[liberationtech] New report on Internet Censorship and Surveillance in Turkmenistan
Rafal Rohozinski
r.rohozinski at psiphon.ca
Tue Jan 8 07:02:36 PST 2013
Jacob:
>> As you know, I've been involved with
>> ONI for the past decade, and I know you've taken a very keen interest
>> in these issues in the last few years (by you, I also mean the TOR
>> project).
>
> Well, I've tried for the better part of ten years to learn about the
> internal methods of ONI.
I'm not sure what you mean here, the ONI methodology has been published in each report that we've put out, and can be found on the website here:
http://opennet.net/oni-faq
If you are referring to why rTurtle was never released as open source, that had more to do with its history, and the fact that ONI was a university-based project where we applied controlled measures over testing, and used a limited number of contracted testers/researchers. It was never meant as a publicly accessible tool for testing. That was not its purpose or use case.
At present, rTurtle is getting long in the tooth. It was great as a testing tool in the early to mid 2000's when blocking was relatively straightforward, and we were testing mostly on dial-up and DSL and WIFI connections. Now, with complex blocking and shaping events becoming the norm, there is need for a new generation of testing tools. I'm not sure what direction rTurle will take from here on in. There are some test scheduled through to at least March 2013 using rTurtle, but since the Citizen Lab has formal leadership over the technical testing component of the ONI, these questions are best directed to them. I would stress, however, that Black Watch is a SecDev-only effort, and is not a ONI-sanctioned or related testing tool.
Rafal
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20130108/c187c0ee/attachment.html>
More information about the liberationtech
mailing list