"Cryptography as a means to counter Internet censorship"},"content":{"rendered":"<p><p>    George Orwells depiction of dystopia in his classic    1984, a society devoid of privacy, may have seemed like    an exaggeration in 1949. But, with technology intruding deep    into our lives today, we may actually be heading into a less    obvious version of a similar state.  <\/p>\n<p>    Jacob Appelbaum, prolific hacker and a close associate of    WikiLeaks founder, Julian Assange, portrayed a grim picture of    the future of the Internet when he was in Bangalore this week.    He and the group of international hackers he is part of,    Cypherpunks, propagate the idea of using cryptography on the    Internet to counter surveillance and censorship on the    Internet.  <\/p>\n<p>    Traffic analysis  <\/p>\n<p>    Censorship is the byproduct of surveillance, wrote Mr.    Appelbaum in the book Cypherpunks: Freedom and Future of the    Internet, which he has co-authored with Mr. Assange. For    mass surveillance of the Internet, the first prerequisite is    traffic analysis, a systematic logging of user activity and    building profiles of users.  <\/p>\n<p>    Features such as targeted advertisements are apparently more    benign manifestations of traffic analysis.  <\/p>\n<p>    Gmail and Facebook, for instance, analyse user traffic and    activity, and deliver targeted ads, which is a boon to commerce    on the Internet. But, the method adopted raise concerns about    privacy, and in many cases can be considered an intrusion. For    instance, when Google displays ads about pizza parlours after    you have read a mail from a friend mentioning the word pizza,    it does make one think as to what else Google might know about    users.  <\/p>\n<p>    Google and Facebook are able to identify and profile users    because he or she is logged into their services, and have    voluntarily identified themselves and have signed away the    rights. This makes it easy for these Internet giants to log    user activity, attribute it to the users, run social graph    programs and build a comprehensive profile of users. While    Google and Facebook require users to be logged into their    service to profile them, it is possible to monitor users simply    by analysing the traffic emanating from their Internet Protocol    (IP) addresses. This is commonly known as traffic analysis and    is the first prerequisite for surveillance.  <\/p>\n<p>    IP addresses are numbers which can be attributed to people    using the Internet; think of IP addresses in the Internet as    vehicle registration numbers in the real world. When the IP    addresses are monitored for activity, they reveal information    about users. Concealing IP addresses is thus the first level of    anonymity for users.  <\/p>\n<p>    Data retention  <\/p>\n<p>    Browsing the Web without the necessary precautions such as    using unencrypted browsing, is akin to sending a postcard by    mail instead of using envelopes. The data on unencrypted links    can be seen transparently while they are being travelling from    source to destination, with very little technical effort.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.thehindu.com\/sci-tech\/technology\/internet\/cryptography-as-a-means-to-counter-internet-censorship\/article4772815.ece\" title=\"Cryptography as a means to counter Internet censorship\">Cryptography as a means to counter Internet censorship<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> George Orwells depiction of dystopia in his classic 1984, a society devoid of privacy, may have seemed like an exaggeration in 1949.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/censorship\/cryptography-as-a-means-to-counter-internet-censorship\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-14661","post","type-post","status-publish","format-standard","hentry","category-censorship"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/14661"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=14661"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/14661\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=14661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=14661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=14661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}