logo
EverydayChaos
Everyday Chaos
Too Big to Know
Too Big to Know
Cluetrain 10th Anniversary edition
Cluetrain 10th Anniversary
Everything Is Miscellaneous
Everything Is Miscellaneous
Small Pieces cover
Small Pieces Loosely Joined
Cluetrain cover
Cluetrain Manifesto
My face
Speaker info
Who am I? (Blog Disclosure Form) Copy this link as RSS address Atom Feed

January 12, 2009

Chinese circumvention sites selling user data

Hal Roberts, at the Berkman Center, blogs that he’s found that three suppliers of tools that allow those in China to circumvent the government’s restrictions on the Internet — DynaWeb FreeGate, GPass, and FirePhoenix — are selling information about the behavior of their users.

The sites freely publish anonymized data for people doing research on Net trends, but they will also sell you identifiable information … if you pass their smell test. Hal points to one company’s faq:

Q: I am interested in more detailed and in-depth visit data. Are they available?

A: Yes, we can generate custom reports that cover different levels of details for your purposes, based on a fee. But data that can be used to identify a specific user are considered confidential and not shared with third parties unless you pass our strict screening test. Please contact us if you have such a need.

From hands considered safe to the hands of totalitarians with a grudge is a distressingly short distance.

Hal concludes:

This sort of thing demonstrates that there is no way to eliminate points of control from a network. You can only move them around so that you trust different people. In this case, Chinese users are replacing some of the trust in their local Chinese ISPs with trust in the circumvention projects through which they are proxying their traffic. But those tools are acting as virtual ISPs themselves and so have all the potential for control (and abuse) that the local ISPs have. They can snoop on user activity; they can filter and otherwise tamper with connections; they can block P2P traffic.

So, yes, the Net routes around restrictions. But those routes themselves are subject to all the weaknesses to which we are heir. [Tags: berkman china censorship hal_roberts tor ]

[January 15: Rebecca MacKinnon spoke with some of the principles and blogs their explanations.]

Tweet
Follow me

Categories: Uncategorized Tagged with: berkman • censorship • china • digital rights • policy • privacy • tor Date: January 12th, 2009 dw

1 Comment »


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
TL;DR: Share this post freely, but attribute it to me (name (David Weinberger) and link to it), and don't use it commercially without my permission.

Joho the Blog uses WordPress blogging software.
Thank you, WordPress!