<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Posts on Psiphon |  Blog</title>
    <link>/posts/</link>
    <description>Psiphon |  Blog (Posts)</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 21 Jun 2022 12:05:00 +0000</lastBuildDate>
    
    <atom:link href="/posts/index.xml" rel="self" type="application/rss+xml" />
    
    
    <item>
      <title>Cybernews Interview, Psiphon: “the world is becoming more and more privacy-conscious”</title>
      <link>/2022/06/21/cybernews-interview-psiphon-the-world-is-becoming-more-and-more-privacy-conscious/</link>
      <pubDate>Tue, 21 Jun 2022 12:05:00 +0000</pubDate>
      
      <guid>/2022/06/21/cybernews-interview-psiphon-the-world-is-becoming-more-and-more-privacy-conscious/</guid>
      <description>&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;Most of us are aware of the necessity of having strong VPN protection in place. But what are the inherent issues with standard VPN applications, and how can they be solved?&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;While choosing the best VPN often comes down to its features, the problem with many of the modern VPN applications concerns easily recognizable traffic in certain Internet environments despite the implemented end-to-end encryption. But what can be done about it?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;To discuss this matter, we’ve reached out to Alexis Gantous, a member of the Business Development and Operations team at Psiphon Inc, a company that works on providing uncensored Internet access for Windows and mobile devices.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;How did the idea of creating Psiphon originate?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;Psiphon was founded out of a research project at the University of Toronto’s Citizen Lab, founder and CEO Michael Hull saw the opportunity to take the original peer-to-peer system and further develop it to fill the needs of millions around the world who face restrictions to their access to information online.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;Can you introduce us to your circumvention system?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;One of the big issues with standard VPN applications is that the traffic, while it’s encrypted, can be very easily recognizable and disrupted in the Internet environments that perform DPI and aggressive filtering of Internet traffic. Psiphon’s state-of-the-art protocols offer multiple creative pathways to obfuscate and connect our users to the content they are seeking online. This, combined with our diverse network of servers placed in over 20 countries around the world, means Psiphon has a robust circumvention network that can much more reliably stand up to interference, as evidenced by tens of millions of citizens around the world turning to Psiphon when facing severe blocking events.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;Tell us more about Psiphon’s vision.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;Any potential user should be able to review our code and ensure that we are providing the service that we claim to. At Psiphon, we are committed to ensuring our user’s privacy and security are maintained to the best of our ability. We do not require users to create accounts or submit any personally identifiable information to use our service. All of our code is open source and over the years we have posted several 3rd party audits of our code, including penetration tests on our blog.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;Do you think the recent global events altered the way the public perceives cybersecurity?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;I do, there is a lot of confusing information out there for people new to the topic of cybersecurity. But with the number of data breaches and hacks that have occurred over the last few years, reports of organized hacking groups on the rise, etc., the public and private sectors are starting to increase the focus on cybersecurity risks and exposure.&lt;br&gt;&lt;i&gt;&lt;br&gt;&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;What would you consider to be the worst Internet habits detrimental to one’s digital privacy and security?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, &amp;quot;Segoe UI&amp;quot;, oxygen-sans, ubuntu, cantarell, &amp;quot;Helvetica Neue&amp;quot;, sans-serif;&#34;&gt;&lt;span style=&#34;&#34;&gt;Password security or lack thereof is number one, important accounts especially with access to personal or banking information should always be protected with strong passwords and multi-factor authentication where possible.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;Protecting one’s Internet connection on public wifi connections is always a big topic as well and the use of Psiphon or a VPN that encrypts your connection can be very helpful. Finally, be wary of unfamiliar or unexpected emails/messages that ask you to click a link or enter passwords/information. These types of scams are on the rise and can be less obvious than you might expect.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;br&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;b style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, &amp;quot;Segoe UI&amp;quot;, oxygen-sans, ubuntu, cantarell, &amp;quot;Helvetica Neue&amp;quot;, sans-serif;&#34;&gt;&lt;i&gt;&lt;span style=&#34;&#34;&gt;What best practices or tools should Internet users adopt instead?&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, &amp;quot;Segoe UI&amp;quot;, oxygen-sans, ubuntu, cantarell, &amp;quot;Helvetica Neue&amp;quot;, sans-serif;&#34;&gt;&lt;span style=&#34;&#34;&gt;Password managers can be a great tool to save you from having to remember many complicated strong passwords, many are free for personal use and ensure that you don’t use the same passwords for everything. Typically they also ensure multi-factor authentication with apps like Authy or Google Authenticator which can be another great step in protecting yourself online.&lt;br&gt;&lt;i&gt;&lt;br&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;With remote work becoming the new normal, what security measures should companies invest in to secure their network?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;As mentioned already, passwords and MFA are important for personal use but should be even more important for businesses, many phishing scams target employees and payroll staff of small companies.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;Make sure that employees have access to a reputable VPN service that publishes and adheres to open source development principles and methods. This will ensure employees have access to important services for work and will help to protect company information and data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;Do you have any predictions for the future of the Internet? What improvements do you hope to see in the next few years?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;It seems much of the world is becoming more and more privacy-conscious. I predict that we will see more legislation following the lead of GDPR and European regulations around privacy and consent-oriented handling of user data.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, Segoe UI, oxygen-sans, ubuntu, cantarell, Helvetica Neue, sans-serif;&#34;&gt;&lt;b&gt;&lt;i&gt;What does the future hold for Psiphon?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&#34;font-family: roboto, -apple-system, blinkmacsystemfont, &amp;quot;Segoe UI&amp;quot;, oxygen-sans, ubuntu, cantarell, &amp;quot;Helvetica Neue&amp;quot;, sans-serif;&#34;&gt;&lt;span style=&#34;&#34;&gt;At Psiphon, we are continually improving and refining our technology, we have some exciting projects in the work including a newly released service called MalAware which, when connecting to our network through a Psiphon app will automatically monitor for any connections coming from malware/adware on your device and notify you if your device has been compromised.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>7ASecurity’s Recent Security Audit of Psiphon’s Code Finds “No Significant Security Flaws”</title>
      <link>/2021/11/02/7asecuritys-recent-security-audit-of-psiphons-code-finds-no-significant-security-flaws/</link>
      <pubDate>Tue, 02 Nov 2021 11:30:00 +0000</pubDate>
      
      <guid>/2021/11/02/7asecuritys-recent-security-audit-of-psiphons-code-finds-no-significant-security-flaws/</guid>
      <description>&lt;p&gt;
As part of our ongoing commitment to achieving the highest standards of transparency and security, Psiphon commissioned &lt;a href=&#34; https://7asecurity.com/&#34;&gt;7ASecurity&lt;/a&gt; to conduct a security review of its code base related to four new Psiphon enhancements.  The resulting report is public and can be found at: &lt;a href=&#34;https://7asecurity.com/reports/pentest-report_psiphon-e.pdf&#34;&gt;https://7asecurity.com/reports/pentest-report_psiphon-e.pdf&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;Using a “white box” approach, meaning the complete source code was available, the security team set out to determine Psiphon’s adherence to secure coding best practices, and to provide safeguard recommendations, where appropriate, based on their findings. The security team used a variety of tools and methods against all Psiphon source code and third party libraries.  Network traffic was also analyzed to identify potential attack vectors, fingerprinting and Psiphon’s behaviour under attack.&amp;nbsp;&lt;/p&gt;&lt;p&gt;The team’s conclusions were that:&amp;nbsp;&lt;/p&gt;&lt;p style=&#34;margin-left: 40px; text-align: left;&#34;&gt;“&lt;i&gt;The Psiphon platform &lt;b&gt;was found to be resilient to a broad range of attack vectors&lt;/b&gt; and provided an overall solid impression.&amp;nbsp;&lt;/i&gt;&lt;/p&gt;&lt;p style=&#34;margin-left: 40px; text-align: left;&#34;&gt;&lt;i&gt;This reflects well on the team behind the solution. 7ASecurity detected only 1 security
vulnerability of low severity. &lt;b&gt;Hence, no significant security flaws could be identified
during this assignment&lt;/b&gt;. The remaining 4 findings were classified as miscellaneous
weaknesses and &lt;b&gt;thus, not considered as vulnerabilities&lt;/b&gt;.&lt;/i&gt;”&lt;/p&gt;&lt;p&gt;Psiphon’s code base is open source, and can be accessed on &lt;a href=&#34;https://github.com/Psiphon-Inc&#34;&gt;GitHub&lt;/a&gt;.  Previous security audits of Psiphon’s code can be found via our &lt;a href=&#34;https://psiphon.ca/psiphon-guide.html#psiphonguide_section3&#34;&gt;website&lt;/a&gt; and on the Psiphon &lt;a href=&#34;https://blog-en.psiphon.ca/&#34;&gt;blog&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;&lt;p&gt;We thank the 7ASecurity team’s efforts and are pleased that Psiphon’s software engineers and source code continue to be so well regarded. 
