More Than a Decade Later, Site-Blocking Is Still Censorship

We're taking part in Copyright Week, a series of actions and discussions supporting key principles that should guide copyright policy.
Every day this week, various groups are taking on different elements of copyright law and policy, addressing what's at stake and what we need to do to make sure that copyright promotes creativity and innovation.
As Copyright Week comes to a close, it's worth remembering why we have in it January.
Twelve years ago, a diverse coalition of internet users, websites, and public interest activists took to the internet to protest SOPA/PIPA, proposed laws that would have, among other things, blocked access to websites if they were alleged to be used for copyright infringement.
More than a decade on, there still is no way to do this without causing irreparable harm to legal online expression.
Among those changes is a major shift in how we, and legislators, view technology companies.
What once were new innovations have become behemoths.
What once were underdogs are now the establishment.
What has not changed is the fact that much of what internet platforms are used for is legal, protected, expression.
The typical users of those platforms are those without access to the megaphones of major studios, record labels, or publishers.
Any attempt to resurrect SOPA/PIPA-no matter what it is rebranded as-remains a threat to that expression.
Not just access to the alleged infringement, but the entire website.
We are all so used to the Digital Millennium Copyright Act and the safe harbor it provides that we sometimes forget how extraordinary the relief it provides really is.
Instead of providing proof of their claims to a judge or jury, rightsholders merely have to contact a website with their honest belief that their copyright is being infringed, and the allegedly infringing material will be taken down almost immediately.
That is a vast difference from traditional methods of shutting down expression.
Site-blocking would go even further, bypassing the website and getting internet service providers to deny their customers access to a website.
This clearly imperils the expression of those not even accused of infringement, and it's far too blunt an instrument for the problem it's meant to solve.
We have a long memory, and twelve years isn't even that long.


This Cyber News was published on www.eff.org. Publication date: Fri, 26 Jan 2024 21:13:05 +0000


Cyber News related to More Than a Decade Later, Site-Blocking Is Still Censorship

