Thursday, May 31, 2018

Solar-powered calculator

File:Solar calculator casio fx115ES crop.jpg - Wikimedia Commons
src: upload.wikimedia.org

Solar-powered calculators are hand-held electronic calculators powered by solar cells mounted on the device. They were introduced at the end of the 1970s.

Amorphous silicon has been used as a photovoltaic solar cell material for devices which require very little power, such as pocket calculators, because their lower performance compared to conventional crystalline silicon solar cells is more than offset by their lower cost and simplified deposition onto a substrate. The first solar powered calculators available in the late 1970s included the Royal Solar 1, the Sharp EL-8026, and the Teal Photon.

Solar calculators use liquid crystal displays as they are power efficient and capable of operating in the low voltage range of 1.5-2 V. Some models also use a light pipe to converge light onto the solar cells. However, solar calculators may not work well in indoor conditions under ambient lighting if sufficient light is not available.

Anylite Technology is the name of a solar technology used by Texas Instruments since the 1980s in some calculators. They are intended to be able to function with less light than other solar calculators. This was essentially achieved by using relatively large photovoltaic solar cells. The use of Anylite technology in modern TI calculators is denoted by a lower case "a" at the end of the model number (e.g. TI-30a). In older models, such as the TI-36 Solar, Anylite Solar is printed on the calculator.

As of the 2010s, some very cheap calculators include a "dummy" solar panel, implying that they are solar-powered, when they are actually powered only by battery.


Video Solar-powered calculator



References


Source of article : Wikipedia

Smart glass

Glass Apps® | Smart Window Film Smart Glass Windows
src: www.glass-apps.com

Smart glass or switchable glass (also smart windows or switchable windows in those applications) is a glass or glazing whose light transmission properties are altered when voltage, light or heat is applied. Generally, the glass changes from translucent to transparent, changing from blocking some (or all) wavelengths of light to letting light pass through.

Smart glass technologies include electrochromic, photochromic, thermochromic, suspended-particle, micro-blind and polymer-dispersed liquid-crystal devices.

When installed in the envelope of buildings, smart glass creates climate adaptive building shells, with the ability to save costs for heating, air-conditioning and lighting and avoid the cost of installing and maintaining motorized light screens or blinds or curtains. Blackout smart glass blocks 99.4% of ultraviolet light, reducing fabric fading. For suspended particle device (SPD)-type smart glass, this is achieved in conjunction with low emissivity coatings.

Critical aspects of smart glass include material costs, installation costs, electricity costs and durability, as well as functional features such as the speed of control, possibilities for dimming, and the degree of transparency.


Video Smart glass



Electrically switchable smart glass

Suspended-particle devices

In suspended-particle devices (SPDs), a thin film laminate of rod-like nano-scale particles is suspended in a liquid and placed between two pieces of glass or plastic, or attached to one layer. When no voltage is applied, the suspended particles are randomly organized, thus blocking and absorbing light. When voltage is applied, the suspended particles align and let light pass. Varying the voltage of the film varies the orientation of the suspended particles, thereby regulating the tint of the glazing and the amount of light transmitted.

SPDs can be manually or automatically "tuned" to precisely control the amount of light, glare and heat passing through, reducing the need for air conditioning during the summer months and heating during winter. Smart glass can be controlled through a variety of mediums, such as automatic photosensors and motion detectors, smartphone applications, integration with intelligent building and vehicle systems, knobs or light switches.

Smart light-control technology increases users' control over their environment, provides for better user comfort and well-being and improves energy efficiency. The technology provides over 99% UV blockage and state switching in 1 to 3 seconds. In cars, the range of light transmission for the technology is 50-60 times darker than a typical sunroof to twice as clear as an ordinary sunroof. Published data by Mercedes-Benz shows that SPD technology can reduce cabin temperatures inside a vehicle by 18 °F (10 °C), leading to increased passenger comfort and decreased air conditioning loads. Other advantages include reduction of carbon emissions and the elimination of a need for expensive window dressings.

SPD-Smart Glass was patented by the public company Research Frontiers.

Automotive

Commercialization of SPD is accelerating in the automotive industry for reasons including safety, comfort, fuel economy, and design. SPD automotive side and rear windows and sunroofs offer many benefits to passengers in the vehicle. Because of their fast-switching and ability to be tuned, they reduce unwanted light and glare, which allows users to maintain their views of the outside while reducing glare on displays and video screens, or tint the windows for additional privacy. SPD automotive glass also minimizes heat build-up inside the vehicle because of their ability to block solar heat gain. Many SPD window systems automatically switch to their maximum heat-blocking state when the vehicle is not in use.

Aircraft

As of 2016 around thirty aircraft models had SPD windows.

Marine

Adaptability and control are especially important in the marine environment. SPD lets the user instantly and precisely control the amount of light, glare and heat passing through windows, skylights, portholes, partitions and doors.

Architectural

Architectural SPD products - windows, skylights, doors and partitions - are available as laminated panels or insulated glass units for new construction, replacement and retrofit projects. These products offer a distinctive blend of energy efficiency, user comfort and security. Architectural products made with SPD technology:

  • Eliminate blinds and shades
  • Preserve daytime and nighttime views
  • Allow people to enjoy shading on-demand
  • Minimize glare
  • Reduce heating and cooling requirements
  • Maximize daylighting
  • Protect interior furnishings and artwork from fading

Electrochromic devices

Electrochromic devices change light transmission properties in response to voltage and thus allow control over the amount of light and heat passing through. In electrochromic windows, the electrochromic material changes its opacity: it changes between a transparent and a tinted state. A burst of electricity is required for changing its opacity, but once the change has been effected, no electricity is needed for maintaining the particular shade which has been reached.

First generation electrochromic technologies tend to have a yellow cast in their clear states and blue hues in their tinted states. Darkening occurs from the edges, moving inward, and is a slow process, ranging from many seconds to several minutes (20-30 minutes) depending on window size. Newer electrochromic technologies, also known as "smart-tinting glass," tackled the drawbacks of earlier versions by eliminating the yellow cast in the clear state and tinting to more neutral shades of gray, tinting evenly rather than from the outside in, and accelerating the tinting speeds to less than three minutes, regardless of the size of the glass. However, these newer electrochromic technologies have yet to pass ASTM-2141 for long term reliability and durability testing. This lack of third party independent ASTM certification is one of the limiting aspects of market acceptance in comparison to first generation electrochomric technologies that have successfully passed ASTM-2141 certification.

Electrochromic glass provides visibility even in the darkened state and thus preserves visible contact with the outside environment. It has been used in small-scale applications such as rearview mirrors. Electrochromic technology also finds use in indoor applications, for example, for protection of objects under the glass of museum display cases and picture frame glass from the damaging effects of the UV and visible wavelengths of artificial light. Electrochromic glass can be programmed to automatically tint according to the weather or the sun's position or user preferences. It can also be controlled via mobile applications and even via popular voice assistants.

Recent advances in electrochromic materials pertaining to transition-metal hydride electrochromics have led to the development of reflective hydrides, which become reflective rather than absorbing, and thus switch states between transparent and mirror-like.

Recent advancements in modified porous nano-crystalline films have enabled the creation of electrochromic display. The single substrate display structure consists of several stacked porous layers printed on top of each other on a substrate modified with a transparent conductor (such as ITO or PEDOT:PSS). Each printed layer has a specific set of functions. A working electrode consists of a positive porous semiconductor (say Titanium Dioxide, TiO
2
) with adsorbed chromogens (different chromogens for different colors). These chromogens change color by reduction or oxidation. A passivator is used as the negative of the image to improve electrical performance. The insulator layer serves the purpose of increasing the contrast ratio and separating the working electrode electrically from the counter electrode. The counter electrode provides a high capacitance to counterbalances the charge inserted/extracted on the SEG electrode (and maintain overall device charge neutrality). Carbon is an example of charge reservoir film. A conducting carbon layer is typically used as the conductive back contact for the counter electrode. In the last printing step, the porous monolith structure is overprinted with a liquid or polymer-gel electrolyte, dried, and then may be incorporated into various encapsulation or enclosures, depending on the application requirements. Displays are very thin, typically 30 micrometer, or about 1/3 of a human hair. The device can be switched on by applying an electrical potential to the transparent conducting substrate relative to the conductive carbon layer. This causes a reduction of viologen molecules (coloration) to occur inside the working electrode. By reversing the applied potential or providing a discharge path, the device bleaches. A unique feature of the electrochromic monolith is the relatively low voltage (around 1 Volt) needed to color or bleach the viologens. This can be explained by the small over- potentials needed to drive the electrochemical reduction of the surface adsorbed viologens/chromogens.

Polymer-dispersed liquid-crystal devices

In polymer-dispersed liquid-crystal devices (PDLCs), liquid crystals are dissolved or dispersed into a liquid polymer followed by solidification or curing of the polymer. During the change of the polymer from a liquid to solid, the liquid crystals become incompatible with the solid polymer and form droplets throughout the solid polymer. The curing conditions affect the size of the droplets that in turn affect the final operating properties of the "smart window". Typically, the liquid mix of polymer and liquid crystals is placed between two layers of glass or plastic that include a thin layer of a transparent, conductive material followed by curing of the polymer, thereby forming the basic sandwich structure of the smart window. This structure is in effect a capacitor.

Electrodes from a power supply are attached to the transparent electrodes. With no applied voltage, the liquid crystals are randomly arranged in the droplets, resulting in scattering of light as it passes through the smart window assembly. This results in the translucent, "milky white" appearance. When a voltage is applied to the electrodes, the electric field formed between the two transparent electrodes on the glass causes the liquid crystals to align, allowing light to pass through the droplets with very little scattering and resulting in a transparent state. The degree of transparency can be controlled by the applied voltage. This is possible because at lower voltages, only a few of the liquid crystals align completely in the electric field, so only a small portion of the light passes through while most of the light is scattered. As the voltage is increased, fewer liquid crystals remain out of alignment, resulting in less light being scattered. It is also possible to control the amount of light and heat passing through, when tints and special inner layers are used. It is also possible to create fire-rated and anti X-Ray versions for use in special applications. Most of the devices offered today operate in on or off states only, even though the technology to provide for variable levels of transparency is easily applied. This technology has been used in interior and exterior settings for privacy control (for example conference rooms, intensive-care areas, bathroom/shower doors) and as a temporary projection screen. It is commercially available in rolls as adhesive-backed smart film that can be applied to existing windows and trimmed to size in the field.

Micro-blinds

Micro-blinds--currently under development at the National Research Council (Canada)--control the amount of light passing through in response to applied voltage. Micro-blinds are composed of rolled thin metal blinds on glass. They are very small and thus practically invisible to the eye. The metal layer is deposited by magnetron sputtering and patterned by laser or lithography process. The glass substrate includes a thin layer of a transparent conductive oxide (TCO) layer. A thin insulator is deposited between the rolled metal layer and the TCO layer for electrical disconnection. With no applied voltage, the micro-blinds are rolled and let light pass through. When there is a potential difference between the rolled metal layer and the transparent conductive layer, the electric field formed between the two electrodes causes the rolled micro-blinds to stretch out and thus block light. The micro-blinds have several advantages, including switching speed (milliseconds), UV durability, customized appearance and transmission. Theoretically, the blinds are simple and cost-effective to fabricate. A video available on YouTube describes briefly the micro-blinds.