&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Facebook Disappears from the Internet; Globally, People Assume Censorship</title>
      <link>/2021/10/06/facebook-disappears-from-the-internet-globally-people-assume-censorship/</link>
      <pubDate>Wed, 06 Oct 2021 15:15:00 +0000</pubDate>
      
      <guid>/2021/10/06/facebook-disappears-from-the-internet-globally-people-assume-censorship/</guid>
      <description>&lt;p&gt;&lt;/p&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
    &lt;a href=&#34;/images/Psiphon_DUU_22Sep_05Oct_FB_Outage.png&#34; style=&#34;margin-left: 1em; margin-right: 1em;&#34;&gt;
        &lt;img src=&#34;/images/Psiphon_DUU_22Sep_05Oct_FB_Outage.png&#34; alt=&#34;Post Image&#34;&gt;
    &lt;/a&gt;
&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;h3&gt;&lt;span style=&#34;font-size: x-small;&#34;&gt;Figure 1: People around the world naturally turned to Psiphon in response to the Facebook outage.&lt;br&gt;&lt;/span&gt;&lt;/h3&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: left;&#34;&gt;&amp;nbsp;Summary:&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;ul style=&#34;text-align: left;&#34;&gt;&lt;li&gt;Psiphon’s global usage surged by &lt;b&gt;1.75 Million&lt;/b&gt; daily unique users during the Facebook outage on October 4th, 2021.&lt;br&gt;&lt;/li&gt;&lt;li&gt;The rise was particularly acute in regions where Facebook platforms - including Instagram, WhatsApp, and Facebook itself - experience regular disruptions due to intermittent, but active censorship.&lt;/li&gt;&lt;li&gt;The regions that saw the most significant increases in usage include several countries where major censorship events have occurred within the past few years: Azerbaijan, Cuba, Ethiopia, Indonesia, Iraq, Libya, Mexico, Sudan, and Syria.&lt;/li&gt;&lt;li&gt;Cuba showed a 4.6x increase from baseline usage, from 70,000 to over 300,000 daily unique users, reinforcing Psiphon’s important role in the region. In July 2021, the Psiphon network &lt;a href=&#34;https://www.bloomberg.com/news/articles/2021-07-16/over-1-million-cubans-evade-internet-curbs-with-u-s-backed-tech&#34;&gt;supported a surge of 1.4M users from Cuba&lt;/a&gt; during targeted blocking of social media and messaging platforms, a still-immanent threat from censors.&lt;br&gt;&lt;/li&gt;&lt;li&gt;This demonstrates that Psiphon is a key and trusted global connectivity solution.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;On October 4th, Facebook experienced a significant global outage affecting all of its platforms, including Facebook, Instagram and WhatsApp. The outage, which lasted for at least 6 hours, was &lt;a href=&#34;https://www.nytimes.com/2021/10/04/technology/facebook-down.html&#34;&gt;widely reported&lt;/a&gt; and had a dramatic impact on users of the platform.&lt;/p&gt;&lt;p&gt;In the days that followed, analysis by network monitors like &lt;a href=&#34;https://blog.cloudflare.com/october-2021-facebook-outage/&#34;&gt;Cloudflare&lt;/a&gt; and &lt;a href=&#34;https://www.kentik.com/blog/facebooks-historic-outage-explained/&#34;&gt;Kentik&lt;/a&gt; revealed how Facebook had, functionally, disappeared from the Internet. But for users, the inaccessibility of Facebook platforms evidently resonated with major censorship events that previously targeted these apps and websites. As before, enabling Psiphon followed as a natural response to the failure to access Facebook and its other products.&lt;br&gt;&lt;/p&gt;&lt;p&gt;Psiphon’s global usage surged by over &lt;b&gt;1.75 Million&lt;/b&gt; users during the day of the outage. The growth was particularly acute in regions such as Cuba that have experienced significant, intermittent censorship events, but even in regions experiencing less direct censorship, such as Indonesia, significant growth was also observed.&lt;/p&gt;&lt;p&gt;The population scale uptake is a clear indication of the trust that Psiphon has accrued through its in supporting user connectivity globally. Since online censorship is likewise often opaque and difficult to attribute, the Facebook outage though of a technical in nature was in many ways not readily distinguishable from a blocking event.  Often the last platform standing during censorship events, Psiphon adoption during the outage appears a natural and immediate reaction to presumed filtering.&lt;br&gt;&lt;/p&gt;&lt;p&gt;The visualizations below show the surge in Psiphon daily active users in response to the outage.&lt;/p&gt;&lt;p&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=AZ&#34;&gt;Azerbaijan&lt;/a&gt;: 35,000 users (8x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&#34;&gt;Cuba&lt;/a&gt;: 300,000 users (4.6x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=ET&#34;&gt;Ethiopia&lt;/a&gt;: 45,000 users (1.9x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=ID&#34;&gt;Indonesia&lt;/a&gt;: 250,000 users (1.9x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=IQ&#34;&gt;Iraq&lt;/a&gt;: 210,000 users  (11x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=LY&#34;&gt;Libya&lt;/a&gt;: 22,000 users (1.8x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=MX&#34;&gt;Mexico&lt;/a&gt;: 38,000 users (1.5x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=SD&#34;&gt;Sudan&lt;/a&gt;: 100,000 users (2.4x)&lt;br&gt;&lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;from=now-14d&amp;amp;to=now&amp;amp;var-region=SY&#34;&gt;Syria&lt;/a&gt;: 225,000 users (1.5x)&lt;br&gt;&lt;/p&gt;&lt;p&gt;Please note that the data shown can be accessed through Psiphon’s public data access portal, &lt;a href=&#34;https://psix.ca&#34;&gt;https://psix.ca&lt;/a&gt;.  The Psiphon data portal is part of our full and ongoing commitment to open source software and open data.&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Shutdown in Myanmar: A Fresh Story with Old Challenges</title>
      <link>/2021/07/26/shutdown-in-myanmar-a-fresh-story-with-old-challenges/</link>
      <pubDate>Mon, 26 Jul 2021 15:48:00 +0000</pubDate>
      
      <guid>/2021/07/26/shutdown-in-myanmar-a-fresh-story-with-old-challenges/</guid>
      <description>&lt;h4 style=&#34;text-align: left;&#34;&gt;&lt;span&gt;&amp;nbsp;&lt;span style=&#34;font-size: 12pt; font-weight: 700; white-space: pre-wrap;&#34;&gt;Supporting 5 million users in Myanmar is no small feat&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
  &lt;p style=&#34;text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;/span&gt;&lt;/p&gt;
  &lt;p style=&#34;text-align: left;&#34;&gt;&lt;span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;When the Internet goes dark, so does communication with the rest of the world. We know that many regimes use Internet censorship as a method to suppress public awareness,&amp;nbsp; civil protest, and mobilization, and a shutdown event is often a signal of bad things to come. This means more bad news is lurking around.&amp;nbsp; When the lights of the routers went off in Myanmar, the whole world changed for millions of Burmese... &lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;style&gt;
  html {
    100vw;
  }
    .text_box {
      padding: 2px 6px 4px 6px;
      border: #bfbbbb 3px;
      height: auto;
      width: 100%;
    }
    .text_link {
      text-decoration: underline;
    }
    li {
      list-style: #FFF;
    }
    /* @media screen and (max-width: 500px) {
