Call for papers: Free and Open Communications on the Internet (FOCI) Workshop

by arma | March 22, 2012

The 2nd USENIX Workshop on Free and Open Communications on the Internet (FOCI '12) seeks to bring together researchers and practitioners from technology, law, and policy who are working on means to study, detect, or circumvent practices that inhibit free and open communications on the Internet.

The Internet offers great promise for improving the communication capabilities of citizens, but our increasing dependence on networked communications also makes it easier for organizations to control, monitor, and block communications. ISPs and governments routinely restrict access to Internet content and services, either by censoring access to information or by degrading the performance of services or blocking them entirely. Similarly, ISPs can degrade network performance for certain sets of users for some or all services, for arbitrary purposes. ISPs have been found to block or throttle certain application traffic routinely. This growing trend toward blocking, tampering, or otherwise restricting communications on the Internet calls for improved techniques both for monitoring the state of restrictions on Internet content and communications, in order to inform users, and for circumventing attempts to censor, degrade, or otherwise tamper with Internet communications.

The broadening scope of attacks on Internet freedom is forcing more disciplines to address the issue. Last year's workshop brought together four research communities:

  • Those studying network neutrality and performance degradation
  • Those measuring content censorship and blocking of resources and services
  • Those designing and evaluating censorship circumvention tools
  • Those who work on the wider implications of censorship, bringing perspectives from the worlds of policy, law, ethics, and political and social sciences

This second workshop aims to repeat and promote this critical interdisciplinary approach.

Six-page short-paper submissions are due April 26 (edit: May 3), and the workshop is August 6 near Seattle. See the full Call for Papers for details.

Comments

Please note that the comment area below has been archived.

March 22, 2012

Permalink

I'm sorry, I don't know where else to report this. Tor has stopped working since the last day. I'm in china, Did anyone notice it? I have already tried obfsproxy which doesn't work either.
Here is the log

Mar 22 18:37:55.859 [Notice] Bootstrapped 10%: Finishing handshake with directory server.
Mar 22 18:37:56.468 [Warning] Problem bootstrapping. Stuck at 10%: Finishing handshake with directory server. (DONE; DONE; count 10; recommendation warn)
Mar 22 18:37:56.531 [Warning] 10 connections have failed:
Mar 22 18:37:56.531 [Warning] 10 connections died in state handshaking (TLS) with SSL state SSLv2/v3 read server hello A in HANDSHAKE

It's possible they've blocked the set of bridges hard-coded in the obfsproxy bundle. If so, you'll need to get new obfsproxy bridges that they haven't blocked yet.

April 23, 2012

Permalink

Ports 80 and 443 are unfortunately not 'very low risk'. People do all sorts of crazy stuff on the web, and other people are used to complaining about it.There’s no word to describe such a great masterpiece.640-816 You made such an interesting piece to read, giving every subject is enlightenment for us to gain knowledge and information without any arguments to deal with.

April 24, 2012

Permalink

I am not an Internet security expert, so this might be well known, but I think new data collection techniques by the NSA at the new Utah Data Center will enable the NSA to track traffic across anormal VPN server by correlating traffic into the server with traffic out of it. TOR might be better protected if traffic is high, but if the NSA can track traffic between each node, then it might be able to correlate activity from end user to target web site:

http://freetexthost.com/uwxkb25xty