Internet Censorship in Thailand: User Practices and Potential Threats

  title={Internet Censorship in Thailand: User Practices and Potential Threats},
  author={Genevieve Gebhart and Tadayoshi Kohno},
  journal={2017 IEEE European Symposium on Security and Privacy (EuroS\&P)},
  • G. Gebhart, T. Kohno
  • Published 26 April 2017
  • Computer Science
  • 2017 IEEE European Symposium on Security and Privacy (EuroS&P)
The "cat-and-mouse" game of Internet censorship and circumvention cannot be won by capable technology alone. Instead, that technology must be available, comprehensible, and trustworthy to users. However, the field largely focuses only on censors and the technical means to circumvent them. Thailand, with its superlatives in Internet use and government information controls, offers a rich case study for exploring users' assessments of and interactions with censorship. We survey 229 and interview… 

Tables from this paper

Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC

Protozoa is presented, a censorship-resistant tunneling tool featuring both high-performing covert channels and strong traffic analysis resistance that is able to evade state-level censorship in China, Russia, and India.

Understanding Internet Censorship in Europe: The Case of Spain

This work investigates Internet censorship in Spain over 2016-2020, including the controversial 2017 Catalan independence referendum, by investigating network interference disrupting the regular operation of Internet services or contents and indicates the existence of advanced network interference techniques that grow in sophistication over time.

Accessing google scholar under extreme internet censorship: a legal avenue

An insider's view of China's Internet censorship is provided and a novel solution to help Chinese scholars access Google Scholar with high performance, ease of use, and low overhead is deployed.

A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability

This paper examines different reasons the websites may vary in their availability by location: blocking visitors from the EU to avoid GDPR compliance, blocking based upon the visitor's country, and blocking due to security concerns.

Defensive Technology Use by Political Activists During the Sudanese Revolution

It is found that politics and society are driving factors of security and privacy behavior and app adoption and it is observed that the generalization of design recommendations often runs into fundamental tensions between the security and usability needs of different user groups.

On Enforcing the Digital Immunity of a Large Humanitarian Organization

A qualitative analysis of the computer-security challenges of the International Committee of the Red Cross (ICRC), a large humanitarian organization with over sixteen thousand employees, an international legal personality, and over 150 years of experience with armed conflicts and other situations of violence worldwide is conducted.

Decentralized Control: A Case Study of Russia

An in-depth investigation of the mechanisms underlying decentralized information control in Russia shows that large-scale censorship can be achieved in decentralized networks through inexpensive commodity equipment and suggests that data centers block differently from the residential ISPs both in quantity and in method of blocking, resulting in different experiences of the Internet for residential network perspectives and data center perspectives.

Automated Discovery of Internet Censorship by Web Crawling

A new approach for discovering filtered domains in different target countries is presented, fully automated and requires no human interaction, and a dataset mapping the interlinking nature of blocked content between domains is built to exhibit the tightly networked nature of censored web resources.

Censored Planet: An Internet-wide, Longitudinal Censorship Observatory

A new representative censorship metric is introduced and it is shown how time series analysis can be applied to Censored Planet's longitudinal measurements to detect 15 prominent censorship events, two-thirds of which have not been reported previously.

Newton’s Socio-technical Cradle? Web Science, the Weaponisation of Social Media, Hashtag Activism and Thailand's Postcolonial Pendulum

Throughout 2020 and into 2021, set against a global pandemic, Thai emancipatory activism unfolded. This paper offers a postmodernist theoretical discourse about such activism, built around the



Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime

Studies have shown that authoritarian regimes tend to censor the media to limit potential threats to the status quo. While such censorship practices were traditionally aimed at broadcast and print

Internet Censorship in China: Examining User Awareness and Attitudes

The results show that users' demographic backgrounds, Internet usage experience, and personality influence their attitudes toward censorship, and those who score high on authoritarian personality measures tend to support censorship.

Online contribution practices in countries that engage in internet blocking and censorship

People's online contribution practices in contexts in which the government actively blocks access to or censors the Internet are described: self-censorship, cultivating technical savvy, reliance on social ties to relay blocked content, use of already blocked sites for content production as a form of protection and practiced transparency.

When Governments Hack Opponents: A Look at Actors and Technology

An extensive collection of suspicious files and links targeting activists, opposition members, and nongovernmental organizations in the Middle East over the past several years are analyzed, finding that these artifacts reflect efforts to attack targets' devices for the purposes of eavesdropping, stealing information, and/or unmasking anonymous users.

Public Opinion Toward Internet Freedom in Asia: A Survey of Internet Users from 11 Jurisdictions

Introduction: This document summarizes the findings from a survey of Asian Internet users. The purpose of the study is to understand the public opinion toward issues related to Internet freedom in

A Look at the Consequences of Internet Censorship Through an ISP Lens

This work analyzes two large-scale censorship events in Pakistan: blocking of pornographic content in 2011 and of YouTube in 2012 to quantify the demand for blocked content and assess benefits extracted by competing content providers of blocked content.

SoK: Towards Grounding Censorship Circumvention in Empiricism

An extensive examination of real censors is undertaken by surveying prior measurement studies and analyzing field reports and bug tickets from practitioners, identifying areas where evaluations could more faithfully and effectively incorporate the practices of modern censors.

SoK: Making Sense of Censorship Resistance Systems

A comprehensive survey of CRSs-deployed tools as well as those discussed in academic literature-to systematize censorship resistance systems by their threat model and corresponding defenses is conducted.

A Taxonomy of Censors and Anti-Censors Part II: Anti-Censorship Technologies

A taxonomy of their principles and techniques is presented, followed by a discussion of observed trends and implications, and a discussion on the most critical design features to enable a successful and effective system.

Internet Censorship detection: A survey