.text_box {
  float: none;
  position: relative;
  width: 305px;
  height: 225px;
  margin-bottom: 20px;
}} */
&lt;/style&gt;
&lt;hr&gt;
&lt;div class=&#34;text_box&#34;&gt;
    &lt;span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 11pt; font-style: italic; font-variant-east-asian: normal;&#34;&gt;&lt;b&gt;Read more about Psiphon in Myanmar&lt;/b&gt;&lt;span&gt;
      &lt;/span&gt;&lt;li&gt;&lt;a href=&#34;https://www.dw.com/en/the-battle-for-myanmar-plays-out-on-twitter-tiktok-and-telegram/a-57267075&#34; target=&#34;_blank&#34;&gt;&lt;span style=&#34;color: #0000EE;&#34;&gt;The battle for Myanmar plays out on Twitter, TikTok and Telegram&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href=&#34;https://www.voanews.com/east-asia-pacific/more-governments-disrupt-internet-political-control?psiphon_blog&#34; target=&#34;_blank&#34;&gt;&lt;span style=&#34;color: #0000EE;&#34;&gt;More Governments Disrupt Internet for Political Control&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;&lt;/div&gt;
    &lt;hr&gt;
  &lt;div style=&#34;text-align: left;&#34;&gt;
     &lt;span&gt;&lt;span id=&#34;docs-internal-guid-a5678cde-7fff-b433-bd7c-8acf51012638&#34;&gt;
        &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;“Shocked and sheer disbelief” was how a young Burmese&lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; described the situation after the coup in February. “I lost my sense of direction,” and also “my job”. He was not the only person who experienced this level of dislocation:&lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; close to 2 million Burmese&lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-style: italic; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; flocked to the Psiphon network in the span of only a few days&lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;.&amp;nbsp; The number subsequently increased to 5 million in the next couple of months.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
        &lt;br&gt;
        &lt;p style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span id=&#34;docs-internal-guid-81e8b6ec-7fff-164f-c048-fb4f777daa9b&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The graph below shows the number of Psiphon users between late January&amp;nbsp;2021 and late July, 2021.&amp;nbsp; Note the dramatic jumps in user count on Feb 3rd (coinciding with the coup) and on May 2nd, coinciding with the restart of mobile services.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;div&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
     &lt;/span&gt;
  &lt;/span&gt;&lt;/div&gt;&lt;br&gt;
  &lt;img src=&#34;/images/mm_1.png&#34; alt=&#34;Psiphon User Graph&#34;&gt;
&lt;br&gt;
  &lt;div&gt;
     &lt;span&gt;&lt;span&gt;
        &lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;white-space: pre-wrap;&#34;&gt;&lt;i&gt;Both Psiphon and Psiphon pro were the top downloaded apps in Myanmar on May 17th, totalling over 1.7 million downloads (SensorTower.com).&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;white-space: pre-wrap;&#34;&gt;&lt;i&gt;&lt;br&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
        &lt;div&gt;
           &lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span id=&#34;docs-internal-guid-c0c1e699-7fff-b8dc-d16a-d5edc87c5037&#34;&gt;
             &lt;img src=&#34;/images/mm_2.png&#34; alt=&#34;Psiphon User Graph&#34; style=&#34;max-width: 330px;&gt;
           &lt;div class=&#34;separator&#34; style=&#34;clear: both;&#34;&gt;&lt;br&gt;&lt;/div&gt;
        &lt;/div&gt;
     &lt;/span&gt;
  &lt;/span&gt;&lt;/div&gt;
  &lt;span&gt;&lt;span id=&#34;docs-internal-guid-06db53e7-7fff-9d46-1726-31b713fde28e&#34;&gt;
     &lt;h4 style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span style=&#34;font-size: 12pt; font-weight: 700; white-space: pre-wrap;&#34;&gt;The Cost of Restoring access to the International Internet&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;
     &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;
     &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;A network of servers that can absorb such a huge increase in usage needs to have a solid infrastructure and a lot of reserved capacity for when people need access to the international Internet. But, how do these things work when censors block the Internet?&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;b id=&#34;docs-internal-guid-456274a0-7fff-e6d1-d4af-0c9eeef44d88&#34; style=&#34;font-weight: normal;&#34;&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;
     &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Imagine the Internet as roads, and people surfing on the Internet as driving on these lanes. Some roads are local to a city while others can connect you to other parts of the country. Censorship is similar to disallowing traffic on national or local highways. It can be done in various ways from enforcing&lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; slow speeds to removing road signs on how to leave the city.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;b style=&#34;font-weight: normal;&#34;&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;
     &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;That is when anti-censorship tools like Psiphon come into play and unblock the roads. Psiphon uses different tactics to connect people to the international Internet.&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;b style=&#34;font-weight: normal;&#34;&gt;&lt;br&gt;&lt;/b&gt;&lt;/p&gt;
     &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The Psiphon Network operates nine distinct protocols that connect people and deliver the censored content. These protocols, when run in the Psiphon Network proper, &lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;help distribute network load and ease congestion when people access the International Internet, which means a faster connection and a more reliable experience. &lt;/span&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;/p&gt;
     &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The flexibility that these custom Internet Freedom protocols&amp;nbsp;give services like Psiphon, makes answering people’s calls in Myanmar, Belarus or Azerbaijan possible when Internet access is limited, but it comes at a real cost; every byte that traverses the Psiphon Network is crossing a series of commercial networks, and each charge their own price for the servers and network infrastructure. &lt;/span&gt;&lt;/p&gt;
  &lt;/span&gt;
  &lt;span&gt;
     &lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;
  &lt;/span&gt;
  &lt;/span&gt;&lt;span id=&#34;docs-internal-guid-bd70e515-7fff-bdd7-c355-f222c78bad55&#34;&gt;&lt;span&gt;
     &lt;/span&gt;&lt;h3 style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Balancing need and costs&lt;/span&gt;&lt;/h3&gt;
