{"id":32,"date":"2009-01-09T16:27:49","date_gmt":"2009-01-09T21:27:49","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/hroberts\/?p=32"},"modified":"2009-01-20T09:15:51","modified_gmt":"2009-01-20T14:15:51","slug":"popular-chinese-filtering-circumvention-tools-dynaweb-freegate-gpass-and-firephoenix-sell-user-data","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/hroberts\/2009\/01\/09\/popular-chinese-filtering-circumvention-tools-dynaweb-freegate-gpass-and-firephoenix-sell-user-data\/","title":{"rendered":"Popular Chinese Filtering Circumvention Tools DynaWeb FreeGate, GPass, and FirePhoenix Sell User Data"},"content":{"rendered":"<p>Update: The site hosting the data for these tools has now removed the faq entry offering to sell the data.  Please read my <a href=\"http:\/\/blogs.law.harvard.edu\/hroberts\/2009\/01\/20\/update-on-chinese-circumvention-circumvention-tool-snooping\/\">subsequent update<\/a> for responses from the tool developers and further thoughts.<\/p>\n<p>Three of the circumvention tools &#8212; <a href=\"http:\/\/www.dit-inc.us\/freegate\">DynaWeb FreeGate<\/a>, <a href=\"http:\/\/gpass1.com\">GPass<\/a>, and <a href=\"http:\/\/firephoenix.edoors.com\">FirePhoenix<\/a> &#8212; used most widely to get around China&#8217;s Great Firewall are tracking and selling the individual web browsing histories of their users.  Data about aggregate usage of users of the tools is <a href=\"http:\/\/ranking.edoors.com\/site\/ds\">published freely<\/a>.  You can see, for example, that the three sites most visited by users of these circumvention tools are live.com, google.com, and secretchina.com.  Aggregate data like this is a terrific resource for those of us interested in researching circumvention tool usage, and not much of a privacy risk for the circumventing users if it is only stored (as well as displayed) in the aggregate.<\/p>\n<p>But the ranking site also advertises a pay service through which you can get not only much more data, but data about individual users.  The site&#8217;s <a href=\"http:\/\/ranking.edoors.com\/site\/faq\">FAQ states<\/a>:<\/p>\n<blockquote>\n<p>\nQ: I am interested in more detailed and in-depth visit data. Are they available?\n<\/p>\n<p>\nA: Yes, we can generate custom reports that cover different levels of details for your purposes, based on a fee. But data that can be used to identify a specific user are considered confidential and not shared with third parties unless you pass our strict screening test. Please contact us if you have such a need.\n<\/p>\n<\/blockquote>\n<p>So they are happy to provide you with specific user data, but only if you double super promise not to share it and only if they really like you.  <\/p>\n<p>It&#8217;s hard to state how dangerous this practice is.  These tools are acting as virtual ISPs for millions of users.  All circumvention tools work by proxying the data of their users through some third machine, so all circumventing traffic is going through that third party machine.  Selling the browsing histories of those users is like an ISP selling the browsing histories of its users, which is a big step beyond what companies like NebuAd and <a href=\"http:\/\/blogs.law.harvard.edu\/hroberts\/2008\/07\/25\/ernst-young-audit-overlooks-phorms-violation-of-its-own-privacy-policy\/\">Phorm<\/a> were \/ are trying to do.  NebuAd and Phorm are at least adding a variety of pseudonymity and privacy layers to their tracking, whereas dynaweb et al. are evidently directly storing (and selling) the full, individually identifiable browsing histories of their users.  <\/p>\n<p>And the data about circumventing users is much more sensitive than the data about most ISP users.  These are the histories of users browsing sites that are not only blocked (and therefore mostly sensitive in one way or another) but blocked by an authoritarian country with an active policy and practice of persecuting dissidents.  The mere act of anyone, let alone projects proclaiming themselves for <a href=\"http:\/\/www.internetfreedom.org\/\">internet freedom<\/a>, storing this data is very bad practice.  Any data that is stored can be potentially be shared or stolen.  The best way to make sure that dangerous data like this does not get into the wrong hands is not to store it in the first place.  <\/p>\n<p>But these projects are not only storing the data.  They are actively offering to sell it.  None of the projects has anything like a privacy policy that I can find, and none of them provides any notice anywhere on the site or during the installation process that the project will be tracking and selling user browsing activity.*  But all of the sites have deceptive language like this from the <a href=\"http:\/\/firephoenix.edoors.com\/\">FirePhoenix home page<\/a>:<\/p>\n<blockquote>\n<p><b>Secure<\/b><\/p>\n<p>\nFP encrypts all your network traffic. No third-party can recognize what Internet information is flowing in\/out of your computer, even if they are monitoring your traffic.\n<\/p>\n<\/blockquote>\n<p>In fact, third parties can recognize the data flowing in\/out of a computer running FirePhoenix by buying that data and promising not to share it with anyone else.  <\/p>\n<p>This sort of thing demonstrates that there is no way to eliminate points of control from a network.  You can only move them around so that you trust different people.  In this case, Chinese users are replacing some of the trust in their local Chinese ISPs with trust in the circumvention projects through which they are proxying their traffic.  But those tools are acting as virtual ISPs themselves and so have all the potential for control (and abuse) that the local ISPs have.  They can snoop on user activity; they can filter and otherwise tamper with connections; they can block P2P traffic.  <\/p>\n<p>These particular virtual ISPs have chosen to support themselves by selling user data.  Lots of folks rely on personal VPNs to circumvent or otherwise secure their connections, but those VPNs are not inherently any safer that the local ISPs through which they are tunneling.  The popular VPN <a href=\"http:\/\/www.relakks.com\">Relakks<\/a>, for example, is hosted in Sweden, where <a href=\"http:\/\/www.iht.com\/articles\/ap\/2008\/06\/18\/europe\/EU-GEN-Sweden-E-mail-Spying.php\">a law passed last year<\/a> requires that the federal government monitor all data entering and leaving the country, including foreign users of the Relakks VPN.  Some circumvention projects like Psiphon use a peer to peer model in which volunteers host proxies (ideally a volunteer known by the circumventing user) and others like Tor use algorithms to try to ensure trust of the proxies, but all of them require that the user trust some other person or some code with all of her circumventing traffic.<\/p>\n<p><i><font size=\"-2\">*:  installation language not verified for FirePhoenix, which has only a Chinese interface.<\/font><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update: The site hosting the data for these tools has now removed the faq entry offering to sell the data. Please read my subsequent update for responses from the tool developers and further thoughts. Three of the circumvention tools &#8212; DynaWeb FreeGate, GPass, and FirePhoenix &#8212; used most widely to get around China&#8217;s Great Firewall [&hellip;]<\/p>\n","protected":false},"author":1765,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-32","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/users\/1765"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/posts\/32\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/media?parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/categories?post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/hroberts\/wp-json\/wp\/v2\/tags?post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}