Tor at the Heart: OONI Highlights from 2016

by agrabeli | December 22, 2016

During the month of December, we're highlighting other organizations and projects that rely on Tor, build on Tor, or are accomplishing their missions better because Tor exists. Check out our blog each day to learn about our fellow travelers. And please support the Tor Project! We're at the heart of Internet freedom.
Donate today!

In this post we provide some highlights from OONI, a project under The Tor Project.



The Open Observatory of Network Interference (OONI) is a free software project under The Tor Project that aims to uncover internet censorship around the world. Recently we published an overview of OONI which can be found here.

Today we are providing some OONI highlights from 2016. These include our research findings in collaboration with our partners, and the new features we have developed and released to meet our users’ needs.

Research findings

As part of the OONI Partnership Program we collaborate with various local and international non-profit organizations around the world on the study of internet censorship. Below we provide some highlights from our research findings this year.

Censorship during elections

  • Uganda: Facebook and Twitter blocked during 2016 general elections. In collaboration with DefendDefenders we examined the blocking of social media in Uganda during its 2016 general elections and when the country’s President was inaugurated. View our findings here.
  • Zambia: Internet censorship events during 2016 general elections. OONI monitored internet censorship events during Zambia’s 2016 general election period in collaboration with Strathmore University’s Centre for Intellectual Property and Information Technology Law (CIPIT). A full report of our study can be found here.
  • The Gambia: Internet shutdown during 2016 presidential election. We attempted to examine whether websites were blocked during the Gambia’s 2016 presidential election. Instead, we came across a country-wide internet blackout. View our findings here.
  • Venezuela: Blocking of sites during elections. IPYS conducted a study of internet censorship in Venezuela through the use of ooniprobe. Their full report can be found here.

Censorship during other political events

  • Ethiopia: Deep Packet Inspection (DPI) technology used to block media websites during major political protests. OONI joined forces with Amnesty International to examine internet censorship events during Ethiopia’s wave of protests. We not only detected DPI filtering technology, but we also found numerous sites - including news outlets, torproject.org, LGBTI and human rights sites - to be tampered with. Now Ethiopia is in a state of emergency. Our report can be found here.
  • Turkey: Internet access disruptions during attempted military coup. In collaboration with RIPE Atlas we examined the throttling of social media in Turkey during the attempted military coup in July. View the findings here.
  • Ethiopia: Internet shutdown amidst political protests. Ethiopia’s government pulled the plug on the internet in the middle of heavy protests in August. We examined the internet shutdown in collaboration with Strathmore University’s Centre for Intellectual Property and Information Technology Law (CIPIT) and published our findings here.

Tor blocking

  • Egypt: Tor interference. Our community informed us that certain services were inaccessible in Egypt. We investigated the issue and also found Tor to be tampered with. View our findings here.
  • Belarus: Tor block. An anonymous cypherpunk helped us collect evidence of Tor blocking in Belarus. View the data here.

WhatsApp blocking and DNS censorship

  • Brazil: Blocking of WhatsApp. Thanks to Coding Rights who ran our newly developed WhatsApp test, we were able to detect and collect evidence of the blocking of WhatsApp in Brazil earlier this year. View the data here.
  • Malaysia: DNS blocking of news outlets, medium.com, and sites expressing political criticism. Following the 1MDB scandal, various news outlets were reportedly blocked in Malaysia. OONI joined forces with Sinar Project to examine and collect evidence of internet censorship events in Malaysia. Our report can be found here.

New releases

If you’ve known OONI for a while, you might be more familiar with ooniprobe as a command line tool. To meet our users’ needs, we developed a variety of features this year, including the following:

  • OONI Explorer: A global map to explore and interact with all of the network measurements that OONI has collected from 2012 to date.
  • Measurement API: Explore and analyze OONI’s data via its new API.
  • OONI web UI: Run censorship tests from your web browser!
  • WhatsApp & Facebook Messenger tests: Examine the reachability of WhatsApp and Facebook Messenger with OONI’s new tests!
  • Web Connectivity test: Examine DNS, TCP/IP, HTTP blocking of sites all in one test!
  • Lepidopter: Run ooniprobe from a Raspberry Pi!
  • OONI mobile: We have developed the beta version of ooniprobe for Android and iOS. Look out for ooniprobe’s mobile app in early 2017!