     &lt;p style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Making sure the network is ready to support millions of users, whenever it’s needed, remains one of the biggest challenges for the Internet Freedom community in their fight against censorship all over the world.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;b id=&#34;docs-internal-guid-0e28caea-7fff-6c47-eeac-601f974905e0&#34; style=&#34;font-weight: normal;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;As would be the case for any other freely accessible service provider, Psiphon cannot sustain the types of population scale surges seen in Myanmar indefinitely, nor support a number of these surges occurring simultaneously. This is truly unfortunate, since it could mean the loss of many people’s last hopes to access the open Internet, just when they need it most.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;
     &lt;p style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-size: 12pt; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;After all, while Internet freedom is a fundamental human right, it is definitely not free.&lt;/span&gt;&lt;/p&gt;
     &lt;span&gt;&lt;br&gt;
     &lt;/span&gt;&lt;h3 style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Get Involved&lt;/span&gt;&lt;/h3&gt;
     &lt;div style=&#34;text-align: left;&#34;&gt;
        &lt;span id=&#34;docs-internal-guid-8e05979a-7fff-b8ec-7b07-8e234de1d826&#34;&gt;&lt;span&gt;
           &lt;/span&gt;&lt;p style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;background-color: transparent; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/p&gt;
           &lt;p style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt; text-align: left;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Internet freedom is a right for all, but only a few of us have the means to support people in regions practicing censorship to access the open internet. Be one of them.&lt;/span&gt;&lt;/p&gt;
           &lt;span&gt;&lt;br&gt;
           &lt;/span&gt;&lt;p dir=&#34;ltr&#34; style=&#34;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span face=&#34;Montserrat, sans-serif&#34; style=&#34;font-size: 12pt; font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;What can you do? Raise awareness by talking about the internet situation in Myanmar, and invite others to talk about it on social media with your friends and people who care about freedom of information. You can also directly &lt;a href=&#34;https://psiphon.ca/donate.html&#34;&gt;support&lt;/a&gt; tools like Psiphon that help people in need. Subscribe to Psiphon if you are not in Myanmar. Showing your support for everyone who has been denied their right to access information on the internet will mean a lot to them, and it means a lot to the people who do their best to bring light into the darkness of censorship.&lt;/span&gt;&lt;/p&gt;
        &lt;/span&gt;
     &lt;/div&gt;
  &lt;/span&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Amid major network disruptions, 1.76M Psiphon users in Belarus</title>
      <link>/2020/08/20/amid-major-network-disruptions-1.76m-psiphon-users-in-belarus/</link>
      <pubDate>Thu, 20 Aug 2020 15:00:00 +0000</pubDate>
      
      <guid>/2020/08/20/amid-major-network-disruptions-1.76m-psiphon-users-in-belarus/</guid>
      <description>&lt;p&gt;&lt;/p&gt;&lt;h3 style=&#34;text-align: left;&#34;&gt;&lt;i&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-weight: normal;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;The Psiphon network supported a peak &lt;b&gt;1.76 million&lt;/b&gt; daily active users during significant network interference that started August 9th, a figure that represents nearly 1 in every 3 internet users.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;
 &lt;img src=&#34;/images/UU-BY_1.png&#34; alt=&#34;Psiphon User Graph&#34;&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both;&#34;&gt;&lt;br&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both;&#34;&gt;A &lt;a href=&#34;https://meduza.io/en/feature/2020/08/12/bye-bye-bynet&#34;&gt;large-scale disruption&lt;/a&gt; to international internet access was observed in Belarus, beginning during the contested presidential election on August 9th. Widespread filtering was reported across all Belarusian networks, affecting popular messaging apps including Telegram, Viber, and WhatsApp; social media platforms Facebook, Twitter, Instagram, and Youtube; major app markets including Google Play and the App Store; email providers Gmail, Mail.ru, and Yandex; maps, banking, online media, and many other services. Rolling blackouts of the mobile networks also occurred nightly between 6PM and 6AM. The majority of VPNs were reportedly blocked as a result of generalized SSL/TLS filtering. Tor &lt;a href=&#34;https://metrics.torproject.org/userstats-relay-country.html?start=2020-08-01&amp;amp;end=2020-08-17&amp;amp;country=by&amp;amp;events=on&#34;&gt;direct connections&lt;/a&gt; were disrupted by the increased network change, while Tor &lt;a href=&#34;https://metrics.torproject.org/userstats-bridge-combined.html?start=2020-08-01&amp;amp;end=2020-08-18&amp;amp;country=by&#34;&gt;bridge users&lt;/a&gt; reached a peak 8,000 per day during the shutdown period. Network outages were tracked by &lt;a href=&#34;https://labs.ripe.net/Members/alun_davies/our-first-glance-at-the-belarus-outages&#34;&gt;RIPE&lt;/a&gt; Labs, &lt;a href=&#34;https://map.internetintel.oracle.com/?root=traffic&amp;amp;country=false&amp;amp;asn=25106&#34;&gt;Oracle&lt;/a&gt; Internet Intelligence, &lt;a href=&#34;https://ioda.caida.org/ioda/dashboard#view=inspect&amp;amp;entity=country/BY&amp;amp;lastView=overview&amp;amp;from=1596903075&amp;amp;until=1597767075&#34;&gt;IODA&lt;/a&gt;, and other network monitors.&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both;&#34;&gt;&lt;br&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;img src=&#34;/images/UU-BY_2.png&#34; alt=&#34;Psiphon User Graph&#34;&gt;
&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&#34;text-align: center;&#34;&gt;&lt;span style=&#34;font-size: small;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&amp;nbsp;&lt;/span&gt;&lt;span id=&#34;docs-internal-guid-28463e0a-7fff-55f1-bc5c-8fcd9b9b80bc&#34; style=&#34;background-color: transparent; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Traceroute completions on main mobile operator MTS Belarus&lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-style: italic; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; (AS&lt;a href=&#34;https://bgp.he.net/AS25106#_graph4&#34;&gt;25106&lt;/a&gt;) showed clear outages through 60280 and 6697&lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;(source: &lt;a href=&#34;https://map.internetintel.oracle.com/?root=traffic&amp;amp;country=false&amp;amp;asn=25106&#34;&gt;Oracle&lt;/a&gt;)&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: center;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-style: normal; font-variant: normal; font-weight: 700; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;As a backdrop to the network disruptions, Belarus had entered its largest mass demonstrations in history.