Cuba’s blackout reveals authoritarian’s limited control of the web – Quartz

The Cuban government briefly shut off the entire country’s internet on June 11 in an effort to disrupt historic nationwide protests that were being coordinated and live-streamed using the island’s nascent mobile data network.

Internet shutdowns are a well-worn tactic by authoritarian regimes over the past decade. After Egypt blocked the web during Arab Spring protests, embattled dictators have repeated the tactic in Syria, Myanmar, Uganda, Eswatini, and most recently, Cuba. Full shutdowns, however, represent a worst-case scenario for any regime: In addition to disrupting protesters, they also disrupt the economy and make it harder for the government itself to operate. They are a censorship method of last resort.

The fact that dictators still find themselves downing the entire national internet a decade after the Arab Spring shows just how much they’ve struggled to censor the web in more targeted ways, according to Doug Madory, director of internet analysis at the network observation company Kentik. “People are so wiley, and there are so many good tools to evade censorship now, that you’re back to square one,” he said. “The only option if you really want to shut off [specific websites or apps] is you’ve got to shut everything off.”

In moments of crisis, authoritarian regimes have had to admit that they can’t fully control the web. For that reason, the blackouts offer a source of optimism: They show how devilishly hard it still is for a dictator to censor the internet. People living under oppressive regimes have kept just ahead of censors, and a slew of free digital tools designed to evade firewalls will keep things difficult for dictators for the foreseeable future.

How dissidents evade web censorship

The single greatest tool for evading internet censorship is a virtual private network (VPN), which helps web users disguise where in the world they’re browsing the web and what content they’re accessing.

An authoritarian regime can block traffic to specific websites or apps easily enough. The Cuban government has spent the past several days cutting off all web traffic between the island and the servers that run encrypted messaging apps like Signal, Telegram, and WhatsApp.

But VPNs have allowed Cubans to access those apps indirectly: Instead of trying to connect with WhatsApp’s servers directly, a Cuban protester using a VPN could connect with a server somewhere in Norway, for example, which would then connect with WhatsApp’s server and act as a proxy, sending information back and forth between WhatsApp and the user.

Because there are so many VPNs, and because those VPNs use so many different proxy servers around the world to mask web traffic, it’s virtually impossible for any government to block every VPN all the time. Even in China, which has invested steeply in its online censorship operation, it’s still possible (although difficult) to use a VPN to evade the country’s Great Firewall.

“People are getting more savvy about how to evade these types of censorship,” said Madory. “Ten years ago it wasn’t that common that people would have a VPN on their phone, but in a lot of these places, like Iran, where people are used to a lot of internet censorship, it’s become quite normal. People know what VPNs are and they use them quite a bit.”

In response to censorship, Cuban web users have begun to spread the word about VPN smartphone apps like Psyphon, Proxy Master, and Ex-pressVPN.

A reposted message from an Instagram story urges Cubans to install VPN apps on their phones to access the internet.
“Cubans on the island: Use the VPN Proxy Master or Psyphon to access the internet!”

On June 11, as protests erupted across Cuba and videos and images of the demonstrations gushed onto social media platforms, the Cuban government faced the most visible challenge to its power in its 62-year history. The regime turned in desperation to the nuclear option: a full, national internet shutdown.

How Cuba turned off the internet

Shutting off the web is relatively simple in Cuba. There is only one undersea cable connecting the island to the rest of the web-browsing world, and all traffic that travels across that cable is controlled by the state-run telecom operator ETECSA. The government also owns all the ground stations capable of communicating with satellites that can beam internet down from space (which puts a damper on any plans for Elon Musk to fly a satellite over Cuba and deliver uncensored internet to all).

With that level of monolithic control over the infrastructure that runs the internet, Cuban authorities can simply cut power to the network, or write a few lines of code that instruct it not to let any traffic in or out. They blocked all internet traffic for the country for about half an hour on June 11, and have since appeared to block the web in certain restive areas, in addition to throttling the speed of web traffic and attempting to block certain apps and sites.

But the Cuban regime, like many authoritarian regimes before it, seems to be finally coming to terms with the full threat of an internet-connected population that is learning to use the digital tools at its disposal to evade censorship. The government is now grasping for ways to control the network it hoped would help grow the Cuban economy without expanding opportunities for dissent.

Last month, Cuban journalist Yoani Sánchez quoted a telling line from a 2020 communist party summit in Havana, delivered in a keynote address by outgoing dictator Raúl Castro. “We have talked about the benefits and dangers of using the Internet and social networks for dozens of years,” Castro said. “There is no place for naivety at this stage or unbridled enthusiasm for new technologies, without first ensuring information technology security.”