Nanocrystal

A thin coating of nanocrystals embedded in glass can provide selective control over both visible light and heat-producing near-infrared (NIR) light independently climates. The technology employs a small jolt of electricity to switch the material between NIR-transmitting and NIR-blocking states. Nanocrystals of indium tin oxide embedded in a glassy matrix of niobium oxide form a composite material. The voltage ranges over 2.5 volts. The same window can also be switched to a dark mode, blocking both light and heat, or to a bright, fully transparent mode. The effect relies on a synergistic interaction in the region where glassy matrix meets nanocrystal that increases the electrochromic effect. The atoms connect across the nanocrystal-glass interface, causing a structural rearrangement in the glass matrix. The interaction creates space inside the glass, allowing charge to move more readily.


Maps Smart glass



Non-electrical smart glass

Mechanical smart windows

Vistamatic

A lower cost alternative to smart glass is Vistamatic Vision Panels, a privacy glass made up of three sheets of glass sealed as a single panel with evenly spaced, alternating lines to allow privacy or observation. Customized to the needs of the facility, these non-electric privacy glass panels are manually operated while still providing a frosted look similar to its electric counterpart.

Sunvalve

A low cost alternative to high-tech intelligent windows is composed of two retroreflective panels mounted back-to-back with a narrow gap in between. When a liquid with the same refractive index as that of the panels is pumped into the cavity between them, the glass becomes transparent. When the liquid is pumped out, the glass turns retro reflective again. An example of this kind of window is the Norwegian brand Sunvalve.

This was invented by a professor at the University of Delaware, see US patent 8635817.

Smartershade

Another low-cost alternative to electronic smart glass is Smartershade. This glass consists of two panes of polarized glass with a patterned optical axis that allows it to transition smoothly between shades of gray to near complete blackout opacity. The advantage is a much higher light extinction (blackout) than EC or SPD glass at a much lower cost. The drawbacks are that it requires two panes, one of which must be able to move, and that at its most transparent it admits only 50% of incident light. This glass can also be produced as a clear to mirror, or smartmirror.


Amazon.com: Vuzix M100 Smart Glasses (Grey): Cell Phones & Accessories
src: images-na.ssl-images-amazon.com


Related areas of technology

The expression smart glass can be interpreted in a wider sense to include also glazings that change light transmission properties in response to an environmental signal such as light or temperature.

  • Different types of glazing can show a variety of chromic phenomena, that is, based on photochemical effects the glazing changes its light transmission properties in response to an environmental signal such as light (photochromism), temperature (thermochromism), or voltage (electrochromism).
  • Liquid crystals, when they are in a thermotropic state, can change light transmission properties in response to temperature.
  • Recent advances in electrochromic materials have led to the discovery that transition metal hydride electrochromics create a reflective face instead of an absorbent face. These materials have the same idea, but go about the problem in a different way by switching between a transparent state when they are off to a reflective state when a voltage is applied. Switchable mirrors were originally developed by Ronald Griessen at the Vrije Universiteit in Amsterdam. They used rare earth metals and created the first metal-hydride switchable mirrors. Low emittance coatings reject unwanted thermal heat due to solar infrared. These mirrors have become common place in cars' rearview mirrors in order to block the glare of following vehicles. An optically absorbing electrochromic color reduces the reflection intensity. These mirrors must be fully transformed to a reflective state as muted reflection must persist in the darkened state. Originally a metal, they are converted into a transparent hydride by injecting hydrogen in a gas or liquid phase. It then switches to a reflective state.
  • Various metals have been investigated. Thin Mg-Ni films have low visible transmittance and are reflective. When they are exposed to H2 gas or reduced by an alkaline electrolyte, they become transparent. This transition is attributed to the formation of magnesium nickel hydride, Mg2NiH4. Films were created by cosputtering from separate targets of Ni and Mg to facilitate variations in composition. Single-target d.c. magnetron sputtering could be used eventually which would be relatively simple compared to deposition of electrochromic oxides, making them more affordable. Lawrence Berkeley National Laboratory determined that new transition metals were cheaper and less reactive, but contained the same qualities, thus further reducing the cost.
  • Tungsten-doped Vanadium dioxide VO2 coating reflects infrared light when the temperature rises over 29 degrees Celsius, to block out sunlight transmission through windows at high ambient temperatures.

These types of glazings cannot be controlled manually. In contrast, all electrically switched smart windows can be made to automatically adapt their light transmission properties in response to temperature or brightness by integration with a thermometer or photosensor, respectively.

The topic of smart windows in a further sense includes LED-embedded films which may be switched on at reduced light intensity. The process of laminating these LED-embedded films between glass will allow the production of transparent LED-embedded glasses. As most glass companies are not skilled in mounting LEDs onto metallized glass, the LEDs are located on a separate transparent conductive polymeric interlayer that may be laminated by any glass lamination unit.

Production technologies

Smart glass is produced by means of lamination of two or more glass or polycarbonate sheets.


RavenWindow | Smart Glass Windows | Smart Windows From RavenWindow
src: www.ravenwindow.com


Examples of use

Smart glass using one of the aforementioned technologies has been seen in a number of high-profile applications. Large-scale installations were completed at the Guinness Storehouse in Dublin, where over 800,000 people per year can see smart glass being used in interactive displays and privacy windows. Smart glass was used to launch the Nissan Micra CC in London using a four-sided glass box made up of 150 switchable glass panels which switched in sequence to create a striking outdoor display. The main use for smart glass is in internal partitions and walls, adding a level of privacy and multifunctional spacing for companies to enjoy the ability to switch screens and doors from clear to private.

Smart glass has found uses in the healthcare industry, where easily cleaned surfaces are essential and there are considerations of patient privacy. Smart glass products can replace traditional blind systems that are difficult to clean and can harbor dirt and bugs. Research has shown that patient comfort can help reduce recovery time.

One of the most popular smart glass applications is as projection screens.

Another example of use is the installation of PDLC-based smart glass, in The EDGE, a glass cube which protrudes out from the 88th-floor skydeck of the world's highest residential tower, Eureka Towers, located in Melbourne. The cube can hold 13 people. When it extends out of the building by 3 metres, the glass is made transparent, giving the cube's occupants views of Melbourne from a height of 275 metres. The same type of smart glass has also been proposed for use in hospital settings to controllably provide patients with privacy as needed.

PDLC technology was used in a display to unveil the Nissan GTR at the Canadian International Auto Show in Toronto.

Electro-chromatic glass was used on the 1988 Cadillac Voyage concepts body which adjusted the sun load on the car and can darken it.

In the media, the updated set for the Seven Network's Sunrise program features a Smart Glass background that uses liquid crystal switchable glass. The new set with Smart Glass allows the street scene to be visible at times, or replaced with either opaque or transparent blue colouring, masking the view.

Bloomberg Television currently features smart glass backgrounds in its studios in New York, Hong Kong and London.

The Boeing 787 Dreamliner features electrochromic windows which replace the pull down window shades on existing aircraft. NASA is looking into using electrochromics to manage the thermal environment experienced by the newly developed Orion and Altair space vehicles.

Smart glass has been used in some small-production cars. The Ferrari 575 M Superamerica had an electrochromic roof as standard, and the Maybach has a PDLC roof as option. Some Privacy Glass has been applied in the Maybach 62 car for privacy protection purposes.

A Hong Kong office uses 130 square meters of Privacy Glass, which is available in sizes up to 1,500 × 3,200 mm.

ICE 3 high speed trains use electrochromatic glass panels between the passenger compartment and the driver's cabin.

The elevators in the Washington Monument use smart glass in order for passengers to view the commemorative stones inside the monument.

The city's restroom in Amsterdam's Museumplein square features smart glass for ease of determining the occupancy status of an empty stall when the door is shut, and then for privacy when occupied.

Bombardier Transportation has intelligent on-blur windows in the Bombardier Innovia APM 100 operating on Singapore's Bukit Panjang LRT Line, to prevent passengers from peering into apartments as the trains pass by and is planning to offer windows using smart glass technology in its Flexity 2 light rail vehicles.


Glass Apps® | Smart Window Film Smart Glass Windows
src: www.glass-apps.com


In popular culture

  • The 1982 film Blade Runner contains an early depiction of smart glass in a scene in which a room is darkened with a smart glass-like shade so Rick Deckard, played by Harrison Ford, can administer a polygraph-style test to determine whether Rachael, portrayed by Sean Young, is an organic robot known as a replicant.
  • The 1993 film Philadelphia features a scene in which a large conference room in the middle of the law firm has walls of glass on three sides. Jason Robards says, "Bill, will you get the windows?", and a switch is thrown, and all the windows immediately become translucent, so that no one can see them firing Tom Hanks' character.
  • Smart glass is seen in the 2002 motion picture The Sum of All Fears, in which Jack Ryan, played by Ben Affleck, is ushered into a secret room in the Pentagon, the windows of which whiten over as the door is shut.
  • Smart glass can be seen in the third season of the television series 24, where Jack Bauer changed the visibility to frosted glass to conceal the view as he was injecting heroin.
  • Smart glass is mentioned in season three, episode five of CSI: Miami, entitled "Legal", in which a young lady working undercover to expose underage drinking is murdered in a room shielded by what Ryan Wolfe refers to as "intelligent glass", where closing the door completes an electrical circuit, making the glass frost over and become opaque. The episode first aired in 2004.
  • Smart glass is seen in the television series Lie to Me with the interrogation/interview room at the Lightman Group offices consisting of what amounts to a room-sized box within a larger room, with smart glass walls. The walls appear to be white and opaque most of the time, but can be rendered clear to reveal those observing a subject from the outside.
  • Smart glass was featured in 2005 video game Tom Clancy's Splinter Cell: Chaos Theory in a fifth mission, "Displace International", enabling the main character to quickly switch between on and off modes with his OCP pistol attachment.
  • Smart glass is seen in use in White Collar season 1 episode 8 "Hard Sell" when Neal comes to tell Daniel Reed that Avery plans to betray him. Daniel flips a switch and his office window becomes frosted over, preventing Avery from peeking inside while they talk.
  • Smart glass was featured in the 2012 James Bond movie Skyfall, revealing Raoul Silva to M after he is captured.
  • Smart glass was used in the bathroom in The Real World: Austin.
  • Dimmable smart glass was featured in the 2014 film, Captain America: The Winter Soldier, in the S.H.I.E.L.D. office in Washington, D.C.
  • Smart glass was featured in the 2014 animated feature Big Hero 6, used by Tadashi Hamada for his office.
  • In the fifth season of Angel, smart glass lines the interior wall of Angel's office, and can be frosted over at the flick of a switch under Angel's desk. (The fictional vampire-safe "necro-tempered glass" lines the outer walls of the building.)
  • Electrochromic glass can be seen in wide use at 2016 video game Deus Ex: Mankind Divided. EC glass is frequently used for blocking/unblocking vision between rooms and surrounding environment.

SFI Privacy Glass Project Installations - YouTube
src: i.ytimg.com


See also

  • Anti-flash white
  • Flash blindness
  • Heatable glass
  • SAGE Electrochromics
  • Smart film
  • View, Inc.

3d smart glass | IT Eco Map & News Navigator
src: itersnews.com


References


Microsoft unveils Xbox SmartGlass - Video - CNET
src: cnet3.cbsistatic.com


Further reading

  • Granqvist, Claes-Göran (2002) [1995]. Handbook of Inorganic Electrochromic Materials. Amsterdam: Elsevier. ISBN 9780444541635. OCLC 754957758. 

