The Cuban government briefly shut off the entire country’s internet on June 11 in an effort to disrupt historic nationwide protests that were being coordinated and live-streamed using the island’s nascent mobile data network.
Internet shutdowns are a well-worn tactic by authoritarian regimes over the past decade. After Egypt blocked the web during Arab Spring protests, embattled dictators have repeated the tactic in Syria, Myanmar, Uganda, Eswatini, and most recently, Cuba. Full shutdowns, however, represent a worst-case scenario for any regime: In addition to disrupting protesters, they also disrupt the economy and make it harder for the government itself to operate. They are a censorship method of last resort.
The fact that dictators still find themselves downing the entire national internet a decade after the Arab Spring shows just how much they’ve struggled to censor the web in more targeted ways, according to Doug Madory, director of internet analysis at the network observation company Kentik. “People are so wiley, and there are so many good tools to evade censorship now, that you’re back to square one,” he said. “The only option if you really want to shut off [specific websites or apps] is you’ve got to shut everything off.”
In moments of crisis, authoritarian regimes have had to admit that they can’t fully control the web. For that reason, the blackouts offer a source of optimism: They show how devilishly hard it still is for a dictator to censor the internet. People living under oppressive regimes have kept just ahead of censors, and a slew of free digital tools designed to evade firewalls will keep things difficult for dictators for the foreseeable future.
How dissidents evade web censorship
The single greatest tool for evading internet censorship is a virtual private network (VPN), which helps web users disguise where in the world they’re browsing the web and what content they’re accessing.
An authoritarian regime can block traffic to specific websites or apps easily enough. The Cuban government has spent the past several days cutting off all web traffic between the island and the servers that run encrypted messaging apps like Signal, Telegram, and WhatsApp.
But VPNs have allowed Cubans to access those apps indirectly: Instead of trying to connect with WhatsApp’s servers directly, a Cuban protester using a VPN could connect with a server somewhere in Norway, for example, which would then connect with WhatsApp’s server and act as a proxy, sending information back and forth between WhatsApp and the user.
Because there are so many VPNs, and because those VPNs use so many different proxy servers around the world to mask web traffic, it’s virtually impossible for any government to block every VPN all the time. Even in China, which has invested steeply in its online censorship operation, it’s still possible (although difficult) to use a VPN to evade the country’s Great Firewall.
“People are getting more savvy about how to evade these types of censorship,” said Madory. “Ten years ago it wasn’t that common that people would have a VPN on their phone, but in a lot of these places, like Iran, where people are used to a lot of internet censorship, it’s become quite normal. People know what VPNs are and they use them quite a bit.”
In response to censorship, Cuban web users have begun to spread the word about VPN smartphone apps like Psyphon, Proxy Master, and Ex-pressVPN.

On June 11, as protests erupted across Cuba and videos and images of the demonstrations gushed onto social media platforms, the Cuban government faced the most visible challenge to its power in its 62-year history. The regime turned in desperation to the nuclear option: a full, national internet shutdown.
How Cuba turned off the internet
Shutting off the web is relatively simple in Cuba. There is only one undersea cable connecting the island to the rest of the web-browsing world, and all traffic that travels across that cable is controlled by the state-run telecom operator ETECSA. The government also owns all the ground stations capable of communicating with satellites that can beam internet down from space (which puts a damper on any plans for Elon Musk to fly a satellite over Cuba and deliver uncensored internet to all).
With that level of monolithic control over the infrastructure that runs the internet, Cuban authorities can simply cut power to the network, or write a few lines of code that instruct it not to let any traffic in or out. They blocked all internet traffic for the country for about half an hour on June 11, and have since appeared to block the web in certain restive areas, in addition to throttling the speed of web traffic and attempting to block certain apps and sites.
But the Cuban regime, like many authoritarian regimes before it, seems to be finally coming to terms with the full threat of an internet-connected population that is learning to use the digital tools at its disposal to evade censorship. The government is now grasping for ways to control the network it hoped would help grow the Cuban economy without expanding opportunities for dissent.
Last month, Cuban journalist Yoani Sánchez quoted a telling line from a 2020 communist party summit in Havana, delivered in a keynote address by outgoing dictator Raúl Castro. “We have talked about the benefits and dangers of using the Internet and social networks for dozens of years,” Castro said. “There is no place for naivety at this stage or unbridled enthusiasm for new technologies, without first ensuring information technology security.”
Source of this news: https://qz.com/2033719/cubas-blackout-reveals-authoritarians-limited-control-of-the-web/
Related posts:
Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way. Websites keep track of your IP address for various reasons, and in most cases, it’s n...
another Ransomware An operator medically known as LockFile encrypts a Room windows domain after breaking into the vulnerability Microsoft-exchange A server that uses the just recently publish...
by Afam Onyimadu Author Afam is a geek and the go-to among his peers for computer solutions. He has a wealth of experience with Windows operating systems, dating back to his introduction...
Apache Tuweni has been updated to fassung 2 . 0, with breakthroughs including JSON-RPC clients while servers, and a new filtration systems that application with a simple pants pocket. Apache Tuwen...
"The Sell Sider" is a column written by the sell side of the digital media community. Today’s column is written by Chris Shuptrine, VP of marketing for Kevel. Email ad monetization will forever...
Dedicated proxies are private proxies assigned for exclusive use by one user or device at a time. All proxies serve the main purpose of hiding the identity of a user by masking his IP address. They a...
Some Windows users that have Microsoft 365 or Microsoft Office installed on their Windows 11 or Windows 10 computer may encounter the issue whereby Outlook crashes when creating a new profile. If you...
Progress (NASDAQ: PRGS), the leading provider of products to develop, deploy and have power over high-impact applications, today announced the overall availability of Progress® Telerik...
Join gaming leaders, alongside GamesBeat and Facebook Gaming, for their 2nd Annual GamesBeat & Facebook Gaming Summit | GamesBeat: Into the Metaverse 2 this upcoming January 25-27, 2022. Learn mor...
Any administrator of your personal figures will be Threatpost, Inc., 450 Unicorn Park, Woburn, MUM 01801. Detailed information on all the processing of personal data are also made of the privac...
Welcome to perhaps the most uncertain edition of FanGraphs’ annual top-50 free-agent rankings. In past years, luminaries like Dave Cameron, Kiley McDaniel, and Craig Edwards have helmed this exercise...
If it turns out you‘re interested in boosting your digital security, you might want to try out one proxy. In general, these some other can keep your data safe from cyber attacks, enhance your p...
This blog is about the 9 (More) Ways To Access Blocked Websites. We will try our best so that you understand this guide . I hope you like this blog 9 (More) Ways To Access Blocked Websites. If your a...
Agrawal AF, Stinchcombe JR (2009) How much do genetic covariances alter the rate of adaptation? Proc Biol Sci 276:1183–1191PubMed PubMed Central Google Scholar Aitken SN, Whitlock ...
In this tutorial, you'll use a live, deliberately vulnerable website to learn how to intercept and modify HTTP requests with Burp Proxy. Intercepting a request Burp Proxy lets you intercept HTTP r...
In the wrong hands, these shady shadows are stealthy means to bypass security systems by hiding behind a proxy with legitimate IP addresses and user agents.When digital identity is mentioned, most pe...
Bug exploited inconsistencies between intermediary and backend serversMitmproxy, an open source, interactive HTTPS proxy service, has patched a dangerous bug that potentially allowed attackers to st...
Proxy Rotation ToolsWhile there are many possible solutions to hiding your identity online and browsing from a different IP, a proxy rotator might be the best one. A proxy rotator, or proxy rotation ...