&lt;p dir=&#34;ltr&#34; id=&#34;docs-internal-guid-31799abb-7fff-55bd-3d92-2d41e07526d4&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: helvetica; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&#34;ltr&#34; id=&#34;docs-internal-guid-31799abb-7fff-55bd-3d92-2d41e07526d4&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: helvetica; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;Journalists reported difficulty freely accessing and reporting information from the country, and&amp;nbsp; &lt;a href=&#34;https://twitter.com/franakviacorka/status/1292340194750889984&#34;&gt;recommended&lt;/a&gt; Psiphon. Internet users noted Psiphon was one of the few tools able to bypass . Even with the attempted blocking of the app stores and Psiphon sites, users acquired the software via alternate distribution channels, such as email responder and&amp;nbsp; proxy. Additionally, Belarusian users distributed Psiphon binaries via Telegram channels, hosted URLs, and even on &lt;a href=&#34;https://www.newyorker.com/news/our-columnists/after-a-rigged-election-belarus-crushes-protests-amid-an-information-blackout&#34;&gt;USB&lt;/a&gt;. Use of the Psiphon network surged to a peak 1.76 million daily active users; given a population of 9.5 million and internet penetration rate of 60%, a figure that represents 30% of internet users in Belarus. Total bandwidth transferred from Belarus via Psiphon between Aug 9-17 exceeded 2 Petabytes. Circumvention tools proved a vital infrastructure to freely access information, as well as basic communications and services.&lt;p dir=&#34;ltr&#34; id=&#34;docs-internal-guid-31799abb-7fff-55bd-3d92-2d41e07526d4&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span style=&#34;font-family: helvetica; font-size: medium;&#34;&gt;&lt;span style=&#34;white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;Internet users, researchers, and international observers were able to utilize the Psiphon Data Engine metrics portal (available at &lt;a href=&#34;https://psix.ca/d/nyi8gE6Zk/regional-overview?orgId=2&amp;amp;var-region=BY&#34;&gt;psix.ca&lt;/a&gt;) to monitor blocking, network performance, and corresponding circumvention usage. Some sources &lt;a href=&#34;https://ca.finance.yahoo.com/news/vpn-usage-surges-belarus-remains-202645286.html&#34;&gt;noted&lt;/a&gt; during the shutdown period, the volume of Psiphon use in Belarus had surpassed even that of Iran.&lt;p dir=&#34;ltr&#34; id=&#34;docs-internal-guid-31799abb-7fff-55bd-3d92-2d41e07526d4&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p dir=&#34;ltr&#34; id=&#34;docs-internal-guid-31799abb-7fff-55bd-3d92-2d41e07526d4&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;
&lt;img src=&#34;/images/UU-BY_3.png&#34; alt=&#34;Psiphon User Graph&#34;&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: center;&#34;&gt;&lt;span style=&#34;font-size: small;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;i&gt;From the Psiphon Data Engine (PDE) public dashboard&lt;/i&gt; &lt;b&gt;(&lt;a href=&#34;https://psix.ca/&#34;&gt;https://psix.ca/&lt;/a&gt;)&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;Network observers such as the Internet Protection Society and others detected that &lt;a href=&#34;https://www.svoboda.org/a/30777908.html&#34;&gt;deep packet inspection&lt;/a&gt; (DPI) technology was being used to block SSL causing significant traffic issues. NetBlocks also noted &lt;a href=&#34;https://netblocks.org/reports/internet-disruption-hits-belarus-on-election-day-YAE2jKB3&#34;&gt;keyword filtering&lt;/a&gt; appeared to target at least 10,000 URLs. Prague-based &lt;a href=&#34;https://blog.qrator.net/en/what-happening-BY_86/&#34;&gt;Qrator Labs saw&lt;/a&gt; the concurrent outage of 80% of IPv6 prefixes within Belarus, and inferred that filtering of downstream autonomous systems (AS) was taking place at the level of two upstream ASes that dominate international transit, AS6697 and AS60280. Official releases by the &lt;a href=&#34;https://cert.by/?p=1722&#34;&gt;National Center for Response to Computer Incidents&lt;/a&gt;, the &lt;a href=&#34;https://ncot.by/ru/news/news/o-vosstanovlenii-raboty-seti-internet/&#34;&gt;National Traffic Exchange Center&lt;/a&gt;, and &lt;a href=&#34;https://beltelecom.by/news/main/vnimaniyu-abonentov-3&#34;&gt;Beltelecom&lt;/a&gt; all stated the disruptions were the result of external cyberattacks and equipment failures. &lt;br&gt;&lt;br&gt;Psiphon network performance and session quality remained at or above the regional average over the days of the shutdown. While the generalized disruption of SSL at the transport layer disrupted the core functionality of many VPNs, the traffic obfuscation and multiprotocol structure used by Psiphon provides greater resilience to protocol-based blocking, with network traffic able to adapt dynamically to the very restrictive new filtering scheme.&lt;br&gt;&lt;p&gt;&lt;/p&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;img src=&#34;/images/UU-BY_4.png&#34; alt=&#34;Psiphon User Graph&#34;&gt;
&lt;/div&gt;&lt;/span&gt;&lt;div style=&#34;text-align: center;&#34;&gt;&lt;div style=&#34;text-align: center;&#34;&gt;&lt;span&gt;&lt;i&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;span style=&#34;font-size: small;&#34;&gt;Bytes per hour, Belarus. A peak 55 Terabytes / h were transferred via the Psiphon network.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;A key observation by Qrator Labs is the high level of centralization of control over Belarusian networks. DPI equipment installed at the point of international gateways allows the upstream operators to disconnect or pass filtering rules to downstream ISPs. Researchers documented a &lt;a href=&#34;https://arxiv.org/abs/1911.07723&#34;&gt;similar network topology in Iranian ASes&lt;/a&gt; last year. In November 2019, &lt;a href=&#34;https://blogs.oracle.com/cloudsecurity/historic-internet-blackout-in-iran-v2&#34;&gt;Iran executed an extensive disconnection&lt;/a&gt; of international internet connectivity that lasted for 10 days.&lt;br&gt;&lt;br&gt;Indeed, the current generation of DPI filtering technologies can be leveraged at various forms of encrypted internet traffic, increasingly deployed at national scale and at capacities approaching 1TBit/s. In these circumstances access to resilient circumvention infrastructures such as Psiphon remains crucial to the free exchange of information.&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;br&gt;&amp;nbsp;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&amp;nbsp;&lt;/span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;span style=&#34;background-color: transparent; color: black; font-family: Arial; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style=&#34;font-size: medium;&#34;&gt;&lt;span style=&#34;font-family: helvetica;&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>بلاگ فارسی</title>
      <link>/2018/12/13/%D8%A8%D9%84%D8%A7%DA%AF-%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/</link>
      <pubDate>Thu, 13 Dec 2018 17:15:00 +0000</pubDate>
      
      <guid>/2018/12/13/%D8%A8%D9%84%D8%A7%DA%AF-%D9%81%D8%A7%D8%B1%D8%B3%DB%8C/</guid>
      <description>&lt;div style=&#34;text-align: right;&#34; dir=&#34;rtl&#34;&gt;
    &lt;p&gt;
        شبکه‌های اجتماعی سایفون به زبان فارسی هم راه‌اندازی می‌شود. ما به تلاش برای فراهم کردن ارتباط مطمئن و موثر در ایران افتخار می‌کنیم و به دنبال بهبود ظرفیت کمک و بهتر‌کردن تجربه‌ کاربران در ایران هستیم. شبکه‌های اجتماعی فارسی زبان سایفون مسیر‌های ارتباطی جدیدی را برای دریافت نظرات کاربران ایرانی باز می‌کند.
    &lt;/p&gt;
    &lt;p&gt;
        برای ارتباط با ما &lt;a href=&#34;https://twitter.com/Psiphon_Fa&#34;&gt;حساب فارسی سایفون در توییتر&lt;/a&gt;، &lt;a href=&#34;http://bit.ly/psiphonFB&#34;&gt;صفحه فیس‌بوک&lt;/a&gt; و &lt;a href=&#34;https://www.instagram.com/psiphon_fa/&#34;&gt;اینستاگرام&lt;/a&gt; سایفون را دنبال کنید.
