{"id":1435,"date":"2012-07-20T10:00:50","date_gmt":"2012-07-20T14:00:50","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/herdict\/?p=1435"},"modified":"2012-07-19T15:13:50","modified_gmt":"2012-07-19T19:13:50","slug":"brein-battles-wordpress-proxy","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/herdict\/2012\/07\/20\/brein-battles-wordpress-proxy\/","title":{"rendered":"BREIN battles WordPress proxy"},"content":{"rendered":"<p>With online freedom of expression under constant threat, some people help maintain an open Internet by using proxies or mirroring content. \u00a0However, creating new routes of access to blocked sites has traditionally been daunting for the less tech-savvy. \u00a0Several recent projects are aiming to making circumvention easier; in turn, they are becoming targets of censorship themselves.<\/p>\n<p>Most recently, WordPress plug-in <a href=\"https:\/\/all4xs.net\/\">RePress<\/a>, came under fire. \u00a0The software, developed by web hosting company <a href=\"https:\/\/greenhost.nl\/\">Greenhost<\/a>, makes it easy to turn any WordPress blog into a fully operational proxy, rerouting traffic through the RePress tool in order to evade URL-based filtering. \u00a0\u00a0Once installed, the user can designate specific URLs they want rerouted through the RePress software. \u00a0For each of those URLs, the RePress tool creates an obfuscated link in order to circumvent certain forms of censorship. \u00a0According to RePress, <a href=\"https:\/\/all4xs.net\/uncensored-website\/\">the tool has been used<\/a> to reroute traffic to Amnesty.org, Blogspot, Wikileaks, TorProject, and until recently, The Pirate Bay.<\/p>\n<p>Because of RePress\u2019s potential for evading court-ordered <a href=\"http:\/\/www.herdict.org\/blog\/2012\/05\/14\/blocking-the-pirate-bay\/\">copyright related filtering<\/a>, on July 6, the Court of the Hague issued an <a href=\"http:\/\/www.scribd.com\/doc\/99518950\/BREIN-Ex-Parte-Beschikking-Tegen-Greenhost\">ex-parte court injunction<\/a> <a href=\"http:\/\/torrentfreak.com\/court-shuts-down-wordpress-based-pirate-bay-proxy-120709\/\">ordering Greenhost<\/a> to take its Pirate Bay proxy offline within 6 hours of the notice or face a fine of 1,000 euro a day. \u00a0The court order follows Dutch anti-piracy outfit <a href=\"http:\/\/www.anti-piracy.nl\/english.php\">BREIN<\/a>\u2019s June 25 formal <a href=\"https:\/\/greenhost.nl\/wp-content\/uploads\/2012\/06\/Sommatie_aan_Greenhost_25_6_12.pdf\">complaint<\/a> to Greenhost, in which they asked Greenhost to remove the entire RePress tool. \u00a0BREIN sees RePress as a threat to the progress it has recently made in litigation aimed at forcing ISPs to block access to the <a href=\"http:\/\/www.huffingtonpost.com\/2012\/05\/10\/pirate-bay-block-netherlands_n_1505741.html\">The Pirate Bay<\/a>. \u00a0Greenhost responded that it would not remove the tool because RePress was created to proxy any site which may be censored, not solely The Pirate Bay. \u00a0Some legal critics had questioned the appropriateness of BREIN\u2019s criminal complaint, especially because Dutch law explicitly protects hosting providers against criminal liability. \u00a0Thus, the Hague\u2019s decision comes as somewhat of a surprise.<\/p>\n<p>Since the injunction, <a href=\"http:\/\/all4xs.net\/repress\/thepiratebay.se\/\">Greenhost\u2019s Pirate Bay proxy<\/a> has redirected viewers to a page explaining that its proxy is offline. \u00a0However, because the court order was directed only at The Pirate Bay proxies that Greenhost maintained, the RePress proxies hosted by RePress users, including proxies to The Pirate Bay, still remain. \u00a0Greenhost is still considering its next steps with respect to its The Pirate Bay proxies.<\/p>\n<p>Greenhost\u2019s RePress isn&#8217;t the only project trying to protect online material from censorship. \u00a0Other applications, such as <a href=\"http:\/\/mirrorparty.org\/\">Mirror Party<\/a>, use mirroring technology to create and cache exact copies of the linked-to website, allowing access even if the original site is taken down. \u00a0Proxy servers simply provide a different route to the destination state, and cannot help if the destination server is offline. \u00a0In contrast, mirroring services like Mirror Party clone the target site, making the content accessible regardless of what happens to the original destination site. \u00a0Mirror Party is <a href=\"https:\/\/github.com\/pfein\/wherestheparty\/wiki\/Threat-Model\">designed to be resistant<\/a> to most forms of web censorship, including DDoS attacks and hostname\/IP filtering. \u00a0Once installed, the user can choose to <a href=\"https:\/\/github.com\/pfein\/wherestheparty\/wiki\/Making-Mirrors\">mirror<\/a> a particular site: Mirror Party downloads content from the target site, modifies and encrypts relevant content in the snapshot to make it suitable for mirroring, and distributes the content to peer servers around the world. \u00a0This can be done <a href=\"https:\/\/github.com\/pfein\/wherestheparty\/wiki\/Facilitating-Circumvention\">with or without close communication<\/a> with the mirrored site and can involve multiple mirror host-sites.