Samsung filing hints that smart glasses might still be coming ...
src: cdn.vox-cdn.com


External links

  • Chromogenics, in: Windows and Daylighting at Lawrence Berkeley National Laboratory
  • Smart glass blocks infrared when heat is on, NewScientist.com news service
  • Switchable Glass: A possible medium for Evolvable Hardware, NASA conference on Adaptive Hardware Systems, IEEE CS Press, pp 81-87, 2006.
  • Switchable Glazing Windows Change the light transmittance, transparency, or shading of windows at toolbase.org
  • Video of electrochromic smart glass changing from translucent to transparent at YouTube
  • Overview of the types of Smart Glass technologies including Electrochromic vs. PDLC Smart Glass at SlideShare
  • Manufacturing Technology for Smart Glasses

Source of article : Wikipedia

Magnetic base

ACQUIP Magnetic Base MAGIE: Laser Tracker Accessory for Curved ...
src: i.ytimg.com

A magnetic base is a magnetic fixture based on a magnet that can effectively be turned "on" and "off" at will; they are often used in optics and metalworking, e.g., to hold a dial indicator.

The vertical post, side arm (as shown in the image at right) and the dial indicator (not shown) are connected by two swivelling connectors. These connectors allow free movement of the arms so that the indicator can be presented to the work in a suitable orientation. The magnetic base may have a "V" cut into the bottom of the base or the back. This "V" allows the base to be attached to a round bar such as the column of a drill press.

The base is made from two blocks of iron, with a round cavity bored through the centre. The halves are joined together with a non-ferrous material such as brass or aluminium. A round permanent magnet is inserted into the bored hole and a handle is attached to allow easy rotation of the magnet. This act of rotation changes the position of the magnetic field.

In the off position, the poles are oriented towards the non-ferrous core. The iron blocks act as keepers by bridging between both poles.
In the on position, the poles are each in one iron half, which then acts as an extension. The field is effectively passing across an air gap (at the base and top). If this gap is bridged with another piece of iron (or steel in our case) it becomes part of the magnetic field's circuit and will be attracted with the full strength of the magnet.

A magnetic base can therefore be attached in a variety of positions to any attractive surface, allowing the base to be positioned in the best orientation for the part to be tested. Combine this with the flexibility of movement allowed by the arms gives the operator a large range of options in positioning the dial indicator.

An alternative to the post and swiveling connectors is an arrangement whereby a series of interconnecting swivels can be set in position by tightening or loosening a central member. This member may be made from wire rope as it has to be extremely flexible yet strong in tension, the possibilities for positioning this type is probably no more than the two post type but its advantage lies in the fact that there is only one mechanism (screw) to loosen or tighten the arrangement making it easier to use, unlike the other where a third hand is often wished for.

Source of article : Wikipedia

Æternity

Noodler's Q'E-ternity | An Inkophile's Blog
src: farm9.staticflickr.com

æternity is a public, open-source, blockchain-based distributed computing and digital-asset platform that builds upon decentralized cryptographic P2P technology. Real-world data can interface with smart contracts through decentralized "oracles". Scalability and trustless Turing-complete state channels set æternity apart from other Blockchain 2.0 projects.

æternity provides a virtual machine which can execute scripts using an decentralized global network of public nodes maintaining the blockchain. State channels enable smart contracts to remain private and scalable as long as there is no disagreement between the counterparties. Inherently integrated in æternity is a value token called an "æon" or "AE token", which can be transferred between participants and is used to compensate participant nodes for computations performed. AE tokens are used to pay for space and computation time on the virtual machine and prevent spam on the network while allocating storage and computation time proportionally to the incentive offered by the request.


Video Æternity



Purpose

æternity's blockchain is governed via a hybrid Proof-of-Work and Proof of Stake consensus mechanism. Tokens can be transferred between parties of a smart contract through channels without storing the code of the contract on-chain. The public blockchain resolves dispute inside state channels, acting like a crypto-court.

æternity can program complex relationships for large numbers of users and handle high volumes of products and information in parallel. Only the parties who participate in a state channel smart contract know of its contents. When a channel is settled on-chain, it only changes the blockchain state by changing account balances. No contract state is stored on-chain, so all channels are independent from each other. Transaction speed is limited only by bandwidth, so the æternity system can scale as well as or even better than known centralized solutions available today.

Large throughput and relative privacy enables the use of æternity by enterprises, and it can be the main vector of micro-transactions needed for all internet-of-things use cases. In the same time this will make smart contracts easier to analyze and faster to process, with no substantial loss in functionality.

æternity held a first contribution campaign round in which the team collected 121,212 Ethers and 324 Bitcoins, the rough equivalent of 5,400,000 USD at the time, in exchange for AE tokens. A second round was scheduled for 29 May 2017, in which the team's ambition was to raise a maximum capped amount of 21,000,000 CHF (21,500,000 USD) via BTC and ETH.

A launch of the æternity main-net is scheduled for Q2 2018.


Maps Æternity



Innovation

æternity is a new blockchain technology with features including:

  • Industrial-grade code base. æternity core is written in Erlang, which is a highly scalable, fault-tolerant language for writing distributed systems allowing to achieve superior operational stability and performance.
  • Smart contracts allow decentralized highly available, non-stop applications.
  • State channels enable highly scalable, trustless transactions of value and purely functional, easily verifiable Turing-complete smart contracts.
  • Integrated Naming Systems, which are both decentralized and secure, while still supporting human-friendly, memorable names.
  • Oracles, which are a crucial feature for most contracts, are the ability to refer to values from real-world data.
  • Identity Accounts, which allow for one to create and own identity on the æternity network to use on the web, in real-life, or voting systems.
  • the "Cuckoo Cycle" mining algorithm, which is a memory-hard mining algorithm that improves the ASIC problem. It provides great decentralization potential. Mining can be done even through low-powered devices such as smart-phones.

BrewDog gives employees Paw-ternity leave for new dog families ...
src: www.taptrail.com


Technology

State channels

State channels are a new development of æternity's blockchain technology. They are based on the idea of payment channels. State channels come from the realization that, for most purposes, only the actors involved in a smart contract are required to know about it. Two or more actors lock a state and a contract on the blockchain and then perform signed transactions between themselves, off of the public network (or off-chain). The final state is then written to the blockchain. If the end result is disputed, the series of signed off-chain transactions can be uploaded to the blockchain for verification or dispute resolution.

The state channel design enables off-chain verification of data and smart contracts. This permits a high transactional throughput and parallel processing of smart contracts by allowing for their independence from the network. æternity's strengths lie in programming complex relationships for many users and the parallel handling of high volumes of products and information. State channels allow for increased privacy because parties participating in a smart contract know about the contents of that smart contract. When a channel is settled on-chain, the only information being put onto the Blockchain is the end result of the transactional value that was exchanged. No contract state is stored on-chain, so all channels are independent of each other. Transaction speed is limited only by bandwidth, so æternity's scalable smart contract systems improves upon all the centralized and de-centralized scaling solutions that are available today.

Decentralized Oracle

An oracle is a mechanism that tells the blockchain facts about the real-world we live in (e.g. the weather, the closing price of Apple shares on a particular date, sports events, or human deaths). æternity's oracle system uses the same governance mechanism as the æternity blockchain itself, it does not require a separate governance layer on top of the æternity main-net (as with Augur on top of Ethereum).

Typed oracles as primitives on the blockchain provide a well-defined way for smart contracts to interface with data from the outside world. Data-feeds from individuals or institutions can directly interface with the blockchain and provide data for smart contracts.

Prediction markets (as smart contracts) can be used to determine the likelihood of an oracle providing trustworthy information, or to bet on the event.


Maternity Leave vs ME-Ternity Leave: Its No Vacation - Daily Mom
src: dailymom.com


Mining and Governance

Proof-Of-Work Mining

The validation of blocks on the æternity blockchain is done by a Proof-of-Work consensus mechanism, leveraging the "Cuckoo Cycle" Algorithm. The "Cuckoo Cycle" PoW is more power efficient and indirectly useful, as it encourages the development of better dynamic RAM (DRAM) chips. Even low-power devices such as smartphones, tablets and laptops can efficiently mine new tokens. This achieves a decentralization and geographical distribution of the mining power, which is crucial for the decentralization of blockchains (as time-stamping service).

As such, æternity mining is designed to be more egalitarian and inclusive compared to crypto-currencies where mining is dominated by large mining pools which use application-specific integrated circuit ("ASIC") chips designed specifically to take advantage of a particular PoW algorithm. This wider distribution of the mining incentives contributes to even wider use and adoption of æternity.

Proof-Of-Stake Governance

Currently in public blockchains whenever a system upgrade needs to be done, a "hard" fork is required. This leads to heated discussions among value holders. Even simple changes, such as correcting set variables in the source code, obvious in the block size debate in Bitcoin, or the " DAO" issue in Ethereum, seem to be very hard to agree on in a system where not all the users' incentives are aligned with those of decision makers. This can cause deep schisms in the community, which can sometimes endanger the value and reliability of any Blockchain.

The decision-making process for a protocol upgrade or change is not yet well-defined, lacks transparency and uses legacy mediums, like forums, discussion websites or even requires sometimes physical meetups to reach consensus. It is neither decentralized nor done on the blockchain. æternity aims to improve this process and thus gain an important competitive advantage.

Any AE token user can participate in the governance on aeternity blockchain via (delegated) voting, weighted by the amount of tokens the account holds. This governance can be used to update variables of the blockchain (e.g. blocksize) and in extreme cases also to overwrite faulty state, e.g. because of a buggy smart contract or because of a corrupted oracle.

Via participating in prediction markets the users can additionally express their opinion on events (e.g. oracle results or hardfork) and create additional income. On-chain voting in combination with prediction markets could be the solution to public blockchain governance and allow for a novel way of organizing society and global economic interactions.


Noodler's Q'E-ternity | An Inkophile's Blog
src: i1.wp.com


Uses cases and possible applications

Prediction Markets

Prediction markets (oracles) are one of the most anticipated use cases for Blockchains. They can make possible the harnessing of the wisdom of the crowds in a decentralized and transparent manner.

Ethereum has Augur trying to build prediction markets on top of it, each with its different systems and currency. æternity integrates the oracle into the blockchain consensus.

Any user may create an oracle by posing a question or statement, staking coins and providing a binary or a scaled answering option. æ coins can be used to acquire stakes of those specific outcomes. The more sure a user is about the outcome, the more stakes he may acquire and hence more likely (he thinks) the outcome will be correct. Applying the wisdom of the crowd to all participating users of the prediction market, it is possible to:

  1. statistically predict the probability of a future event occurring
  2. verify historic data from legacy systems or other blockchain
  3. verify API data from legacy systems or other blockchains

meaning any data outside of the blockchain can be translated into a deterministic value that can be used in æternity smart contracts, making data accessible and actionable. In æternity, this source of information comes from inside the blockchain, instead of an outside entity built on top of it. This makes the source of information more reliable, more decentralized, and not relying on a 3rd party company (including Augur).

Supply Chain Management

The supply chain management can be trusted to a smart contract that is constantly interfacing with the oracle on æternity. The demand for any product can be fed to the smart contract through the oracle. That will trigger the contract to send procurement orders to suppliers, and raw materials providers, taking into consideration the normal delays of each item in procurement. In the meantime, the smart contract's information being fed through the oracle can be regulated to increase or decrease the quantity of the orders in real-time, thus eliminating waste of overstocking of storage facilities.

