بایگانی دسته: Blog

Auto Added by WPeMatico

Facebook Reportedly Working on Censorship Tool for Use In China

Last week, it was reported that Facebook is working on a way to enter the market in China – where it is currently banned. China has censored Facebook, along with many other websites and social media sites as part of its censorship under the Great Firewall. To expand into the Chinese market Facebook would have to implement certain features, including a tool to censor news and specific posts from showing to users in China.
While details of this concept are unconfirmed by Facebook, if they proceed with the tool it could set a scary precedent for censorship within social media platforms and other sites in China. As one outlet reports, Facebook wouldn’t censor posts by itself, but would provide a tool to a third party within the country to monitor.
Some other sites, such as Weibo, a social network site, operate in China by complying with government rules and censorship. As you are likely aware, China is a highly censorious country and Intenret is filtered and controlled by the governemnt with a mechanism called the “Great Firewall.” The Great Firewall blocks a wide vareity of sites and content, including popular tools such as Google apps and social networks Facebook and Twitter.
Sources: Mashable, TechCrunch

خرید وی پی ان آنتی فیلترآنتی فیلتر

Russia Building Its Own Great Firewall with Help From China

It’s being reported that Russia is working on it’s own “Great Firewall” – a reference to the mechanism China uses to filter and censor their Internet. Russia has been working with China to implement some aspects of the Great Firewall, to maintain control over their flow of information and enable telecom companies to comply with recently-passed Russia Internet laws. Russia’s system to filter the Internet is dubbed the “Red Web.”
Russia has already been imposing restrictions on Internet users, but has significantly ramped up these measures in recent months. In June the country passed several measures, called Yarovaya’s laws, which include data retention provisions. The laws require telecom companies to store user data for 6 months and metadata for 3 years. Additionally, they mandate that companies provide “keys” to encrypted communications if asked by authorities. And now, just this month, additional legislation was passed which “gives the Kremlin primacy over cyberspace,” including the “exchange points, domain names and cross-border fibre-optic cables” that comprise the Internet.
The purpose of the laws isn’t entirely clear — there is some debate over whether the goal is to ensure companies can comply with data retention provisions or for the government to both censor and maintain control over the flow of information for political reasons (or both). Either way, it is a concerning development as the country moves towards increased control such as that exercised in China.
Earlier in December, Russia blocked access to popular networking site LinkedIn, a move which reflects tightening control over the Internet.
Russian Laws and VPN Use
When using a VPN, your online privacy is better protected than without one, as Internet service providers or telcos will only see that you connected to the VPN and are unable to view other personal details about your activity. For more information on data retention legislation and Golden Frog’s data retention policies, please read our detailed blog post.
Sources: Business Insider, The Guardian

خرید وی پی ان آنتی فیلترآنتی فیلتر

Enjoy the Holidays with a VPN

The holiday season is coming up!  Did you know there are many ways to use a VPN to make your life easier, and to make the season even more merry and bright? Below are some of the great ways you can use a VPN this holiday season.
Travel – Traveling for the holidays? A VPN is an essential tool to bring with you on all your travels, as it ensures your privacy will remain protected and your connection secure at all times from any location. A VPN protects you from hackers and snoops on public Wi-Fi networks you encounter on your travels, such as airport or hotel networks. It also allows you to bypass censorship you may encounter when traveling to countries around the world.
Shopping – A VPN encrypts your Internet connection to secure it, so your privacy and personal details remain protected when shopping online or completing other transactions. The holidays are a popular time for criminals and hackers to attempt to steal personal information, so using a VPN at this time of year is essential.
Staying in Touch – Staying in touch and sharing holiday memories is so important, and a VPN enables you to do so whether your family and friends are near or far. With a VPN, your privacy remains protected as you share memorable moments and communicate online or with messaging apps.
Unsecured Wi-Fi – It’s likely you’ll be out and about this holiday season, whether shopping or traveling and meeting up with friends and family. With so much moving around, it’s likely you’ll encounter unsecured Wi-Fi networks – and will want to use a VPN to secure your connection at all times to remain worry-free!
Protect Your Family’s Privacy – Feel confident that the privacy of you and all your family members is protected when they come over to your house to celebrate. Install VyprVPN apps on all your devices so you know your privacy is always protected end to end.