    &lt;/p&gt;
&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Join us in Persian</title>
      <link>/2018/12/13/join-us-in-persian/</link>
      <pubDate>Thu, 13 Dec 2018 17:03:00 +0000</pubDate>
      
      <guid>/2018/12/13/join-us-in-persian/</guid>
      <description>&lt;p&gt;&lt;span&gt;&lt;br&gt;
&lt;br&gt;
Psiphon is pleased to announce the launch of its Persian language social media! We are proud to provide reliable and efficient connectivity in Iran, and have expanded our capacity to help improve user experience. These channels will open new avenues of communication and streamline the feedback process for Persian users around the world.&lt;br&gt;&lt;br&gt;
We invite you to connect with us to receive updates about Psiphon, or to get in touch with our Persian language team! Find us on &lt;a href=&#34;https://twitter.com/Psiphon_Fa&#34;&gt;Twitter&lt;/a&gt;, &lt;a href=&#34;http://bit.ly/psiphonFB&#34;&gt;Facebook&lt;/a&gt; and &lt;a href=&#34;https://www.instagram.com/psiphon_fa/&#34;&gt;Instagram&lt;/a&gt;.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div style=&#34;text-align: right;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;/p&gt;
&lt;div style=&#34;text-align: right;&#34;&gt;
&lt;div style=&#34;text-align: right;&#34;&gt;&lt;span&gt;
شبکه‌های اجتماعی سایفون به زبان فارسی هم راه‌اندازی می‌شود. ما به تلاش برای فراهم کردن ارتباط مطمئن و موثر در ایران افتخار می‌کنیم و به دنبال بهبود ظرفیت کمک و بهتر‌کردن تجربه‌ کاربران در ایران هستیم. شبکه‌های اجتماعی&lt;br&gt;
&lt;br&gt;
.فارسی زبان سایفون مسیر‌های ارتباطی جدیدی را برای دریافت نظرات کاربران ایرانی باز می‌کند&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&#34;text-align: right;&#34;&gt;&lt;span&gt;
.برای ارتباط با ما&amp;nbsp;&lt;a href=&#34;https://twitter.com/Psiphon_Fa&#34;&gt;حساب فارسی سایفون در توییتر&lt;/a&gt;،&amp;nbsp;&lt;a href=&#34;http://bit.ly/psiphonFB&#34;&gt;صفحه فیس‌بوک&lt;/a&gt;&amp;nbsp;و&amp;nbsp;&lt;a href=&#34;https://www.instagram.com/psiphon_fa/&#34;&gt;اینستاگرام&lt;/a&gt;&amp;nbsp;سایفون&amp;nbsp;را دنبال کنید&lt;/span&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Wickr Secure Open Access</title>
      <link>/2018/09/07/wickr-secure-open-access/</link>
      <pubDate>Fri, 07 Sep 2018 14:51:00 +0000</pubDate>
      
      <guid>/2018/09/07/wickr-secure-open-access/</guid>
      <description>&lt;style&gt;
  body {
  word-wrap: break-word; /* Ensure long words break onto the next line */
}

div[style] {
  max-width: 100%; /* Constrain divs to viewport width */
  overflow-x: auto; /* Allow horizontal scrolling if necessary */
}

img {
  max-width: 100%; /* Make images responsive */
  height: auto;
}
span {
  white-space: normal; /* Prevent content overflow */
  line-height: inherit; /* Use parent&#39;s line height */
}
article {
  max-width: 100%;
  margin: 0 auto;
  overflow: hidden;
}

&lt;/style&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
Psiphon is proud to announce an exciting new partnership. Over the last few months we have been working with Wickr to create a new feature for their secure messaging platforms:&lt;/div&gt;
&lt;br&gt;
&lt;b&gt;Wickr: Secure Open Access. &lt;/b&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
With this feature Wickr and Psiphon have made it possible for teams and enterprises in any part of the world — US, Europe, Asia or Latin America — to have reliable end-to-end encrypted messaging, calling, file and screen sharing with no interruptions in service. No other secure communications platform enables unfettered connection anywhere in the world this way.&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
Wickr, already well established in the secure messaging environment with their versatile platform, recognized that as organizations are increasingly global, there can be both security as well as accessibility concerns when trying to ensure secure communication for people all around the globe. &lt;br&gt;&lt;br&gt;Wickr believes their end users shouldn’t have to worry about being able to connect to their colleagues, friend or family - no matter where they are, and Psiphon agrees. &lt;br&gt;&lt;br&gt;
By integrating Psiphon&#39;s sophisticated network protocols into their new feature, Wickr will allow their end users to seamlessly protect their traffic and send it over the Psiphon network, ensuring they always stay connected no matter where they are.
&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;font-family: arial;&#34;&gt;&lt;span style=&#34;white-space: pre;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&#34;font-family: arial;&#34;&gt;&lt;span style=&#34;white-space: pre;&#34;&gt;You can read more about our new partnership &lt;a href=&#34;https://www.theverge.com/2018/8/23/17770384/wickr-psiphon-partnership-internet-censorship&#34;&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>The New Normal for the Iranian People: Population-scale Response to State-Level Communication Disruption</title>
      <link>/2018/05/15/the-new-normal-for-the-iranian-people-population-scale-response-to-state-level-communication-disruption/</link>
      <pubDate>Tue, 15 May 2018 17:22:00 +0000</pubDate>
      
      <guid>/2018/05/15/the-new-normal-for-the-iranian-people-population-scale-response-to-state-level-communication-disruption/</guid>
      <description>&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;/div&gt;&lt;span&gt;In December 2017-January 2018, protests erupted throughout Iran, calling for change in the country. Unlike the protests of 2009, known as the Green Revolution, this civil unrest involved many Iranians that previously were unaffiliated with any political opposition movement. In response, the Iranian government enacted blocks on Telegram and Instagram in the country. To gain access to these applications and circumvent censorship, Iranian users flooded to tools like Psiphon. In order to shed light on these protests and the resulting surge in users, Psiphon has collected and analyzed network data from before, during and after the protests. This data has been combined with an understanding of the political, social and economic situation in Iran for a deeper look at how Internet connectivity and freedom impacts Iranian society as a whole. Ultimately, this blocking event has proven the importance of the Internet and access in Iran and highlighted the growing technical abilities and scope of the Iranian censorship regime.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;Key Observations&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;b&gt;&lt;br&gt;&lt;/b&gt;
On December 28, 2017, protests broke out in the northeastern city of Mashhad; smaller protests also occured in the nearby cities of Neyshabour and Kashmar. Initially calling for solutions to economic grievances, protests eventually covered social issues such as corruption, the presidency of Hassan Rouhani and Iran’s involvement in foreign conflicts. Some protestors even directly criticized Supreme Leader Ali Khamenei. Over the following days, the movement spread across Iran, with protests in nearly every single province. Protests occurred in many smaller cities and included many Iranians not officially or previously affiliated with any organized opposition group. Additionally, protests occurred daily in the capital of Tehran until January 9, 2018.&lt;br&gt;&lt;br&gt;
In response to the nationwide demonstrations, the Iranian government and the Islamic Revolutionary Guard Corps (IRGC) responded with force, both physically and virtually. However, due to the fact that this was a largely rural movement, it is possible that IRGC forces found it harder to physically limit the protests and the Iranian government turned to Internet and application blockages to quell the movement. Still, a number of protesters were arrested and, in some cities, tear gas, water cannons and other tactics were used to break up demonstrations.&lt;sup&gt;12&lt;/sup&gt; Three days into the protests, on December 31, the Iranian government blocked access to both Telegram and Instagram, the country’s most popular messaging and social media platforms, respectively. Thanks to Psiphon and other censorship circumvention technologies, Iranians were able to connect and maintain information sharing across these sites.&lt;br&gt;
&lt;span id=&#34;docs-internal-guid-4dabfa74-6598-f483-c193-9458df6de8fb&#34;&gt;&lt;/span&gt;&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;Reasons behind the protests&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;b&gt;&lt;u&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;div style=&#34;text-align: left;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;306&#34; data-original-width=&#34;525&#34; height=&#34;234&#34; src=&#34;/images/iran_white_paper_1.png&#34; width=&#34;400&#34;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;span&gt;Despite some of the optimism stemming from easing of economic sanctions, Iranians were overburdened by economic hardship in 2017. Though Iran’s oil and gas industry has grown considerably in the last year, with production rising 62%, economic relief has not as quickly expanded to other sectors of the economy, which has only seen a growth of about 3.3%.&lt;sup&gt;3&lt;/sup&gt; Unemployment rose from 12.4% to 12.6% from January to July 2017 and continues to hover around 12%.&lt;sup&gt;4&lt;/sup&gt;&lt;br&gt;