High-level concept of supply chain management automation with Smart Contracts, Prediction Markets, and Oracles.

Digital insurance

In order for insurance on the blockchain to work, two features must be technologically achievable:

  1. Identity of the insured that can be attached to a unique address (in the case of the Bitcoin blockchain or human-readable digital identity), the private key of which is protected by password and/or 2FA solution. User reputation can be fully managed on the blockchain through digital identities (electronic signatures), and that's exactly what the "bookies" (insurers) need.
  2. Insurer/bookie setting the odds: a prediction market is a way of determining the odds of an event occurring and providing that information to users. Public blockchain solutions existing today do not offer integrated prediction markets. This service can only be provided by "attached" systems, which leads to increased complexity and inefficiencies, raising the cost of use. In the case of Ethereum, a prediction market service may be provided by Augur. For Bitcoin, Hive-Mind is considered the most promising project.

A prediction market is a market where users can bet on outcomes and set odds for markets that they create themselves.

In æternity, individuals may 'bet' on natural disaster, death, industry-killing technological innovations, crippling regulatory activities, pandemic, disruptive weather or any other events. The insurer or "bookie" is anyone willing to bet on the outcome of an event by setting the odds, and paying if they occur.

Then photographically-secured smart contracts eliminate any trust-related risk. If an event happens, as determined by the consensus of the oracle machine, execution is immediate and irreversible. There is no room for interpretation or selectivity in the enforcement of the insurance contract. The æternity blockchain incorporates all that is required for a scalable, secure, stable, open and efficient insurance platform.

Toll API

Today most websites' and servers' APIs are either publicly available to call or secured with a username-password-scheme or unique access tokens. The æternity payment channels allow for a third kind of API, where the requesting user has to pay a micro transaction for every call to the API, possibly every HTTP-request. Paying to access an API solves the DDoS attack problem, by providing a counter-incentive to sending large amounts of requests to overload servers. This makes it easier to build APIs that are always available for a small fee. API responses that require a payment are fundamental for the creation of as-of-yet impossible types of businesses and can play an important role in the emergence of the decentralized economy, the Internet-of-things and the Internet-of-value. Payment also creates strong incentives for information technology owners to make otherwise private data publicly available.

Insured crowdfunding

Crowdfunding can be made trustless and more transparent by using dominant assurance contracts. These are smart contracts that are used to raise money for a public good or other commercial project. Part of the funds can be locked for development and other parts of the fund are locked to provide an ROI for investors.

The release of funds can be set on several milestones. Once a milestone is cleared and approved, the contract will release the funds allocated to that specific milestone. Several methods can be used to verify the completion, including oracles. If an oracle concludes that the milestone is not reached, investors get their investments with interests back.

Dominant assurance contracts differ from traditional assurance contracts like Kickstarter, in that they make it a dominant strategy to participate. If the good is produced, all participants get their æons back plus interest, so they are insured against reducing their liquidity without receiving the good. Using an oracle, we can ensure that the provider of the good or service only gets paid if he or she provides the goods as promised. This enables a leap of transparency and trustless investment opportunities in ICOs and startups, where the investors' funds are safe from mismanagement or fraud by the project's founders. This can be implemented on any other exchange of services between multiple parties, thus decentralizing the freelancing and business-to-business sectors.

Cross-chain atomic swaps

æternity's blockchain architecture can enable cross-chain "atomic" swaps to allow for trustless exchange of æons for bitcoins or any other crypto-currencies. These can be implemented using a zero-knowledge-contingent payment hashlock that locks the transactions on both blockchains under the same value. This makes the cross-chain exchange of currencies decentralized, without having the single point of failure of the current exchanges.

Assets and portfolio replication

æternity's smart contracts can be used to program synthetic assets that stay at nearly the same price as a real-world asset does. For example, an asset can follow the price as gold. Synthetic derivatives are created created in equal and opposite pairs; for one user to have an asset that moves up with gold, a different user will have to have an asset that moves inversely to gold. This enables the "blockchainization" of all the real-world assets (or financial derivatives) and their exchange in a decentralized stock market. For example, Alice can make a contract with Bob so that Alice owns 1 gram of gold. Out of the money in the contract, 1 gram of gold's worth in æons will go to Alice, and the leftover money goes to Bob. The contract has an expiration date, at which point the price of gold will be remeasured and the funds are distributed to Alice and Bob accordingly.


Noodler's Q Eternity Fast Drying Review
src: officesupplygeek.com


References


Paw-ternity leave? Time off to care for pets gains traction
src: media1.s-nbcnews.com


External links

  • Official website

Source of article : Wikipedia

Stewart Iron Works

Stewart Iron Works - Blog: Kenyon College Chooses Stewart!
src: 2.bp.blogspot.com

Stewart Iron Works is an American ironworks plant in Erlanger, Kentucky. It is one of the city's oldest manufacturing firms and at its peak was the largest iron fence maker in the world. Stewart's is the second-oldest iron company in continuous operation in the United States. Based at 30 Kenton Lands Rd, its first location was at 8th & Madison in Covington, Kentucky. Owned by the Stewart Iron Works Co., Inc., it was established by the Scottish American Stewart family. The company was founded in 1862 and incorporated in 1910.

Manufacturing materials for prison construction, Stewart marketed to jails using salesmen who were all engineers. As an iron supplier to many major American institutions, Stewart's supplied gates and fences for the Panama Canal, the British Embassy in Washington, D.C., the Taft Museum, as well as the entrance gates to the White House, the Rutherford B. Hayes Presidential Center, and the U.S. House of Representatives, The steel cell blocks manufactured in the 1930s for Alcatraz Federal Penitentiary and Sing Sing were made by Stewart. At one time, the company supplied the majority of the U.S.'s cemetery fences and gates.


Video Stewart Iron Works



History

In 1862, Robert C. Stewart opened a shop in Covington which built iron fences; it was located on 8th Street near Madison. Two of his sons, Robert Jr. and Wallace began a similar business in Wichita, Kansas in 1886. They returned to Covington nine years later, and joined their father's business, along with a third brother. They opened a bridge works plant in Cincinnati, Ohio, and a related service, called Stewart Jail Works. Needing more space, the brothers built a new plant on 8 acres (3.2 ha) near Madison and 17th Streets in 1903. The firm had four buildings to house its five divisions, the jail cell division, a truck division, wrought iron furniture and fence division, and a chain-link fence division. A branch in Cincinnati operated during the period of 1903 through 1915. The company won the grand prize and gold medal in construction at the 1904 World's Fair in St. Louis, Missouri. By 1915, the company had 600 employees. Stewart began producing trucks in 1912, which placed the company in debt by the end of the 1920s. During World War I, it was an important supplier of trucks, at its peak producing 100 for the U.S. Army in 1918, but ceased truck manufacturing a decade later.

Prison contracts eased the financial burdens in the 1930s, and in 1936, brother Robert retired. Military contracts kept Stewart busy in the 1940s. Near bankruptcy by the mid-1950s, John Hunnicutt served as president. After retiring in 1964, Hunnicutt was replaced by Joseph Millburn. In the mid-1960s, Stewart was acquired by Pott Industries (St. Louis) and merged with Decatur Iron and Steel. After Millburn purchased Stewart's fence division from Pott Industries, he moved the company in 1983 to Erlanger, Kentucky. With the Erlanger plant reaching capacity by 1987, Millburn moved the operations to the Covington plant's 60,000 square feet (5,600 m2) building. Millburn's sons and Mark Rottinghaus owned Stewart Iron Works for over a decade. It is still in business today.


Maps Stewart Iron Works



Manufactured products

The Stewart Iron Fence Company's manufactured range of products, made to order on the basis of quotations submitted by the company, were: "Iron Fence and Entrance Gates, Iron Reservoir Vases, Iron and Wire setters, Stable fittings, Lamps, Grills, Office Partitions, Window Guards, general Ornamental Iron Works, Jail and Prison security Iron Works and Steel Grills". Quality of the products was ensured with the latest technological innovations in machinery and the specifications of the highest quality of materials used for manufacture of the products. Skilled workmen and quality control staff were maintained to ensure a quality product.

The steel components involved in the manufacture of fences were: Stand Posts at end of each line, base plates for the foundation, brazing for stability, adjustable central supports in each long panel and components for connectivity. A coat of Special Graphite Paint was mandatory; however, the color of paint could be changed to suit the client's choice. The fences could also be galvanized to special order. The adjustable features which provided the stability to the fence were a specialty of Stewart's. "Three Ribbed Steel Channel Fence Rail" was patented manufacture of Stewart's.

A recent manufacturing venture of the company is the Scioto Mile which was installed as a notable landmark in the river front of downtown Columbus, Ohio. The special feature of this project is the "blossom" fountain system which has 96 individual stainless tubes fitted over an oval shaped base plate. The tubes were fitted with nozzles to make up the fountains. The project as a whole was scheduled to mark the city's bicentennial celebration in 2012.


Two Metal Placards for the Stewart Iron Works, Wichita, Kansas
src: media.liveauctiongroup.net


References


LaGrange,Texas | Stewart Iron Works - Blog: Texas Quilt Museum ...
src: i.pinimg.com


External links

  • Official site
  • U.S. Motor Truck photograph

Source of article : Wikipedia

Internet censorship in Iran

All You Need to Know About Internet Censorship in Iran - TechRasa
src: techrasa.com

Internet censorship in Iran has been increasing. In the first few years of the 21st century, Iran experienced a great surge in Internet usage. As of 2013, Iran has 46 million Internet users with a penetration rate of 61.57%.

As of 2012, an average of 27% of internet sites were blocked at a given time and as of 2013 almost 50% of the top 500 visited websites worldwide were blocked, including YouTube, Facebook, Twitter, and Google Plus. The blocked sites have a wide range of topics including health, science, sports, news, and shopping.

At the beginning of March 2012, Iran began implementing an internal Intranet. This effort is partially in response to Western actions to exploit its Internet connectivity such as the Stuxnet cyberattack which have fueled suspicions of foreign technologies. The government's response has included requiring the use of Iranian email systems, blocking popular webmail services, inhibiting encryption use by disabling VPNs and HTTPS, and banning externally developed security software.


Video Internet censorship in Iran



History

When first introduced, the Internet services provided by the government within Iran were comparatively open. Many users saw the Internet as an easy way to get around Iran's strict press laws. Internet censorship increased with the administration of conservative president Mahmoud Ahmadinejad in 2005. Regime opponents in Iran are said to rely heavily on Web-based communication with the outside world.

Many bloggers, online activists, and technical staff have faced jail terms, harassment and abuse. In 2006 and again in 2010, the activist group Reporters Without Borders labeled Iran one of the 12 or 13 countries it designated "Enemies of the Internet". Reporters Without the Borders sent a letter to UN high Commissioner for human rights Navi Pillay to share its deep concern and ask for her intervention in the case of two netizens/free speech defenders, Vahid Asghari and Hossein Derakhshan. One of major accusation of Vahid Asghari was creating a national plan against censorship by the government.

In preparation for the March 2012 elections, the Iran government instituted strict rules on cybercafes and is preparing to launch a national Internet. It also requires all Iranians to register their web sites with the Ministry of art and culture.

