Censored continent: understanding the use of tools during information controls in Africa: Nigeria, Cameroon, Uganda, and Zimbabwe as case studies.

Between 2019 and 2020, The Tor Project has had the opportunity to serve as the host organization of OTF Information Controls Fellow, Babatunde Okunoye. Today, we are sharing here the publication of his research report, titled "Censored continent: understanding the use of tools during Information controls in Africa: Nigeria, Cameroon, Uganda, and Zimbabwe as case studies."

As part of his fellowship, Babatunde examined the use of Internet censorship circumvention tools in Cameroon, Nigeria, Uganda, and Zimbabwe, four countries in Africa with varying degrees of Internet censorship, including Internet bandwidth throttling, social media app restrictions, and website blocks. Interviews were done with 33 people, including students, civil society members, people in business, and teachers, revealing how communities mobilized to defeat censorship.

Important findings include: 

  • Civil society played an important role in mobilizing people to use circumvention tools.
  • Some of the most important VPN adoption reasons were community recommendations, cost of use, and ease of use.
  • Messaging apps like Signal and Telegram, which were unknown to government censors and were not blocked, served as alternative messaging channels when more popular apps like Facebook and WhatsApp were blocked.
  • People used innovative means of sharing VPNs, such as through USBs and Bluetooth, when downloads were no longer possible from official sources such as websites of VPN makers and smartphone App stores.

Full-length report:
https://research.torproject.org/techreports/icfp-censored-continent-202…

Media impact:
https://www.cfr.org/blog/technologies-freedom-enabling-democracy-africa

His research in the field helped us to inform the user research work on improving Tor Browser as an essential circumvention tool.

If you have questions or comments regarding this study, you can reach out to Babatunde directly: to.csgroups[at]gmail.com.

Anonymous

September 21, 2020

Permalink

Fascinating. What about Kenya, CAR, DRC, etc?

https://en.wikipedia.org/wiki/Kenya
https://www.hrw.org/world-report/2020/country-chapters/kenya

(Many recent incidents of harrasment of dissidents, bloggers, and human rights groups by government officials).

https://en.wikipedia.org/wiki/Central_African_Republic
https://www.hrw.org/world-report/2020/country-chapters/central-african-…

(Political violence directed at disparaged subpopulations, human rights workers, etc.)

https://en.wikipedia.org/wiki/Democratic_Republic_of_the_Congo
https://www.hrw.org/news/2020/07/08/justice-risk-democratic-republic-co…

(Courts in danger of being "captured" by special interests, a familiar story, etc.)

Enabling women to access good information and protecting children from surveillance capitalism are two closely related issues of importance all over the world including Africa.

Also, it would be interesting to study how Tor promotes/retards the spread of QAnon and David Icke paranoid conspiracy theories, which are rapidly spreading all over the world--- particularly, it seems, among women (see previous sentence).

If corporate sponsors are so fab, why doesn't Google or a satellite communications startup help TP bring uncensorable internet to refugee camps? (Whatever happened to Google's widely publicized balloon project? It was supposed to help dissidents but seems to have morphed into yet another technical surveillance program in what the US DOJ calls "anarchist jurisdictions" such as Seattle.)

Harambee!

> People used innovative means of sharing VPNs, such as through USBs and Bluetooth, when downloads were no longer possible from official sources such as websites of VPN makers and smartphone App stores.

Perhaps there is a lesson there for TP itself: offer to communicate via OnionShare, not just (inherently insecure and non-anonymous) email?

Thank you, those are important research suggestions to explore!
Also I know Google and Facebook have some public Internet options in Africa. But of course more is needed!

Anonymous

September 22, 2020

Permalink

How can censorship now be avoided given the recent global drug busts and assertions by lea that the dark-web is now transparent?

I'm thinking that many tor users will now be seeking reassurance from y'all. Go for it!

Point-to-Point Physical "Tor Dark Web" is indeed transparent!

It should have been a warning with all the other busts. But with all the physical traffic low, it makes targeting drug mules a lot easier ect.....also not wanting to turn the whole population into drug addicts or drug dealers.

