You are viewing a read-only archive of the Blogs.Harvard network. Learn more.

Cyberoam fixes flaw threatening Tor users

Tor users should be relieved to learn that the flaw found in Cyberoam’s deep packet inspection device has been fixed.  The Tor Project publicized the flaw when they reported a user in Jordan “seeing a fake certificate for torproject.org.”  In order to scan users’ connections, Cyberoam would direct the user’s browser to recognize Cyberoam’s trusted […]

Ethiopia criminalizes VoIP services like Skype with new law

Update (7/2/2012): According to some news organizations, Ethiopia’s telecommunications law is in draft form and has not yet been ratified, despite earlier media reports to that effect. Ethiopia’s new telecommunications law, which was ratified last month, essentially makes the use of Internet-based communications like Skype and GoogleTalk a crime punishable by up to 15 years […]

Resources for Online Anonymity, Encryption, and Privacy

There are many tools available to help Internet users reach the content they seek more securely, safely, anonymously, and reliably. But the thicket of acronyms and technological terms can be intimidating to many people. What’s a VPN? How is that different than a proxy? Does “private browsing” stop my ISP from looking at my data? […]