At the beginning of March 2012, Ayatollah Ali Khamenei, Iran's Supreme Leader told Iranian authorities to set up a body to oversee the Internet. The body which is called The Supreme Council of Virtual Space will consist of the president, culture and information minister, the police and Revolutionary Guard chiefs. Their task will be to define policy and co-ordinate decisions regarding the Internet. This is thought to be the country's authorities strongest attempt at controlling the Internet so far.


Maps Internet censorship in Iran



Internet service providers

Every ISP must be approved by both the Telecommunication Company of Iran (TCI) and the Ministry of Culture and Islamic Guidance, and must implement content-control software for websites and e-mail. ISPs face heavy penalties if they do not comply with the government filter lists. At least twelve ISPs have been shut down for failing to install adequate filters. The state blacklist consists of about 15,000 websites forbidden by the Iranian government. Before subscribers can access Internet service providers, they must first promise in writing not to access "non-Islamic" sites. In 2008, Iran has blocked access to more than five million Internet sites, whose content is mostly perceived as immoral and anti-social.


File:Internet blocked in Iran.jpg - Wikimedia Commons
src: upload.wikimedia.org


Software

The primary engine of Iran's censorship is the content-control software SmartFilter, developed by San Jose firm Secure Computing. However, Secure denies ever having sold the software to Iran, and alleges that Iran is illegally using the software without a license.

As of 2006, Iran's SmartFilter is configured to filter local Persian-language sites, and block prominent English-language sites, such as the websites of the BBC and Facebook.

The software effectively blocks access to most pornographic sites, gay and lesbian sites, reformist political sites, news media, sites that provide tools to help users cloak their Internet identity, and other sites nebulously defined as immoral on various grounds. Iran has been accused by its critics of censoring more Internet sites than any other nation except China.

Iran has since developed its own hardware and software for filtering purposes. The architecture of the Iranian Internet is particularly conducive to widespread surveillance as all traffic from the dozens of ISPs serving households is routed through the state-controlled telecommunications infrastructure of the Telecommunication Company of Iran (TCI).

The Kurdish Wikipedia was blocked for several months in 2006, according to Reporters Without Borders.

In April 2016, Wired featured an article on Toosheh, a way to distribute files in an MPEG Transport Stream received from the satellite Yahsat.


CIGI on Twitter:
src: pbs.twimg.com


American proxy server

Iranians can sometimes access 'forbidden' sites through proxy servers, although these machines can be blocked as well. In 2003, the United States began providing a free proxy server to Iranian citizens through its IBB service Voice of America with Internet privacy company Anonymizer, Inc. The proxy website changes whenever the Iranian government blocks it.

However, even the U.S. proxy filters pornographic websites and keywords. "There's a limit to what taxpayers should pay for," an IBB program manager was quoted as saying. The forbidden keywords are controversial--banning "gay" effectively bars access to a host of gay and lesbian sites--and have had unintended consequences. The banning of "ass", for example, blocks access to the website of the United States Embassy. A complete list of the blacklisted keywords on the American server can be found here.

Following the 2009 Iranian presidential election, the U.S. Senate ratified a plan to help curb "censorship in the Islamic Republic". The legislation dubbed the Victims of Iranian Censorship (VOICE) Act was allocated $50 million to fund measures "to counter Iranian government efforts to jam radio, satellite, and Internet-based transmissions."


36 Out Of 65 Countries Show Decline in Internet Freedom: Worst In ...
src: images.dazeinfo.com


Deep packet inspection

The possibility that Nokia Siemens Systems sold, in 2008, TCI a deep packet inspection countrywide capacity for monitoring or even altering content of Internet voice and mail communication was raised in a Wall Street Journal report in June, 2009. The company has denied that what it sold to TCI had such capacity but only lawful intercept capacity relative to child pornography e.g.;

Andrew Lighten, a NSN employee, however, states that the company does not have products for Deep Packet Inspection, and only provided Iran lawful interception capability for 3G UMTS mobile networks, which he states, is a fundamental requirement of the UMTS network as defined by the ETSI standards.


Petition · Call on @Google to lift anti-censorship blocks on ...
src: assets.change.org


Internet connection speed restrictions

Iranian government uses speed throttling as a means of frustrating users and limiting communication. Significant speed drop of internet communications in the days following the 2009 Iranian presidential election, weeks leading to 2013 election, and during times of international political upheaval, including during the Arab Spring are examples of such behavior.

In October 2006, the Iranian government ordered all ISPs to limit their download speeds to 128kbit/s for all residential clients and Internet cafes. Although no reason for the decree was given, it is widely believed the move was designed to reduce the amount of western media (e.g. films and music) entering the country. There is also a newfound state awareness of how domestically produced content considered undesirable can pervade the Internet, highlighted by the 2006 controversy over the appearance of a celebrity sex tape featuring a popular Iranian soap opera actress (or a convincing look-alike). (See the Iranian sex tape scandal)

As of 2010, most major ISPs in Tehran offer 1 Mbit/s for 2,190,000 rials/month (around 60 dollars/month), 2Mbit/s for 3,950,000 rials/month (around 115 dollars/month) for unlimited data traffic. 1 Mbit/s with 2 GB traffic limitation costs 189,000 rials/month (around 9 dollars/month). Note these prices are just for Tehran. Prices are usually higher in other cities. Restriction for the residential client speed of 128kbit/s is still in place and the speeds mentioned above are just for offices and commercial firms.


Is Iran getting ready to relax its Internet censorship? | The ...
src: www.dailydot.com


Monitoring

According to the American newspaper Washington Times, Iran is using lawful intercept capabilities of telecommunications system to monitor communications by political dissidents on the Internet. A "monitoring center" installed by Nokia Siemens Networks (NSN) for Irantelecom intercepts Web-based communications and archives them for Iranian law enforcement officials. Lily Mazahery, a human rights and immigration lawyer who represents Iranian dissidents, reported that one of her clients was arrested because of instant messaging he had participated in with Ms. Mazahery,

He told me he had received a call from the Ministry of Intelligence, and this guy when he went to the interrogation, they put in front of him printed copies of his chats with me. He said he was dumbfounded, and he was sent to prison.

According to a newly passed legislation, Internet Service Providers (ISP) in Iran are required to store all the data sent or received by each of their clients. ISPs may delete the data no sooner than 3 months after the expiry of each client's contract.

Out of country protests following the 2009 elections resulted in Iran increasing their monitoring of online social networks, especially targeting Facebook. Upon re-entry to the country, citizens that have lived abroad have been questioned and detained due to the contents of their personal Facebook pages.


Communications in Iran - Wikipedia
src: upload.wikimedia.org


Post 2009-election developments

In April 2011, a senior official, Ali Agha-Mohammadi announced government plans to launch a "halal internet", which would conform to Islamic values and provide "appropriate" services. Creating such a network, similar to one used by North Korea, would prevent unwanted information from outside of Iran getting into the closed system. Myanmar and Cuba use similar systems.

As of early 2012, Iran's ministry of information and communication technology was reportedly testing a countrywide "national Internet" network it is planning to launch aimed at substituting services run through the World Wide Web. The government is also working on "software robots to analyse exchanging emails and chats", in order to find more "effective ways of controlling user's online activities." One Iranian IT expert source defended the program as aimed not "primarily" at curbing the global Internet, but at securing Iran's military, banking and sensitive data from outside cyber-attacks such as Stuxnet.

In addition, by late January 2012, Internet cafe owners are required to check the identity cards of their customers before providing services. According to the news website Tabnak, an Iranian police statement states:

Internet cafes are required to write down the forename, surname, name of the father, national identification number, postcode and telephone number of each customer. Besides the personal information, they must maintain other information of the customer such as the date and the time of using the Internet and the IP address, and the addresses of the websites visited. They should keep these informations for each individuals for at least six months.

In May 2012 Iran criticized Google for dropping the name "Persian Gulf" from its maps, leaving the feature unlabelled. Six days after Khamenei's statement, Iran announced that Google and Gmail would be added to the list of banned sites, to be replaced by a domestic Internet network largely isolated from the World Wide Web. Iranian media reported that the new system would be ready by March 2013. The new network already hosts some government and academic sites.

The isolation of the separate network was also touted as an improvement to network security, in the wake of the Stuxnet worm attack on Iranian's main uranium enrichment facility. A computer virus was also found in Iran's major Kharg Island oil export terminal in April. Communications and Technology Minister Reza Taqipour said, "Control over the Internet should not be in the hands of one or two countries. Especially on major issues and during crises, one cannot trust this network at all."

In September 2012 Iran's top leader, Ayatollah Ali Khamenei, called on Western leaders to censor the film trailer for Innocence of Muslims, which was posted to YouTube, a Google affiliate. Khamenei alluded to bans on Nazi-related or anti-gay sites in some countries, asking "How there is no room for freedom of expression in these cases, but insulting Islam and its sanctities is free?".

As of mid-2014, the government of President Hassan Rouhani is seeking to ease Internet restrictions in the country, with Ali Jannati, the culture minister, likening the restrictions to the ban on fax machines, video recorders and video tapes that was implemented following the 1979 revolution. In December 2016, Iranian Prosecutor Ahmad Ali Montazeri, who heads Iran's Internet censorship Committee banned and closed 14,000 websites and social networking accounts in Iran. He underlined that President Rouhani and the Interior Minister Rahmani Fazli agree with him and have addressed "serious warnings" on this issue.


U.S. Sanctions Abet Iranian Internet Censorship â€
src: foreignpolicymag.files.wordpress.com


Blocking in 2017-18 protests

During the 2017-18 Iranian protests, the Iranian government blocked Internet access from mobile networks and blocked access to Instagram and the messaging mobile app Telegram in an effort to stymie protests. At some points, the government completely blocked Internet access in parts of the country. A January 2018 report by four special rapporteurs of the Office of the United Nations High Commissioner for Human Rights expressed deep concern about the blocking and stated: "Communication blackouts constitute a serious violation of fundamental rights."


RadiTo Is a Podcast App That Circumvents Iran's Censors | WIRED
src: media.wired.com


See also

  • Censorship in Iran
  • Communications in Iran
  • Media of Iran
  • Internet in Iran
  • 2017-18 Iranian protests#Censorship

Internet censorshipâ€
src: s-media-cache-ak0.pinimg.com


References


OONI on Twitter:
src: pbs.twimg.com


External links

  • Blocked In Iran - Test if any website is blocked in Iran in real-time.
  • Internet Enemies: Iran, Reporters Without Borders
  • Iran and Internet Filtering (OpenNet Initiative - 2009 report)
  • Fed contractor, cell phone maker sold spy system to Iran - Washington Times article (2009)
  • VPN for Iran - VPN Service to unblock websites in Iran
  • Unblock Iran with secure VPN Account
  • How to Bypass Internet Censorship, also known by the titles: Bypassing Internet Censorship or Circumvention Tools, a FLOSS Manual, 10 March 2011, 240 pp.

Source of article : Wikipedia

Internet censorship

China's Internet Censorship Explained - YouTube
src: i.ytimg.com

Internet censorship is the control or suppression of what can be accessed, published, or viewed on the Internet enacted by regulators, or on their own initiative. Individuals and organizations may engage in self-censorship for moral, religious, or business reasons, to conform to societal norms, due to intimidation, or out of fear of legal or other consequences.