Tor is more or less about Free Speech and Privacy. Not to protect a Physical Drug cartels operations. It is good for LEO, due to the nature of them not having to worry about being targeted by NSA or FBI tools in their investigations. Unless of course the LEO is investigating Hillary Clinton or government abuse. They will get targeted.

Any other security level pretty much does not entail Tor. Although Edward Snowden promoted it with a Tor sticker on a laptop. I am pretty sure, he would be considered the .1% club. Entry at the door says "No one need apply" at the top of the club door.

> assertions by lea that the dark-web is now transparent?

> Point-to-Point Physical "Tor Dark Web" is indeed transparent!

Not aware of that, or even what it might mean. I have never heard the term "point-to-point" or "physical Tor dark web" before. I have heard the term "transparent" used to mean in the cybersecurity context to mean two completely opposite things ("transparent" in the sense of "invisible to the hapless user"--- e.g. Stingrays are "transparent" to phone users--- vs. "transparent" in the sense of "easy to understand/monitor"--- e.g. excessive "DHS secrecy is a good example of why US voters need much improved government transparency").

Can you give a link to an official statement by an LEA (e.g. FBI.gov) or a story at a reputable news site (e.g. TheIntercept.com?)

A certain lack of cohesive semantic content suggests a certain line of thought concerning how the comment to which I am replying came into existence. (Wired.com recently covered an example in which such suspicions expressed by wary readers turned out to be justified.)

Regardless, just in case anyone (perhaps someone in Africa) who is not yet a Tor user but who is considering using Tor is reading this, an important correction to some fake memes often encountered in various places on the Internet:

> Although Edward Snowden promoted it with a Tor sticker on a laptop. I am pretty sure, he would be considered the .1% club. Entry at the door says "No one need apply" at the top of the club door.

Edward Snowden was indeed an early adopter of Tails, the "amnesiac" out-of-the-box Linux system (see tails.boum.org), and he did indeed place a Tor sticker on his personal laptop, and in exile he has continued to recommend that political dissidents and potential leakers use Tails. Just before leaving the US he also helped organize a cryptoparty where experts taught ordinary citizens how to use GPG and such.

Tails depends upon Tor and Tor Browser, but incorporates many other privacy and cybersecurity protections. Tails is provided as an ISO image which anyone can download and burn on a "live" DVD--- and optionally can then make a live USB, which is more convenient to use on a daily basis. It is essential to use GPG to verify the detached signature of the ISO image before burning this to the live DVD (see tails.boum.org for instructions).

"Live" means that when you reboot your computer with the DVD or USB inserted, your computer will be running the Tails system, not the one installed on your hard drive. "Amnesiac" means that Tails will not leave any traces of your activities on your hard drive.

The Snowden leaks included briefings on several secret programs intended to break Tails; the NSA people concluded (in about 2010-2012) that Tails would be almost impossible to compromise if used according to the (excellent) documentation at tails.boum.org. That might have changed in the years since, but despite the FUD above, the most knowledgeable commentators seem to agree that NSA/FBI/etc still have great trouble breaking Tails itself.

The busts alluded to above appear to involve people doing dangerous things which did not involve Tails. It is true that FBI has been able to compromise certain onion sites (which use Tor in a crucial way), but these compromises appear to have happened by means not involving a direct attack on Tor software, but rather on something dangerous the administrators of the onions were doing in order to log into their own onion site. The onion sites featured in those widely publicized breaches were, as suggested above, alleged illegal drug sale sites. Most onion sites, however, are operated by reputable and badly needed news organizations such as The Intercept, the paper cofounded by Glenn Greenwald, who broke the Snowden leaks with Laura Poitras, Barton Gellman, and some colleagues from The Guardian, the paper he was then writing for. The Guardian also has an onion site.

Leak on, people! 8> 8> 8>

Anonymous

September 23, 2020

Permalink

Seems you guys forgot to include the Tor Blog itself in the case study.

Still waiting on that open forum.. how many months has it been?

Thank you. I am not sure what you meant, but if you meant that we did not include the Tor browser in our study, we certainly did. The study covered all tools people used to circumvent Internet censorship in the four African countries, so the Tor browser was included. There were a number of interviewees who reported using Tor.