Over the last year, many non-profit organizations around the world have started running ooniprobe daily. The graph below illustrates the expansion of ooniprobe’s global coverage thanks to our users.

By supporting Tor, you’re also supporting the OONI project. Help us continue to increase transparency around internet censorship by donating to The Tor Project.

Written by Maria Xynou, OONI’s Research and Partnerships Coordinator.

Comments

Please note that the comment area below has been archived.

December 22, 2016

Permalink

This may be not a proper place to complain, however:

I found that tor messenger keys are a mess. In total there are 3 keys:

  1. pub 4096R/6DA77FAA 2016-02-25 [expires: 2020-02-24]<br />
  2. Key fingerprint = E4AC D397 5427 A5BA 8450 A1BE B01C 8B00 6DA7 7FAA<br />
  3. uid Sukhbir Singh <<a href="mailto:azadi@riseup.net" rel="nofollow">azadi@riseup.net</a>><br />
  4. uid Sukhbir Singh <<a href="mailto:sukhbir@torproject.org" rel="nofollow">sukhbir@torproject.org</a>><br />
  5. sub 4096R/3D9F9289 2016-02-25 [expires: 2020-02-24]</p>
  6. <p>pub 4096R/B297B391 2014-06-16 [revoked: 2016-08-16]<br />
  7. Key fingerprint = 42D8 015E 3553 C7CF C580 629C 31D6 00E1 B297 B391<br />
  8. uid Sukhbir Singh <<a href="mailto:sukhbir.in@gmail.com" rel="nofollow">sukhbir.in@gmail.com</a>></p>
  9. <p>pub 4096R/B297B391 2011-06-06 [expired: 2016-06-04]<br />
  10. Key fingerprint = 3A0B 3D84 3708 9613 6B84 5E82 6887 935A B297 B391<br />
  11. uid Sukhbir Singh <<a href="mailto:sukhbir.in@gmail.com" rel="nofollow">sukhbir.in@gmail.com</a>><br />
  12. uid Sukhbir Singh <<a href="mailto:azadi@debian.org" rel="nofollow">azadi@debian.org</a>><br />
  13. uid Sukhbir Singh <<a href="mailto:azadi@riseup.net" rel="nofollow">azadi@riseup.net</a>><br />
  14. uid Sukhbir Singh <<a href="mailto:s3singh@uwaterloo.ca" rel="nofollow">s3singh@uwaterloo.ca</a>><br />
  15. uid Sukhbir Singh <<a href="mailto:sukhbir@torproject.org" rel="nofollow">sukhbir@torproject.org</a>><br />
  16. uid Sukhbir Singh <<a href="mailto:sukhbir.singh@uwaterloo.ca" rel="nofollow">sukhbir.singh@uwaterloo.ca</a>>

I think that one of the keys are fake. It's interesting that it has the same short keyid as another key (B297B391), which was old tor messenger key. It's also frustrating that Sukhbir didn't sign his new key by his old one. I failed to find any discussion in tor mailing list concerning key change or fake key. Roger signed previous key of Sukhbir, but not current one. Despite all current keys are listed in tor project site, I wonder why old expired/revoked valid PGP keys are not listed there too. From historical perspective it's good to know which key was in some time valid and used to sign code.

December 22, 2016

Permalink

Using OONI's map one can see that many exit relays happen in countries that did make censorship (France, Russia, ...) ... very depressing...

December 24, 2016

Permalink

What's exiting is that now we can know by ourselves what kind of censorship
is happening and when.