The extent of Internet censorship varies on a country-to-country basis. While most democratic countries have moderate Internet censorship, other countries go as far as to limit the access of information such as news and suppress discussion among citizens. Internet censorship also occurs in response to or in anticipation of events such as elections, protests, and riots. An example is the increased censorship due to the events of the Arab Spring. Other areas of censorship include copyrights, defamation, harassment, and obscene material.

Support for and opposition to Internet censorship also varies. In a 2012 Internet Society survey 71% of respondents agreed that "censorship should exist in some form on the Internet". In the same survey 83% agreed that "access to the Internet should be considered a basic human right" and 86% agreed that "freedom of expression should be guaranteed on the Internet". According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for increased user privacy.


Video Internet censorship



Overview

Many of the challenges associated with Internet censorship are similar to those for offline censorship of more traditional media such as newspapers, magazines, books, music, radio, television, and film. One difference is that national borders are more permeable online: residents of a country that bans certain information can find it on websites hosted outside the country. Thus censors must work to prevent access to information even though they lack physical or legal control over the websites themselves. This in turn requires the use of technical censorship methods that are unique to the Internet, such as site blocking and content filtering.

Views about the feasibility and effectiveness of Internet censorship have evolved in parallel with the development of the Internet and censorship technologies:

  • A 1993 Time Magazine article quotes computer scientist John Gilmore, one of the founders of the Electronic Frontier Foundation, as saying "The Net interprets censorship as damage and routes around it."
  • In November 2007, "Father of the Internet" Vint Cerf stated that he sees government control of the Internet failing because the Web is almost entirely privately owned.
  • A report of research conducted in 2007 and published in 2009 by the Berkman Center for Internet & Society at Harvard University stated that: "We are confident that the [ censorship circumvention ] tool developers will for the most part keep ahead of the governments' blocking efforts", but also that "...we believe that less than two percent of all filtered Internet users use circumvention tools".
  • In contrast, a 2011 report by researchers at the Oxford Internet Institute published by UNESCO concludes "... the control of information on the Internet and Web is certainly feasible, and technological advances do not therefore guarantee greater freedom of speech."
  • Dr Shashi Tharoor in quarterly lecture series programme organized by a think tank based in India, Centre for Public Policy Research stated that "avenues of expressing our views and opinions having amplified multifold via digital media, freedom of expression comes immense responsibility"

Blocking and filtering can be based on relatively static blacklists or be determined more dynamically based on a real-time examination of the information being exchanged. Blacklists may be produced manually or automatically and are often not available to non-customers of the blocking software. Blocking or filtering can be done at a centralized national level, at a decentralized sub-national level, or at an institutional level, for example in libraries, universities or Internet cafes. Blocking and filtering may also vary within a country across different ISPs. Countries may filter sensitive content on an ongoing basis and/or introduce temporary filtering during key time periods such as elections. In some cases the censoring authorities may surreptitiously block content to mislead the public into believing that censorship has not been applied. This is achieved by returning a fake "Not Found" error message when an attempt is made to access a blocked website.

Unless the censor has total control over all Internet-connected computers, such as in North Korea (who employ an intranet that only privileged citizens can access), or Cuba, total censorship of information is very difficult or impossible to achieve due to the underlying distributed technology of the Internet. Pseudonymity and data havens (such as Freenet) protect free speech using technologies that guarantee material cannot be removed and prevents the identification of authors. Technologically savvy users can often find ways to access blocked content. Nevertheless, blocking remains an effective means of limiting access to sensitive information for most users when censors, such as those in China, are able to devote significant resources to building and maintaining a comprehensive censorship system.

The term "splinternet" is sometimes used to describe the effects of national firewalls. The verb "rivercrab" colloquially refers to censorship of the Internet, particularly in Asia.


Maps Internet censorship



Content suppression methods

Technical censorship

Approaches

Internet content is subject to technical censorship methods, including:

  • Internet Protocol (IP) address blocking: Access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all websites on the same server will be blocked. This affects IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find proxies that have access to the target websites, but proxies may be jammed or blocked, and some Web sites, such as Wikipedia (when editing), also block proxies. Some large websites such as Google have allocated additional IP addresses to circumvent the block, but later the block was extended to cover the new addresses. Due to challenges with geolocation, geo-blocking is normally implemented via IP address blocking.
  • Domain name system (DNS) filtering and redirection: Blocked domain names are not resolved, or an incorrect IP address is returned via DNS hijacking or other means. This affects all IP-based protocols such as HTTP, FTP and POP. A typical circumvention method is to find an alternative DNS resolver that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP address blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not itself blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name as part of a URL given to a Web browser.
  • Uniform Resource Locator (URL) filtering: URL strings are scanned for target keywords regardless of the domain name specified in the URL. This affects the HTTP protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and TLS/SSL.
  • Packet filtering: Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This affects all TCP-based protocols such as HTTP, FTP and POP, but Search engine results pages are more likely to be censored. Typical circumvention methods are to use encrypted connections - such as VPN and TLS/SSL - to escape the HTML content, or by reducing the TCP/IP stack's MTU/MSS to reduce the amount of text contained in a given packet.
  • Connection reset: If a previous TCP connection is blocked by the filter, future connection attempts from both sides can also be blocked for some variable amount of time. Depending on the location of the block, other users or websites may also be blocked, if the communication is routed through the blocking location. A circumvention method is to ignore the reset packet sent by the firewall.
  • Network disconnection: A technically simpler method of Internet censorship is to completely cut off all routers, either by software or by hardware (turning off machines, pulling out cables). This appears to have been the case on 27/28 January 2011 during the 2011 Egyptian protests, in what has been widely described as an "unprecedented" internet block. About 3500 Border Gateway Protocol (BGP) routes to Egyptian networks were shut down from about 22:10 to 22:35 UTC 27 January. This full block was implemented without cutting off major intercontinental fibre-optic links, with Renesys stating on 27 January, "Critical European-Asian fiber-optic routes through Egypt appear to be unaffected for now." Full blocks also occurred in Myanmar/Burma in 2007, Libya in 2011, and Syria during the Syrian civil war. A circumvention method could be to use a satellite ISP to access Internet.
  • Portal censorship and search result removal: Major portals, including search engines, may exclude web sites that they would ordinarily include. This renders a site invisible to people who do not know where to find it. When a major portal does this, it has a similar effect as censorship. Sometimes this exclusion is done to satisfy a legal or other requirement, other times it is purely at the discretion of the portal. For example, Google.de and Google.fr remove Neo-Nazi and other listings in compliance with German and French law.
  • Computer network attacks: Denial-of-service attacks and attacks that deface opposition websites can produce the same result as other blocking techniques, preventing or limiting access to certain websites or other online services, although only for a limited period of time. This technique might be used during the lead up to an election or some other sensitive period. It is more frequently used by non-state actors seeking to disrupt services.

Over- and under-blocking

Technical censorship techniques are subject to both over- and under-blocking since it is often impossible to always block exactly the targeted content without blocking other permissible material or allowing some access to targeted material and so providing more or less protection than desired. An example is that automatic censorship against sexual words in matter for children, set to block the word "cunt", has been known to block the Lincolnshire placename Scunthorpe. Another example is blocking an IP-address of a server that hosts multiple websites, which prevents access to all of the websites rather than just those that contain content deemed offensive.

According to a report produced in 1997 by the gay rights group GLAAD, many 1990s-era Internet censorship software products prevent access to non-pornographic LGBT-related material.

Use of commercial filtering software

Writing in 2009 Ronald Deibert, professor of political science at the University of Toronto and co-founder and one of the principal investigators of the OpenNet Initiative, and, writing in 2011, Evgeny Morzov, a visiting scholar at Stanford University and an Op-Ed contributor to the New York Times, explain that companies in the United States, Finland, France, Germany, Britain, Canada, and South Africa are in part responsible for the increasing sophistication of online content filtering worldwide. While the off-the-shelf filtering software sold by Internet security companies are primarily marketed to businesses and individuals seeking to protect themselves and their employees and families, they are also used by governments to block what they consider sensitive content.

Among the most popular filtering software programs is SmartFilter by Secure Computing in California, which was bought by McAfee in 2008. SmartFilter has been used by Tunisia, Saudi Arabia, Sudan, the UAE, Kuwait, Bahrain, Iran, and Oman, as well as the United States and the UK. Myanmar and Yemen have used filtering software from Websense. The Canadian-made commercial filter Netsweeper is used in Qatar, the UAE, and Yemen. The Canadian organization CitizenLab has reported tha Sandvine and Procera products are used in Turkey and Egypt.

On 12 March 2013 in a Special report on Internet Surveillance, Reporters Without Borders named five "Corporate Enemies of the Internet": Amesys (France), Blue Coat Systems (U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany). The companies sell products that are liable to be used by governments to violate human rights and freedom of information. RWB said that the list is not exhaustive and will be expanded in the coming months.

In a U.S. lawsuit filed in May 2011, Cisco Systems is accused of helping the Chinese Government build a firewall, known widely as the Golden Shield, to censor the Internet and keep tabs on dissidents. Cisco said it had made nothing special for China. Cisco is also accused of aiding the Chinese government in monitoring and apprehending members of the banned Falun Gong group.

Many filtering programs allow blocking to be configured based on dozens of categories and sub-categories such as these from Websense: "abortion" (pro-life, pro-choice), "adult material" (adult content, lingerie and swimsuit, nudity, sex, sex education), "advocacy groups" (sites that promote change or reform in public policy, public opinion, social practice, economic activities, and relationships), "drugs" (abused drugs, marijuana, prescribed medications, supplements and unregulated compounds), "religion" (non-traditional religions occult and folklore, traditional religions), .... The blocking categories used by the filtering programs may contain errors leading to the unintended blocking of websites. The blocking of DailyMotion in early 2007 by Tunisian authorities was, according to the OpenNet Initiative, due to Secure Computing wrongly categorizing DailyMotion as pornography for its SmartFilter filtering software. It was initially thought that Tunisia had blocked DailyMotion due to satirical videos about human rights violations in Tunisia, but after Secure Computing corrected the mistake access to DailyMotion was gradually restored in Tunisia.

Organizations such as the Global Network Initiative, the Electronic Frontier Foundation, Amnesty International, and the American Civil Liberties Union have successfully lobbied some vendors such as Websense to make changes to their software, to refrain from doing business with repressive governments, and to educate schools who have inadvertently reconfigured their filtering software too strictly. Nevertheless, regulations and accountability related to the use of commercial filters and services are often non-existent, and there is relatively little oversight from civil society or other independent groups. Vendors often consider information about what sites and content is blocked valuable intellectual property that is not made available outside the company, sometimes not even to the organizations purchasing the filters. Thus by relying upon out-of-the-box filtering systems, the detailed task of deciding what is or is not acceptable speech may be outsourced to the commercial vendors.