خرید وی پی ان آنتی فیلترآنتی فیلتر

۲۰۱۶: The Year in Privacy & Security

As the year comes to a close, we take a look back at 2016. This year, the debates over privacy and security continued to rage on with victories and setbacks alike.
Encryption
By far, the biggest theme of 2016 was encryption – and the debates over privacy and security that came along with it. The Apple v. FBI case in early 2016 ignited a worldwide debate, calling attention to important issues about privacy, security and the right to protect yourself online. The debate hit the main stage when the FBI asked Apple to offer access into encrypted communications on an iPhone (iMessage) app, and Apple refused as they do not have access to the messages. This set off a huge debate about when – if ever – it is OK to break encryption. Most of the tech community and privacy companies took a strong stance against backdoor encryption, citing threats to innovation and technology as well as the danger of introducing vulnerabilities that can be exploited by bad actors.
Surveillance
Unfortunately, this year we saw a trend of surveillance practices increasing around the world. Some shocking revelations were made about massive spying projects in both the United Kingdom and the United States, as well as many other regions who increased their ability to spy or access personal communications. Legislation was also passed which granted more powers to mass surveillance in many areas, continuing the debate about what the appropriate balance is between personal privacy and national security.
Decline in Internet Freedom
As detailed in an annual report by Freedom on the Net, Internet freedom was on the decline for the 6th consecutive year in a row. This alarming trend illustrates increasing censorship around the world, both of websites and content. This year there was a trend of popular messaging apps (for example, WhatsApp) being blocked in various countries – sometimes due to the fact they employ unbreakable encryption, at other times to stymie communication or organizing during protests. These outages took place in a span of areas, but were strong in the Middle East and Africa, and other regions. Countries like China, Russia and others also tightened grips via mass censorship and the introduction or strengthening of “Great Firewalls.”
Data Sharing & Privacy
This year, we saw several regulations aimed at both protecting consumer privacy and restricting the amount of personally-identifiable data that can be viewed or shared by companies or across platforms. On the other side of this, the year brought legislation aimed at decreasing privacy and data protections for users, as well as measures for data retention. At Golden Frog, we delved into the topic “you are the product,” exploring ways that companies often exploit user data.
Some of the legislation that went into place this year included:
Google’s privacy policy updates to allow for tracking of personally identifiable data across platforms
New FCC regulations calling for explicit consumer consent before sharing or collecting any data about users
The Investigatory Powers Bill in the Uk, which is not only a surveillance bill but also allows for sharing of personal information
IoT and Insecurity
The Internet of Things (IoT) continues to be a big topic this year, with reports about the insecurity of connected devices appearing in the news. The IoT was a major focus at this year’s CES in early January, and continued to dominate the news throughout the year. Just recently, a study again highlighted how dangerous this network of items is and the inherent vulnerabilities that exist. There were some very large DDoS attacks at the end of the year, which employed botnets comprised of IoT devices to carry out attacks (a departure from the past when they employed computers). As more and more devices continue to be connected, it’s likely the buzz over the IoT will continue.
Other Topics
Some other themes this year included an increase in consumer awareness and concern over privacy, which is a positive step in that people are taking more ownership of their privacy and strides to improve it. We also saw a trend of people becoming concerned and more aware of unsecured Wi-Fi networks, and the risks associated with these.

خرید وی پی ان آنتی فیلترآنتی فیلتر

Rule 41 Becomes Law, Expands FBI Hacking Powers

Rule 41 went into effect in the United States on December 1, 2016. This legislation grants the United States FBI more hacking powers, giving them the ability to search multiple computers across the USA with only a single warrant. Previously, they could only search within the district where the warrant was issued. The rule also explicitly mentions those who use means to try to mask their location or identity (Tor, VPNs, etc.), and gives the government broader authority to look into these individuals during investigations by expanding the jurisdiction of warrants. The purpose of this rule is to fight hacking and botnets, but as with many similar pieces of legislation, it has created quite a stir due to privacy concerns and the sweeping authority it grants.
Rule 41 & VPN Use
As stated above, the expanded Rule 41 powers will allow the FBI more flexibility in obtaining warrants during investigations, as the warrants are no longer limited by the jurisdiction (area) of the user or the server. Tools like VPNs were specifically mentioned as part of the legislation, as they can be used to mask physical location. Two of the main concerns about the amendments to Rule 41 include:
Because VPNs and other tools conceal information like data, it’s not possible for the FBI to determine the person’s true jurisdiction is if they are using a VPN. Without a VPN, they could more easily identify the jurisdiction of the server or user.
Rule 41 could make it easier to get a warrant, as people can seek warrants from a much larger amount of locations, even with less information (for example, they may not know the users’ true location initially, but may still obtain the warrant as the jurisdiction for using it is expanded).
Golden Frog still has the same policies in place in regards to providing information on users when requested by court order. As stated in our privacy policy, “Golden Frog will not sell or otherwise release a member’s identifying information – minimal information reasonably calculated to identify and no more – or usage information to investigators, attorneys, or agencies unless we are directed to do so by a court of competent jurisdiction in the matter.”
While Rule 41 grants the FBI greater hacking power, the actual requirement for the warrant and the way that Golden Frog responds to the warrant are not any different under the amendments to Rule 41.

خرید وی پی ان آنتی فیلترآنتی فیلتر

Russia Blocks LinkedIn for Violating Data Storage Law

LinkedIn was officially blocked in Russia this Thursday, as they were found to be in violation of a Russian data storage law.  The law, passed in 2014 and enacted in September 2015, requires that websites store data for their Russian users on local servers within the country. It also includes data retention provisions for a period of 6 months. The law not only applies to Russian companies, but also applies to Internet companies and other global service providers. LinkedIn submitted an appeal to the ruling to a higher court, which was officially rejected. LinkedIn is a social networking platform used by professionals.
As a result of the block users in Russia can no longer access LinkedIn, a move that affects over 6 million members. Russian ISPs were ordered to enforce the block within a 24 hour time period, and can face fines for non-compliance. It’s not known why LinkedIn was targeted, but TechCrunch speculates it was to set an example for other providers and encourage them to comply.
It’s likely this case may set a precedent for how Russia handles similar situations going forward. Reportedly, Apple & Google have started to comply with the law and moved their data to local servers, but it’s unclear whether Facebook and Twitter will. Although Russia says the law’s purpose is to protect data from cyberattacks, many others believe it’s a censorship effort to increase the control the country already has over the Internet. LinkedIn is pushing back, requesting a meeting with regulators to discuss the situation.
Update – November 29, 2016: The United States government has expressed concern over Russia’s decision to blocked LinkedIn, as they are worried it might set a precedent for censoring other websites in Russia: “This decision is the first of its kind and sets a troubling precedent that could be used to justify shutting down any website that contains Russian user data.”
 The US also asserted that the block harms competition, and has a negative effect for people in Russia.
Sources: CS Monitor, Reuters, TechCrunch

خرید وی پی ان آنتی فیلترآنتی فیلتر