<\/p>\n<p>But existing proxying and mirroring applications have limitations. \u00a0RePress is still in alpha release and can be unstable, providing minimal protection against cross-site scripting attacks and cookie hijacking. \u00a0Similarly, Mirror Party is also still in development. \u00a0In addition, the biggest limitation to web mirroring is that mirrors cannot be created after a site has been taken down, because mirroring must be done preemptively, before a site is inaccessible.<\/p>\n<p>A forthcoming alternative is a Harvard University-based project spearheaded by Professor <a href=\"http:\/\/futureoftheinternet.org\/\">Jonathan Zittrain<\/a> of Harvard\u2019s <a href=\"http:\/\/cyber.law.harvard.edu\/\">Berkman Center<\/a>. \u00a0The <a href=\"http:\/\/cyber.law.harvard.edu\/research\/internetrobustness#\">Internet Robustness<\/a> project aims to support digital activists by developing, testing, and piloting a new counter-censorship technology. \u00a0The project is unique in its aim is to allow online communities, such as human rights groups or independent media sites, to mirror each other\u2019s content. \u00a0In the case that any one participant fails to remain online, visitors will be able to access the content from other servers across the network. \u00a0The project\u2019s target community is Iranian web users, and ultimately, the goal is to make the internet significantly more robust and <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1618042\">resilient<\/a> by protecting against various attacks. \u00a0Zittrain\u2019s team is currently in the research stage of a 3-year process, which is being funded by a USAID grant. \u00a0More information regarding this new mirroring project can be found <a href=\"http:\/\/cyber.law.harvard.edu\/research\/internetrobustness#\">here<\/a>.<\/p>\n<p>It is inescapable that tools designed for one purpose may be used for others. \u00a0Teams working to strengthen internet robustness for activists through proxying and mirroring are creating tools that can also be used by software and content pirates. \u00a0Just because technology may have dual uses does not mean that governments should try to ban them. \u00a0In fact, that approach may be counterproductive. \u00a0Just a few days after BREIN\u2019s <a href=\"http:\/\/torrentfreak.com\/dutch-isps-ordered-to-block-the-pirate-bay-120111\/\">victory<\/a> over The Pirate Bay, Dutch internet provider XS4All revealed that traffic on BitTorrent had actually <a href=\"http:\/\/torrentfreak.com\/isp-bittorrent-traffic-increased-after-pirate-bay-blockade-120705\/\">increased<\/a> since the blockade, presumably due to all the media attention.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With online freedom of expression under constant threat, some people help maintain an open Internet by using proxies or mirroring content. \u00a0However, creating new routes of access to blocked sites has traditionally been daunting for the less tech-savvy. \u00a0Several recent projects are aiming to making circumvention easier; in turn, they are becoming targets of censorship [&hellip;]<\/p>\n","protected":false},"author":4635,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1],"tags":[72513,3687,704,72515,72514,72516,30097,3919],"class_list":["post-1435","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-brein","tag-censorship","tag-jonathan-zittrain","tag-mirroring","tag-proxying","tag-repress","tag-the-pirate-bay","tag-wordpress"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4LdGs-n9","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/posts\/1435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/users\/4635"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/comments?post=1435"}],"version-history":[{"count":2,"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/posts\/1435\/revisions"}],"predecessor-version":[{"id":1437,"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/posts\/1435\/revisions\/1437"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/media?parent=1435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/categories?post=1435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/herdict\/wp-json\/wp\/v2\/tags?post=1435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}