&lt;br&gt;In a survey of Iranian activists conducted by the link-sharing platform Balatarin, individuals indicated that economic issues and corruption were the leading causes behind the protests. In addition, rising inflation and the cost of living proved to be the most significant priority for Iranian families, followed by citizens’ rights. These concerns were reflected in the calls of protesters: &#34;If embezzlement decreases, then our problems will be solved!”, &#34;Come out fellow countrymen, scream and shout for your rights!&#34;, and “The youth are unemployed [while] the mullahs sit behind a desk!”&lt;sup&gt;5.&amp;nbsp;&lt;/sup&gt;&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;span id=&#34;docs-internal-guid-9cf137d3-659c-bf78-0bd7-d7d85fcfc1ae&#34; style=&#34;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&#34;&gt;&lt;/span&gt;&lt;span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;349&#34; data-original-width=&#34;503&#34; height=&#34;278&#34; src=&#34;/images/iran_white_paper2.png&#34; width=&#34;400&#34;&gt;&lt;/div&gt;&lt;br&gt;&lt;br&gt;
In early December, President Rouhani released his version of the budget, promising alleviation of economic pressures, including rising employment and inflation. This relatively conservative budget went to the Majlis for approval on December 14. During the month of December, a substantial increase in social media usage by Iranians was seen on the Psiphon network leading up to the protests. On December 19, usage tripled, from an average of 2 terabytes (TB) to 6TB. On December 30, usage tripled again, hitting 18TB. It is possible that this build up was indicative of the unrest to come, as more Iranians moved to social media to express their grievances, before ultimately taking to the streets.&lt;br&gt;
&lt;br&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;321&#34; data-original-width=&#34;712&#34; height=&#34;288&#34; src=&#34;/images/iran_white_paper3.png&#34; width=&#34;640&#34;&gt;&lt;br&gt;
&lt;b&gt;&lt;br&gt;&lt;/b&gt;
&lt;b&gt;&lt;u&gt;The censorship regime in Iran&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
Censorship of online content inside Iran is institutionalized at the highest levels of government. In March 2012, Iran’s Supreme Leader, Ayatollah Ali Khamenei, authorized the creation of the Supreme Council of Cyberspace (SCC), which is comprised of 17 members from various government institutions plus an additional 10 members appointed by Khamenei himself. It has become the central agency for implementing and upholding policies pertaining to the censorship of online content inside Iran.&lt;sup&gt;7&lt;/sup&gt; At its inception, Khamenei asked then-President Ahmadinejad to chair the Council&lt;sup&gt;8&lt;/sup&gt;, though 2015 reforms resulted in the transfer of authority to the Supreme Leader&lt;sup&gt;9&lt;/sup&gt; and the consolidation of decision-making authorities of the pre-existing High Council of Informatics, Supreme Council of Information, and Supreme National Security Council of Information Exchange (AFTA) under the sole jurisdiction of the SCC.&lt;sup&gt;10&lt;/sup&gt;&lt;br&gt;
&lt;br&gt;
All Iranian internet service providers (ISPs) function under the jurisdiction of the Communication Regulatory Authority of Iran (CRA), which is responsible for telecommunications licensing and enforces censorship policies outlined by the the Committee for Determining Offensive Contents under the powers of the executive. It oversees the implementation the technical censorship policies that support the initiatives of the SCC. Such actions include:&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;span style=&#34;color: black;&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;419&#34; data-original-width=&#34;497&#34; height=&#34;304&#34; src=&#34;/images/iran_white_paper4.png&#34; width=&#34;360&#34;&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;
&lt;/span&gt;&lt;li&gt;&lt;span&gt;The limitation of private home user bandwidth to 128 kilobytes per second (kb/s).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The redirection of Domain Name Service (DNS) queries, causing certain DNS requests to respond with fake local IP addresses that act as black holes to drop traffic intended for blocked domains.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The inspection of internet packet headers and URLs for keywords that may lead to sites with content that may feasibly be deemed immoral or could cause political or economic turmoil, and the manipulation of such traffic.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Especially during periods of political and economic unrest, ISPs will limit speed (aka throttle), either to specific sites or internet communication protocols, or all traffic.&lt;sup&gt;11&lt;/sup&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;The government counterfeiting of web certificates to popular sites in order to conduct man-in-the-middle attacks.&lt;sup&gt;12&lt;/sup&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span&gt;
Traditional censorship practices have already been installed throughout the Iranian network. Website owners are required to register with the Ministry of Culture and Islamic Guidance or risk being blocked.&amp;nbsp; Website owners and private citizens that post potentially inflammatory content receive official removal requests. The Iranian Revolutionary Guard Corps routinely arrests Telegram channel administrators to coerce them into removing content or delete channels entirely. News sites are sent warnings about how they should report on controversial topics, such as the Nuclear Deal. All of these practices lead to significant self-censorship in order to avoid arrest.&lt;sup&gt;13&lt;/sup&gt; And censorship capabilities have become more pervasive in recent year, as the CRA has implemented policies to diversify and expand telecommunications networks throughout Iran.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;Censors’ response to the protests&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;span id=&#34;docs-internal-guid-52349ca3-659e-57dc-1c14-c451bc73478c&#34;&gt;&lt;/span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&#34;color: black;&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;148&#34; data-original-width=&#34;350&#34; src=&#34;/images/iran_white_paper5.png&#34; width=&#34;320&#34;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;br&gt;
&lt;/span&gt;&lt;span&gt;On December 30, Iran’s Minister of Information and Communications Technology Mohammad-Javad Azari Jahromi tweeted a request for the removal of @amadnews, a Telegram channel, to Telegram founder Pavel Durov. Telegram complied, removing the channel for its use of violent language. It is important to note that Twitter is a blocked platform in Iran, though Jahromi has requested that Twitter be made available to all Iranians. It is not uncommon for Iranian officials to use this banned social media platform, however it is particularly interesting that, in this case, it was used to publicly communicate removal requests for content on a popular application that has been heavily monitored, though still permitted, by the government. Telegram refused to comply with further content removal requests, explaining that the channels were, in fact, merely using the platform for peaceful protest. Because of this, the Iranian government directed Iranian ISPs to block traffic to the Telegram app and web interface on December 31.&lt;sup&gt;14&lt;/sup&gt; On the same day, Instagram, a popular picture and video sharing application, was also blocked. The block on Instagram lasted until January 6, while the Telegram block lasted until January 13.&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;img border=&#34;0&#34; data-original-height=&#34;320&#34; data-original-width=&#34;556&#34; height=&#34;368&#34; src=&#34;/images/iran_white_paper6.png&#34; width=&#34;640&#34;&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;
During this time, Iranians continued to protests and access these platforms and others through circumvention software. This is evidenced by both continued, and even increased, engagement on both platforms. Though a brief drop in usage occurred initially, data shows that the number of posts and views on Telegram in Iran quickly returned to the about the same levels as before the blocking event. On Instagram, users flocked to Persian language news and media accounts. BBC Persian continued to call for videos and photos of the protests through its Instagram account and Telegram channel, despite both platforms being blocked by the government. In fact, BBC Persian’s Instagram following grew by about 200,000 in less than two weeks; one week of which Instagram was blocked in Iran. It had previously taken the account about nine months to gain that same amount of followers. A similar phenomenon occurred on the Instagram accounts of Radio Farda and Voice of America-Persian News Network (VOA-PNN).&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;span&gt;&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;Iranian user behavior and analytics&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;span&gt;Psiphon has worked to offer users multiple ways of using our software, whether for mobile or desktop use. There are three major platforms through which one can download Psiphon: Google Play store, the Apple App Store, and through email auto-responders. On January 1, downloads peaked with:&lt;br&gt;
