Friday, 3. June 2016

Streisand-Effekt


Als Streisand-Effekt wird ein Phänomen bezeichnet, wonach der Versuch, eine unliebsame Information zu unterdrücken oder entfernen zu lassen, öffentliche Aufmerksamkeit nach sich zieht und dadurch das Gegenteil erreicht wird, dass nämlich die Information einem noch größeren Personenkreis bekannt wird. Seinen Namen verdankt das Phänomen Barbra Streisand, die den Fotografen Kenneth Adelman und die Website Pictopia.com 2003 erfolglos auf 50 Millionen US-Dollar verklagte, weil eine Luftaufnahme ihres Hauses zwischen 12.000 anderen Fotos von der Küste Kaliforniens auf besagter Website zu finden war. Damit stellte sie aber erst die Verbindung zwischen sich und dem abgebildeten Gebäude her, woraufhin sich das Foto nach dem Schneeballprinzip im Internet verbreitete. Adelman argumentierte, er habe den Strand fotografiert, um die Küstenerosion für das California Coastal Records Project zu dokumentieren.

wikipedia.org

Streisand Silence censorship. Automate the effect. The Internet can be a little unfair. It's way too easy for ISPs, telecoms, politicians, and corporations to block access to the sites and information that you care about. But breaking through these restrictions is tough. Or is it?

Streisand

Introducing Streisand A single command sets up a brand new server running a wide variety of anti-censorship software that can completely mask and encrypt all of your Internet traffic.

Streisand natively supports the creation of new servers at Amazon EC2, DigitalOcean, Google Compute Engine, Linode, and Rackspace—with more providers coming soon! It also runs on any Ubuntu 14.04 server regardless of provider, and hundreds of instances can be configured simultaneously using this method. The process is completely automated and only takes about ten minutes, which is pretty awesome when you consider that it would require the average system administrator several days of frustration to set up even a small subset of what Streisand offers in its out-of-the-box configuration. Once your Streisand server is running, you can give the custom connection instructions to friends, family members, and fellow activists. The connection instructions contain an embedded copy of the server's unique SSL certificate, so you only have to send them a single file. Each server is entirely self-contained and comes with absolutely everything that users need to get started, including cryptographically verified mirrors of all common clients. This renders any attempted censorship of default download locations completely ineffective.

github.com

The impossible task of creating a “Best VPNs” list today

From a technical point of view, I think the most underrated vulnerabilities are network leaks in the client-side VPN software,” said Campbell. Even after a user has connected to a VPN server, a few outgoing packets may not be using the VPN tunnel, which could compromise their privacy. “That could be life threatening. VPNs have been rightly criticized about this vulnerability by many in the security/anonymity community.

arstechnica.com

... Comment