Non-technical censorship

Internet content is also subject to censorship methods similar to those used with more traditional media. For example:

  • Laws and regulations may prohibit various types of content and/or require that content be removed or blocked either proactively or in response to requests.
  • Publishers, authors, and ISPs may receive formal and informal requests to remove, alter, slant, or block access to specific sites or content.
  • Publishers and authors may accept bribes to include, withdraw, or slant the information they present.
  • Publishers, authors, and ISPs may be subject to arrest, criminal prosecution, fines, and imprisonment.
  • Publishers, authors, and ISPs may be subject to civil lawsuits.
  • Equipment may be confiscated and/or destroyed.
  • Publishers and ISPs may be closed or required licenses may be withheld or revoked.
  • Publishers, authors, and ISPs may be subject to boycotts.
  • Publishers, authors, and their families may be subject to threats, attacks, beatings, and even murder.
  • Publishers, authors, and their families may be threatened with or actually lose their jobs.
  • Individuals may be paid to write articles and comments in support of particular positions or attacking opposition positions, usually without acknowledging the payments to readers and viewers.
  • Censors may create their own online publications and Web sites to guide online opinion.
  • Access to the Internet may be limited due to restrictive licensing policies or high costs.
  • Access to the Internet may be limited due to a lack of the necessary infrastructure, deliberate or not.

Major web portal official statements on site and content removal

Most major web service operators reserve to themselves broad rights to remove or pre-screen content, sometimes without giving a specific list or only a vague general list of the reasons allowing the removal. The phrases "at our sole discretion", "without prior notice", and "for other reasons" are common in Terms of Service agreements.

  • Facebook: Among other things the Facebook Statement of Rights and Responsibilities says: "You will not post content that: is hateful, threatening, or pornographic; incites violence; or contains nudity or graphic or gratuitous violence", "You will not use Facebook to do anything unlawful, misleading, malicious, or discriminatory", "We can remove any content or information you post on Facebook if we believe that it violates this Statement", and "If you are located in a country embargoed by the United States, or are on the U.S. Treasury Department's list of Specially Designated Nationals you will not engage in commercial activities on Facebook (such as advertising or payments) or operate a Platform application or website".
  • Google: Google's general Terms of Service, which were updated on 1 March 2012, state: "We may suspend or stop providing our Services to you if you do not comply with our terms or policies or if we are investigating suspected misconduct", "We may review content to determine whether it is illegal or violates our policies, and we may remove or refuse to display content that we reasonably believe violates our policies or the law", and "We respond to notices of alleged copyright infringement and terminate accounts of repeat infringers according to the process set out in the U.S. Digital Millennium Copyright Act".
    • Google Search: Google's Webmaster Tools help includes the following statement: "Google may temporarily or permanently remove sites from its index and search results if it believes it is obligated to do so by law, if the sites do not meet Google's quality guidelines, or for other reasons, such as if the sites detract from users' ability to locate relevant information."
  • Twitter: The Twitter Terms of Service state: "We reserve the right at all times (but will not have an obligation) to remove or refuse to distribute any Content on the Services and to terminate users or reclaim usernames" and "We reserve the right to remove Content alleged to be [copyright] infringing without prior notice and at our sole discretion".
  • YouTube: The YouTube Terms of Service include the statements: "YouTube reserves the right to decide whether Content violates these Terms of Service for reasons other than copyright infringement, such as, but not limited to, pornography, obscenity, or excessive length. YouTube may at any time, without prior notice and in its sole discretion, remove such Content and/or terminate a user's account for submitting such material in violation of these Terms of Service", "YouTube will remove all Content if properly notified that such Content infringes on another's intellectual property rights", and "YouTube reserves the right to remove Content without prior notice".

  • Wikipedia: Content within a Wikipedia article may be modified or deleted by any editor as part of the normal process of editing and updating articles. All editing decisions are open to discussion and review. The Wikipedia Deletion policy outlines the circumstances in which entire articles can be deleted. Any editor who believes a page doesn't belong in an encyclopedia can propose its deletion. Such a page can be deleted by any administrator if, after seven days, no one objects to the proposed deletion. Speedy deletion allows for the deletion of articles without discussion and is used to remove pages that are so obviously inappropriate for Wikipedia that they have no chance of surviving a deletion discussion. All deletion decisions may be reviewed, either informally or formally.
  • Yahoo!: Yahoo!'s Terms of Service (TOS) state: "You acknowledge that Yahoo! may or may not pre-screen Content, but that Yahoo! and its designees shall have the right (but not the obligation) in their sole discretion to pre-screen, refuse, or remove any Content that is available via the Yahoo! Services. Without limiting the foregoing, Yahoo! and its designees shall have the right to remove any Content that violates the TOS or is otherwise objectionable."

Internet Censorship | AtlTomGirl
src: atltomgirl.files.wordpress.com


Circumvention

Internet censorship circumvention is the processes used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material. Circumvention is an inherent problem for those wishing to censor the Internet because filtering and blocking do not remove content from the Internet, but instead block access to it. Therefore, as long as there is at least one publicly accessible uncensored system, it will often be possible to gain access to otherwise censored material. However circumvention may not be possible by non tech-savvy users, so blocking and filtering remain effective means of censoring the Internet access of large numbers of users.

Different techniques and resources are used to bypass Internet censorship, including proxy websites, virtual private networks, sneakernets, and circumvention software tools. Solutions have differing ease of use, speed, security, and risks. Most, however, rely on gaining access to an Internet connection that is not subject to filtering, often in a different jurisdiction not subject to the same censorship laws. According to GlobalWebIndex, over 400 million people use virtual private networks to circumvent censorship or for increased level of privacy. The majority of circumvention techniques are not suitable for day to day use.

There are risks to using circumvention software or other methods to bypass Internet censorship. In some countries individuals that gain access to otherwise restricted content may be violating the law and if caught can be expelled, fired, jailed, or subject to other punishments and loss of access.

In June 2011 the New York Times reported that the U.S. is engaged in a "global effort to deploy 'shadow' Internet and mobile phone systems that dissidents can use to undermine repressive governments that seek to silence them by censoring or shutting down telecommunications networks."

Another way to circumvent Internet censorship is to physically go to an area where Internet is not censored. In 2017 a so-called "Internet refugee camp" was established by IT workers in the village of Bonako, just outside an area of Cameroon where Internet is regularly blocked.


Fighting Internet Censorship: Unblock Websites and Censored Content
src: safervpn-blog.s3.amazonaws.com


Common targets

There are several motives or rationales for Internet filtering: politics and power, social norms and morals, and security concerns. Protecting existing economic interests is an additional emergent motive for Internet filtering. In addition, networking tools and applications that allow the sharing of information related to these motives are themselves subjected to filtering and blocking. And while there is considerable variation from country to country, the blocking of web sites in a local language is roughly twice that of web sites available only in English or other international languages.

Politics and power

Censorship directed at political opposition to the ruling government is common in authoritarian and repressive regimes. Some countries block web sites related to religion and minority groups, often when these movements represent a threat to the ruling regimes.

Examples include:

  • Political blogs and web sites
  • Lèse majesté sites, sites with content that offends the dignity of or challenges the authority of a reigning sovereign or of a state
  • Falun Gong and Tibetan exile group sites in China or Buddhist, Cao Dai faith, and indigenous hill tribes sites in Vietnam
  • Sites aimed at religious conversion from Islam to Christianity
  • Sites criticizing the government or an authority in the country
  • Sites that comment on political parties that oppose the current government of a country
  • Sites that accuse authorities of corruption
  • Sites that comment on minorities or LGBT issues

Social norms

Social filtering is censorship of topics that are held to be antithetical to accepted societal norms. In particular censorship of child pornography and to protect children enjoys very widespread public support and such content is subject to censorship and other restrictions in most countries.

Examples include:

  • Sites that include hate speech inciting racism, sexism, homophobia, or other forms of bigotry
  • Sites seen as promoting illegal drug use (Erowid)
  • Sex and erotic, fetishism, prostitution, and pornographic sites
  • Child pornography and pedophile related sites (see also CIRCAMP)
  • Gambling sites
  • Sites encouraging or inciting violence
  • Sites promoting criminal activity
  • Communist symbols and imagery in Poland, Lithuania, Ukraine, Latvia, Moldova, and Hungary
  • Nazi and similar websites, particularly in France and Germany
  • Sites that contain blasphemous content, particularly when directed at a majority or state supported religion
  • Sites that contain defamatory, slanderous, or libelous content
  • Sites that include political satire
  • Sites that contain information on social issues or "online protests, petitions and campaigns"

Security concerns

Many organizations implement filtering as part of a defense in depth strategy to protect their environments from malware, and to protect their reputations in the event of their networks being used, for example, to carry out sexual harassment.

Internet filtering related to threats to national security that targets the Web sites of insurgents, extremists, and terrorists often enjoys wide public support.

Examples include:

  • Blocking of pro-North Korean sites by South Korea
  • Blocking sites of groups that foment domestic conflict in India
  • Blocking of sites of the Muslim Brotherhood in some countries in the Middle East
  • Blocking Wikileaks
  • Blocking sites such as 4chan thought to be related to the group Anonymous

Protection of existing economic interests and copyright

The protection of existing economic interests is sometimes the motivation for blocking new Internet services such as low-cost telephone services that use Voice over Internet Protocol (VoIP). These services can reduce the customer base of telecommunications companies, many of which enjoy entrenched monopoly positions and some of which are government sponsored or controlled.

Anti-copyright activists Christian Engström, Rick Falkvinge and Oscar Swartz have alleged that censorship of child pornography is being used as a pretext by copyright lobby organizations to get politicians to implement similar site blocking legislation against copyright-related piracy.

Examples include:

  • File sharing and peer-to-peer (P2P) related websites such as The Pirate Bay
  • Skype
  • Sites that sell or distribute music, but are not 'approved' by rights holders, such as allofmp3

Network tools

Blocking the intermediate tools and applications of the Internet that can be used to assist users in accessing and sharing sensitive material is common in many countries.

Examples include:

  • Media sharing websites (e.g. Flickr and YouTube)
  • Social networks (e.g. Facebook and Instagram)
  • Translation sites and tools
  • E-mail providers
  • Web hosting sites
  • Blog hosting sites such as Blogspot
  • Microblogging sites such as Twitter and Weibo
  • Wikipedia
  • Censorship circumvention sites
    • Anonymizers
    • Proxy avoidance sites
  • Search engines such as Bing and Google - particularly in Mainland China and Cuba

Information about individuals

The right to be forgotten is a concept that has been discussed and put into practice in the European Union. In May 2014, the European Court of Justice ruled against Google in Costeja, a case brought by a Spanish man who requested the removal of a link to a digitized 1998 article in La Vanguardia newspaper about an auction for his foreclosed home, for a debt that he had subsequently paid. He initially attempted to have the article removed by complaining to Spain's data protection agency--Agencia Española de Protección de Datos--which rejected the claim on the grounds that it was lawful and accurate, but accepted a complaint against Google and asked Google to remove the results. Google sued in Spain and the lawsuit was transferred to the European Court of Justice. The court ruled in Costeja that search engines are responsible for the content they point to and thus, Google was required to comply with EU data privacy laws. It began compliance on 30 May 2014 during which it received 12,000 requests to have personal details removed from its search engine.

Index on Censorship claimed that "Costeja ruling ... allows individuals to complain to search engines about information they do not like with no legal oversight. This is akin to marching into a library and forcing it to pulp books. Although the ruling is intended for private individuals it opens the door to anyone who wants to whitewash their personal history....The Court's decision is a retrograde move that misunderstands the role and responsibility of search engines and the wider internet. It should send chills down the spine of everyone in the European Union who believes in the crucial importance of free expression and freedom of information."