Source of this news:

Related posts:

MacOS How to Hide Your IP Address - Alphr
Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way. Websites keep track of your IP address for various reasons, and in most cases, it’s n...
Bothersome new malware targets Microsoft-exchange servers - Texas Happenings Today
another Ransomware An operator medically known as LockFile encrypts a Room windows domain after breaking into the vulnerability Microsoft-exchange A server that uses the just recently publish...
Computer can't connect to remote computer [security package error] -
by Afam Onyimadu Author Afam is a geek and the go-to among his peers for computer solutions. He has a wealth of experience with Windows operating systems, dating back to his introduction...
Indien Tuweni 2 Adds JSON-RPC Support - iProgrammer
Apache Tuweni has been updated to fassung 2 . 0, with breakthroughs including JSON-RPC clients while servers, and a new filtration systems that application with a simple pants pocket. Apache Tuwen...
Email Ad Monetization Will Get Harder With iOS 15 - AdExchanger
"The Sell Sider" is a column written by the sell side of the digital media community. Today’s column is written by Chris Shuptrine, VP of marketing for Kevel. Email ad monetization will forever...
Why Dedicated Proxies Should Be On Your Proxy List - Shout Out UK
Dedicated proxies are private proxies assigned for exclusive use by one user or device at a time. All proxies serve the main purpose of hiding the identity of a user by masking his IP address. They a...
Fix Outlook crashes when creating a new profile - TheWindowsClub
Some Windows users that have Microsoft 365 or Microsoft Office installed on their Windows 11 or Windows 10 computer may encounter the issue whereby Outlook crashes when creating a new profile. If you...
Involving Announces General Availability of Fiddler Jam - EnterpriseTalk
Progress  (NASDAQ: PRGS), the leading provider of products to develop, deploy and have power over high-impact applications, today announced the overall availability of Progress® Telerik...
Ditto raises $9M to connect devices peer-to-peer - VentureBeat
Join gaming leaders, alongside GamesBeat and Facebook Gaming, for their 2nd Annual GamesBeat & Facebook Gaming Summit | GamesBeat: Into the Metaverse 2 this upcoming January 25-27, 2022. Learn mor...
Workplace 365 Spy Campaign Expectations US Military Defense - Threatpost
Any administrator of your personal figures will be Threatpost, Inc., 450 Unicorn Park, Woburn, MUM 01801. Detailed information on all the processing of personal data are also made of the privac...
2022 Top 50 Free Agents - FanGraphs
Welcome to perhaps the most uncertain edition of FanGraphs’ annual top-50 free-agent rankings. In past years, luminaries like Dave Cameron, Kiley McDaniel, and Craig Edwards have helmed this exercise...
Is there a difference between a web proxy and proxy server? guidebook AndroidGuys
If it turns out you‘re interested in boosting your digital security, you might want to try out one proxy. In general, these some other can keep your data safe from cyber attacks, enhance your p...
9 (More) Ways To Access Blocked Websites 2021 Tips - BollyInside
This blog is about the 9 (More) Ways To Access Blocked Websites. We will try our best so that you understand this guide . I hope you like this blog 9 (More) Ways To Access Blocked Websites. If your a...
Genetic variation for upper thermal tolerance diminishes within and between populations with increas...
Agrawal AF, Stinchcombe JR (2009) How much do genetic covariances alter the rate of adaptation? Proc Biol Sci 276:1183–1191PubMed  PubMed Central  Google Scholar  Aitken SN, Whitlock ...
Intercepting HTTP traffic with Burp Proxy - The Daily Swig
In this tutorial, you'll use a live, deliberately vulnerable website to learn how to intercept and modify HTTP requests with Burp Proxy. Intercepting a request Burp Proxy lets you intercept HTTP r...
Your Digital Identity's Evil Shadow - Dark Reading
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.When digital identity is mentioned, most pe...
HTTP request smuggling bug patched in mitmproxy - The Daily Swig
Bug exploited inconsistencies between intermediary and backend serversMitmproxy, an open source, interactive HTTPS proxy service, has patched a dangerous bug that potentially allowed attackers to st...
Why Should You Use Proxy Rotation Tools? - The Union Journal
Proxy Rotation ToolsWhile there are many possible solutions to hiding your identity online and browsing from a different IP, a proxy rotator might be the best one. A proxy rotator, or proxy rotation ...

IP Rotating Proxy Onsale


First month free with coupon code FREE30