[liberationtech] New report on Internet Censorship and Surveillance in Turkmenistan

Rafal Rohozinski r.rohozinski at psiphon.ca
Tue Jan 8 07:02:36 PST 2013


Jacob:

>> As you know, I've been involved with
>> ONI for the past decade, and I know you've taken a very keen interest
>> in these issues in the last few years (by you,  I also mean the TOR
>> project). 
> 
> Well, I've tried for the better part of ten years to learn about the
> internal methods of ONI.

I'm not sure what you mean here, the ONI methodology has been published in each report that we've put out, and can be found on the website here:

http://opennet.net/oni-faq

If you are referring to why rTurtle  was never released as open source, that had more to do with its history, and the fact that ONI  was a university-based project where we applied controlled measures over testing,  and used a limited number of contracted testers/researchers.  It was never meant as a publicly  accessible tool for testing.  That was not its purpose or use case.  

At present, rTurtle  is getting long in the tooth.  It was great as a testing tool in the early to mid 2000's  when blocking was relatively straightforward, and we were testing mostly on dial-up and DSL and WIFI connections. Now, with complex blocking and shaping events becoming the norm,  there is need for a new generation of testing tools.   I'm not sure what direction rTurle will take  from here on in.  There  are some test scheduled through to at least March 2013 using rTurtle,  but since the Citizen Lab has formal leadership over the technical testing component of the ONI,  these questions are best directed to them.  I would stress, however, that Black Watch is a SecDev-only effort, and is not a ONI-sanctioned or related testing tool.

Rafal











-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130108/c187c0ee/attachment.html>


More information about the liberationtech mailing list