Why Internet Censorship is Bad for Everyone | Techish
src: i1.wp.com


Around the world

As more people in more places begin using the Internet for important activities, there is an increase in online censorship, using increasingly sophisticated techniques. The motives, scope, and effectiveness of Internet censorship vary widely from country to country. The countries engaged in state-mandated filtering are clustered in three main regions of the world: east Asia, central Asia, and the Middle East/North Africa.

Countries in other regions also practice certain forms of filtering. In the United States state-mandated Internet filtering occurs on some computers in libraries and K-12 schools. Content related to Nazism or Holocaust denial is blocked in France and Germany. Child pornography and hate speech are blocked in many countries throughout the world. In fact, many countries throughout the world, including some democracies with long traditions of strong support for freedom of expression and freedom of the press, are engaged in some amount of online censorship, often with substantial public support.

Internet censorship in China is among the most stringent in the world. The government blocks Web sites that discuss the Dalai Lama, the 1989 crackdown on Tiananmen Square protesters, the banned spiritual practice Falun Gong, as well as many general Internet sites. The government requires Internet search firms and state media to censor issues deemed officially "sensitive," and blocks access to foreign websites including Facebook, Twitter, and YouTube. According to a recent study, censorship in China is used to muzzle those outside government who attempt to spur the creation of crowds for any reason--in opposition to, in support of, or unrelated to the government. The government allows the Chinese people to say whatever they like about the state, its leaders, or their policies, because talk about any subject unconnected to collective action is not censored. The value that Chinese leaders find in allowing and then measuring criticism by hundreds of millions of Chinese people creates actionable information for them and, as a result, also for academic scholars and public policy analysts.

There are international bodies that oppose internet censorship, for example "Internet censorship is open to challenge at the World Trade Organization (WTO) as it can restrict trade in online services, a forthcoming study argues".

Reports, ratings, and trends

Detailed country by country information on Internet censorship is provided by the OpenNet Initiative, Reporters Without Borders, Freedom House, and in the U.S. State Department Bureau of Democracy, Human Rights, and Labor's Human Rights Reports. The ratings produced by several of these organizations are summarized in the Internet censorship by country and the Censorship by country articles.

OpenNet Initiative reports

Through 2010 the OpenNet Initiative had documented Internet filtering by governments in over forty countries worldwide. The level of filtering in 26 countries in 2007 and in 25 countries in 2009 was classified in the political, social, and security areas. Of the 41 separate countries classified, seven were found to show no evidence of filtering in all three areas (Egypt, France, Germany, India, Ukraine, United Kingdom, and United States), while one was found to engage in pervasive filtering in all three areas (China), 13 were found to engage in pervasive filtering in one or more areas, and 34 were found to engage in some level of filtering in one or more areas. Of the 10 countries classified in both 2007 and 2009, one reduced its level of filtering (Pakistan), five increased their level of filtering (Azerbaijan, Belarus, Kazakhstan, South Korea, and Uzbekistan), and four maintained the same level of filtering (China, Iran, Myanmar, and Tajikistan).

Freedom on the Net reports

In the 2011 edition of Freedom House's report Freedom on the Net, of the 37 countries surveyed, 8 were rated as "free" (22%), 18 as "partly free" (49%), and 11 as "not free" (30%). In their 2009 report, of the 15 countries surveyed, 4 were rated as "free" (27%), 7 as "partly free" (47%), and 4 as "not free" (27%). And of the 15 countries surveyed in both 2009 and 2011, 5 were seen to be moving in the direction of more network freedom (33%), 9 moved toward less freedom (60%), and one was unchanged (7%).

The 2014 report assessed 65 countries and reported that 36 countries experienced a negative trajectory in Internet freedom since the previous year, with the most significant declines in Russia, Turkey and Ukraine. According to the report, few countries demonstrated any gains in Internet freedom, and the improvements that were recorded reflected less vigorous application of existing controls rather than new steps taken by governments to actively increase Internet freedom. The year's largest improvement was recorded in India, where restrictions to content and access were relaxed from what had been imposed in 2013 to stifle rioting in the northeastern states. Notable improvement was also recorded in Brazil, where lawmakers approved the bill Marco Civil da Internet, which contains significant provisions governing net neutrality and safeguarding privacy protection.

Reporters Without Borders (RWB)

RWB "Internet enemies" and "countries under surveillance" lists

In 2006, Reporters without Borders (Reporters sans frontières, RSF), a Paris-based international non-governmental organization that advocates freedom of the press, started publishing a list of "Enemies of the Internet". The organization classifies a country as an enemy of the internet because "all of these countries mark themselves out not just for their capacity to censor news and information online but also for their almost systematic repression of Internet users." In 2007 a second list of countries "Under Surveillance" (originally "Under Watch") was added.

When the "Enemies of the Internet" list was introduced in 2006, it listed 13 countries. From 2006 to 2012 the number of countries listed fell to 10 and then rose to 12. The list was not updated in 2013. In 2014 the list grew to 19 with an increased emphasis on surveillance in addition to censorship. The list has not been updated since 2014.

When the "Countries under surveillance" list was introduced in 2008, it listed 10 countries. Between 2008 and 2012 the number of countries listed grew to 16 and then fell to 11. The list was last updated in 2012.

RWB Special report on Internet Surveillance

On 12 March 2013, Reporters Without Borders published a Special report on Internet Surveillance. The report includes two new lists:

  • a list of "State Enemies of the Internet", countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights; and
  • a list of "Corporate Enemies of the Internet", companies that sell products that are liable to be used by governments to violate human rights and freedom of information.

The five "State Enemies of the Internet" named in March 2013 are: Bahrain, China, Iran, Syria, and Vietnam.

The five "Corporate Enemies of the Internet" named in March 2013 are: Amesys (France), Blue Coat Systems (U.S.), Gamma International (UK and Germany), Hacking Team (Italy), and Trovicor (Germany).

BBC World Service global public opinion poll

A poll of 27,973 adults in 26 countries, including 14,306 Internet users, was conducted for the BBC World Service by the international polling firm GlobeScan using telephone and in-person interviews between 30 November 2009 and 7 February 2010. GlobeScan Chairman Doug Miller felt, overall, that the poll showed that:

Despite worries about privacy and fraud, people around the world see access to the internet as their fundamental right. They think the web is a force for good, and most don't want governments to regulate it.

Findings from the poll include:

  • Nearly four in five (78%) Internet users felt that the Internet had brought them greater freedom.
  • Most Internet users (53%) felt that "the internet should never be regulated by any level of government anywhere".
  • Opinion was evenly split between Internet users who felt that "the internet is a safe place to express my opinions" (48%) and those who disagreed (49%). Somewhat surprisingly users in Germany and France agreed the least, followed by users in a highly filtered country such as China, while users in Egypt, India and Kenya agreed more strongly.
  • The aspects of the Internet that cause the most concern include: fraud (32%), violent and explicit content (27%), threats to privacy (20%), state censorship of content (6%), and the extent of corporate presence (3%).
  • Almost four in five Internet users and non-users around the world felt that access to the Internet was a fundamental right (50% strongly agreed, 29% somewhat agreed, 9% somewhat disagreed, 6% strongly disagreed, and 6% gave no opinion). And while there is strong support for this right in all of the countries surveyed, it is surprising that the United States and Canada were among the top five countries where people most strongly disagreed that access to the Internet was a fundamental right of all people (13% in Japan, 11% in the U.S., 11% in Kenya, 11% in Pakistan, and 10% in Canada strongly disagree).

Internet Society's Global Internet User Survey

In July and August 2012 the Internet Society conducted online interviews of more than 10,000 Internet users in 20 countries. Some of the results relevant to Internet censorship are summarized below.

Transparency of filtering or blocking activities

Among the countries that filter or block online content, few openly admit to or fully disclose their filtering and blocking activities. States are frequently opaque and/or deceptive about the blocking of access to political information. For example:

  • Saudi Arabia and the United Arab Emirates (UAE) are among the few states that publish detailed information about their filtering practices and display a notification to the user when attempting to access a blocked website. The websites that are blocked are mostly Pornographic and against the respective states and/or the Islamic Religion.
  • In contrast, countries such as China and Tunisia send users a false error indication. China blocks requests by users for a banned website at the router level and a connection error is returned, effectively preventing the user's IP address from making further HTTP requests for a varying time, which appears to the user as "time-out" error with no explanation. Tunisia has altered the block page functionality of SmartFilter, the commercial filtering software it uses, so that users attempting to access blocked websites receive a fake "File not found" error page.
  • In Uzbekistan users are frequently sent block pages stating that the website is blocked because of pornography, even when the page contains no pornography. Uzbeki ISPs may also redirect users' request for blocked websites to unrelated websites, or sites similar to the banned websites, but with different information.

Arab Spring

See also: Internet Censorship in the Arab Spring, 2011 Egyptian Internet shutdown, and Free speech in the media during the Libyan civil war

During the Arab Spring of 2011, media jihad (media struggle) was extensive. Internet and mobile technologies, particularly social networks such as Facebook and Twitter, played and are playing important new and unique roles in organizing and spreading the protests and making them visible to the rest of the world. An activist in Egypt tweeted, "we use Facebook to schedule the protests, Twitter to coordinate, and YouTube to tell the world".

This successful use of digital media in turn led to increased censorship including the complete loss of Internet access for periods of time in Egypt and Libya in 2011. In Syria, the Syrian Electronic Army (SEA), an organization that operates with at least tacit support of the government, claims responsibility for defacing or otherwise compromising scores of websites that it contends spread news hostile to the Syrian government. SEA disseminates denial of service (DoS) software designed to target media websites including those of Al Jazeera, BBC News, Syrian satellite broadcaster Orient TV, and Dubai-based Al Arabiya TV.

In response to the greater freedom of expression brought about by the Arab Spring revolutions in countries that were previously subject to very strict censorship, in March 2011, Reporters Without Borders moved Tunisia and Egypt from its "Internet enemies" list to its list of countries "under surveillance" and in 2012 dropped Libya from the list entirely. At the same time, there were warnings that Internet censorship might increase in other countries following the events of the Arab Spring. However, in 2013, Libyan communication company LTT blocked the pornographic websites. It even blocked the family-filtered videos of ordinary websites like Dailymotion.


Internet Censorship Rubber Stamp Royalty Free Cliparts, Vectors ...
src: previews.123rf.com


See also


Essay about the internet censorship
src: koelner-dom.us


References

This article incorporates licensed material from the OpenNet Initiative web site.


European Union Calls For Massive Internet Censorship â€
src: i0.wp.com


External links

  • Censorship Wikia, an anti-censorship site that catalogs past and present censored works, using verifiable sources, and a forum to discuss organizing against and circumventing censorship.
  • "Index on Censorship", web site for the London-based organization and magazine that promotes freedom of expression.
  • Internet censorship wiki, provides information about different methods of access filtering and ways to bypass them.
  • "Online Survival Kit", We Fight Censorship project of Reporters Without Borders.
  • "Media Freedom Internet Cookbook" by the OSCE Representative on Freedom of the Media, Vienna, 2004.
  • Discussion of global net filtering, Berkman Center for Internet & Society, Harvard, March 2008.
  • How to Bypass Internet Censorship, also known by the titles: Bypassing Internet Censorship or Circumvention Tools, a FLOSS Manual, 10 March 2011, 240 pp.
  • "How to bypass internet censorship: The current state of internet censorship", The Times of India, 14 November 2013.
  • "Free Speech in the Age of YouTube" in the New York Times, 22 September 2012.

Source of article : Wikipedia