CVE-2019-5303 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
11 months ago
CVE-2019-5302 - There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing ...
11 months ago
Kids Online Safety Shouldn't Require Massive Online Censorship and Surveillance: 2023 Year in Review - Many of these bills would run roughshod over the rights of young people and adults in the process. There's also good news: so far, none of these dangerous bills have been passed at the federal level, or signed into law. That's thanks to a large ...
10 months ago Eff.org
Tor's new WebTunnel bridges mimic HTTPS traffic to evade censorship - The Tor Project officially introduced WebTunnel, a new bridge type specifically designed to help bypass censorship targeting the Tor network by hiding connections in plain sight. Tor bridges are relays not listed in the public Tor directory that keep ...
8 months ago Bleepingcomputer.com
Cyber Insights 2023: Cyberinsurance - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. In 2022, Russia invaded Ukraine with the potential for more serious and more ...
1 year ago Securityweek.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
7 months ago Eff.org
Don't Fall for the Latest Changes to the Dangerous Kids Online Safety Act - The authors of the dangerous Kids Online Safety Act unveiled an amended version this week, but it's still an unconstitutional censorship bill that continues to empower state officials to target services and online content they do not like. TAKE ...
9 months ago Eff.org
More Than a Decade Later, Site-Blocking Is Still Censorship - We're taking part in Copyright Week, a series of actions and discussions supporting key principles that should guide copyright policy. Every day this week, various groups are taking on different elements of copyright law and policy, addressing what's ...
9 months ago Eff.org
Inside America's School Internet Censorship Machine - When it was passed in 2000, CIPA was immediately challenged by the American Library Association and the ACLU, which argued in a series of lawsuits that that the law's web-filtering requirement placed unconstitutional restrictions on library patrons' ...
11 months ago Wired.com
Cyber Insights 2023: Criminal Gangs - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. Despite some geopolitical overlaps with state attackers, the majority of ...
1 year ago Securityweek.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
CVE-2023-22396 - An Uncontrolled Resource Consumption vulnerability in TCP processing on the Routing Engine (RE) of Juniper Networks Junos OS allows an unauthenticated network-based attacker to send crafted TCP packets destined to the device, resulting in an MBUF ...
1 year ago
Cyber Insights 2023: ICS and Operational Technology - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. At the same time, ICS/OT is facing an expanding attack surface caused by ...
1 year ago Securityweek.com
CVE-2009-3874 - Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary ...
6 years ago
Microsoft Will Charge for Windows 10 Security Updates in 2025 - All good things must come to an end, and a decade after its first release, Windows 10 will finally be sent to a farm upstate. It had a good run, though Microsoft plans to keep dropping security updates after the OS' demise on Oct. 14, 2025. Just be ...
11 months ago Packetstormsecurity.com
CVE-2020-9069 - There is an information leakage vulnerability in some Huawei products. An unauthenticated, adjacent attacker could exploit this vulnerability to decrypt data. Successful exploitation may leak information randomly. Affected product versions include: ...
3 years ago
Analyzing KOSA's Constitutional Problems In Depth - EFF does not think KOSA is the right approach to protecting children online, however. As we've said before, we think that in practice, KOSA is likely to exacerbate the risks of children being harmed online because it will place barriers on their ...
8 months ago Eff.org
Access to Internet Infrastructure is Essential, in Wartime and Peacetime - We've been saying it for 20 years, and it remains true now more than ever: the internet is an essential service. It enables people to build and create communities, shed light on injustices, and acquire vital knowledge that might not otherwise be ...
8 months ago Eff.org
Information-blocking rule in 21st Century Cures Act redefines data exchange in healthcare - A Verato survey offers perspectives on the data management strategies of healthcare executives, highlighting the crucial role of Healthcare Master Data Management in addressing key gaps, facilitating seamless data exchange, and aligning with the ...
11 months ago Helpnetsecurity.com
Criminal IP and Quad9 Collaborate to Exchange Domain and IP Threat Intelligence - Criminal IP, a renowned Cyber Threat Intelligence search engine developed by AI SPERA, has recently signed a technology partnership to exchange threat intelligence data based on domains and potentially on the IP address to protect users by blocking ...
6 months ago Hackread.com
Digital Rights for LGBTQ+ People: 2023 Year in Review - An increase in anti-LGBTQ+ intolerance is impacting individuals and communities both online and offline across the globe. Throughout 2023, several countries sought to pass explicitly anti-LGBTQ+ initiatives restricting freedom of expression and ...
10 months ago Eff.org
Swinfen Charitable Trust, UVA Health, Telemedicine AI, and MITRE Collaborate on Secure Global Health Telemedicine - PRESS RELEASE. McLean, Va., and Bedford, Mass., December 14, 2023 - To further support access to global health services, the Swinfen Charitable Trust, UVA Health, Telemedicine AI, and MITRE announced a new collaboration to enable medical cyber ...
11 months ago Darkreading.com
EFF Urges Supreme Court to Set Standard for How Government Can and Can't Talk to Social Media Sites About Censoring Users' Posts - WASHINGTON, DC-The Supreme Court should clarify standards for determining if the government permissibly advised or convinced social media companies to censor content from 2020 to 2022, or impermissibly coerced or threatened sites in violation of the ...
11 months ago Eff.org
A Startup Allegedly 'Hacked the World.' Then Came the Censorship-and Now the Backlash - Techdirt founder Mike Masnick says that, beyond defeating the censorship of the Appin Technology story, he hopes their public response to that censorship effort will ultimately bring even more attention to the group's past. Neither Appin Training ...
9 months ago Wired.com
Sellafield nuclear site hacked by groups linked to Russia and China - The UK's most hazardous nuclear site, Sellafield, has been hacked into by cyber groups closely linked to Russia and China, the Guardian can reveal. Sources said breaches were first detected as far back as 2015, when experts realised sleeper malware - ...
11 months ago Theguardian.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)