&lt;/span&gt;&lt;ul&gt;
&lt;li&gt;&lt;span&gt;766,235 via Google Play&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;458,768 via the App Store&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;82,280 via auto-responders&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span&gt;
Psiphon has dedicated email auto-responders for specific clients. On December 31, BBC Persian took to Instagram and posted a warning to all Persian speaking followers, instructing them on how to download Psiphon via their email auto-responder. On that day, BBC Persian, normally responsible for about 60 Psiphon downloads per day, was responsible for 60,695 Psiphon downloads. This is just one example of the many important relationships that are required to ensure internet access to people all over the world.&lt;br&gt;
&lt;br&gt;
Google Play showed Psiphon as the most downloaded app in Iran during the protest, with competing tools rising and falling in the rankings as they proved ineffective for users. Applications for other circumvention tools, like VPNs and Lantern, a peer-to-peer software used for censorship bypass, rose and fell on the charts as users found that connections made through these apps were unreliable or slow, as expressed on Twitter. Psiphon remained the number one app in Iran on Google Play for over two weeks. Not only did Psiphon see a consistent increase in users, but this increase was at a much larger scale than other tools. Tor analytics showed a similar trend of increased use, with a spike during the protests. However, this increase peaked at just under 12,500 daily connections, while Psiphon’s network supported 287,925,106 connections on January 2 alone.&lt;sup&gt;15&lt;/sup&gt;&lt;br&gt;
&lt;br&gt;
Not only were new users downloading the app, but network analytics show that they were actively using it. Over the course of the protests, Psiphon added 22.2 million new users to the network. Data transfer during the protest period hit 61 megabytes (MB) per user per day at its lowest point. Emergency network scaling allowed for the Psiphon network to transfer and average of 124MB per user per day. As a point of reference, if an American paying $35 per month for a 2 gigabyte (GB) monthly plan through Verizon were to spread their data usage out equally throughout the month, they would be able to use a maximum of 66MB per day. Additionally, the global average mobile data plan is 4GB monthly, translating to 133 MB per day. During the entire protest period, our network transferred 19.54 petabytes (PB), equivalent to the amount of data processed by Google all over the world each day. Psiphon saw a peak data transfer on January 9 of of 1.445PB, which is equal to the same data as all of the 10 billion photos on Facebook.&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;509&#34; data-original-width=&#34;819&#34; height=&#34;398&#34; src=&#34;/images/iran_white_paper7.png&#34; width=&#34;640&#34;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span&gt;&lt;br&gt;
&lt;br&gt;
All in all, a massive amount of data was transferred over the Psiphon network in response to the protests and blocking. The success and scalability of the Psiphon network during peak blocking periods can be credited to its heterogeneous infrastructure, varied partnerships, and significant focus on innovative research and development. By incorporating circumvention protocols such as Refraction Networking and MEEK, Psiphon’s network had become more redundant, resilient, and has increased its surge capacity.&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;
&lt;span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;img border=&#34;0&#34; data-original-height=&#34;511&#34; data-original-width=&#34;824&#34; height=&#34;396&#34; src=&#34;/images/iran_white_paper8.png&#34; width=&#34;640&#34;&gt;&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;&lt;br&gt;&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;div&gt;&lt;span&gt;&lt;b&gt;&lt;u&gt;Psiphon’s “new normal” in Iran&lt;/u&gt;&lt;/b&gt;&lt;br&gt;&lt;br&gt;
&lt;p&gt;&lt;/span&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;858&#34; data-original-width=&#34;1291&#34; height=&#34;266&#34; src=&#34;/images/iran_white_paper9.png&#34; width=&#34;500&#34;&gt;&lt;br&gt;
&lt;br&gt;
Psiphon has now adapted to a “new normal” in Iran. Part of this new normal is the significant increase in the amount of data being transferred over Psiphon’s network to social media platforms alone. This can be seen in the graph on the left, which shows that, on average, over 16TB of social media traffic is being transferred over the Psiphon network. This includes major platforms such as Facebook, Twitter, and Instagram.&lt;br&gt;
&lt;br&gt;
The prevalence of the Iranian video sharing service Aparat on this graph, especially over Youtube, may be indicative of future threats to internet freedom in Iran. In order to post on Aparat, users need to connect their real identities with a registered account. This is part of the Iranian government’s larger initiative to produce a “halal net,” formally called the National Information Network (NIN).&lt;br&gt;
&lt;br&gt;
This new normal also includes potential disruptions, both technical and political, that Iranian users face. In the first few days of February, Iranians took to the streets again in a number of strikes and protests against months of unpaid wages by their employers. These strikes spanned various industries, including bus drivers and railway workers. This activity was reflected on Psiphon’s network with a surge of users on February 5, from 3 million average daily unique users to 4 million. In times of political unrest, Psiphon has become the go-to censorship evasion tool for many Iranians.&lt;/span&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;div&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;170&#34; data-original-width=&#34;267&#34; height=&#34;204&#34; src=&#34;/images/iran_white_paper_10.png&#34; width=&#34;320&#34;&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;span&gt;This is also true for disruptions of a technical nature. On February 20, users in the Middle East and Europe became unable to access Telegram. On that day, the Psiphon network saw a significant surge in traffic from Iran, with over 3 million connections made. Suspecting a censorship event, Iranians users flooded to Psiphon to test the connection to Telegram. Through Psiphon, they were able to determine that there was a technical error in Telegram’s service, rather than a blocking event by the Iranian government. These incidents show that Psiphon is a trusted tool when internet accessibility is not guaranteed.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;The continued Telegram battle&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;b&gt;&lt;br&gt;&lt;/b&gt;
Telegram has continued to be a target for the Iranian regime and the government has moved to permanently block Telegram. On April 30, after the app’s use by government officials was prohibited, the Iranian judiciary issued a court order for all Iranian ISPs to begin blocking Telegram, effective immediately.&lt;sup&gt;16&lt;/sup&gt; Iranians have been encouraged to use domestic communication applications, which are generally avoided as they are widely-known to be subject to tight government control and surveillance. On May 7, six lawyers filed a petition to the Court for Government Employees in Iran to end the ban on Telegram in an unprecedented use of legal action against the Iranian government.&lt;br&gt;
&lt;br&gt;
On April 26, Psiphon was contacted by the developers of TelegramDR with a request for assistance integrating and supplying network traffic for the Telegram Digital Resistance app. In anticipation of the long-threatened blocking of Telegram, Psiphon developers and outreach team members worked to successfully meet the April 30 deadline and offer Iranian citizens an effective tool for secure communication. On May 1, in direct response to the blocking event, TelegramDR was released on Google Play. Since the release, over 700,000 Iranians depend on TelegramDR, pushing over 5TB of traffic per day, indicating that the intensification of internet service blocking will surely be met with innovative circumvention techniques.&lt;br&gt;
&lt;br&gt;
&lt;b&gt;&lt;u&gt;Conclusion&lt;/u&gt;&lt;/b&gt;&lt;br&gt;
&lt;b&gt;&lt;u&gt;&lt;br&gt;&lt;/u&gt;&lt;/b&gt;
&lt;/span&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;255&#34; data-original-width=&#34;503&#34; height=&#34;203&#34; src=&#34;/images/iran_white_paper_11.png&#34; width=&#34;400&#34;&gt;&lt;/a&gt;Since the Green Revolution of 2009, web and mobile online penetration of Iranian citizens has climbed dramatically. In fact, it has more than doubled. As of 2016, internet users make up over half of the Iranian population; in 2009, this was just under 14%.&lt;sup&gt;17&lt;/sup&gt; Access to the internet has become more widespread and quality has greatly improved. With this comes a greater reliance on internet-based platforms by Iranians, for everything from financial services to business operations. In addition, the influence of social media in the country has rapidly grown. Many businesses and news organizations rely on social media to connect with their customers. In addition, social media is slowly becoming the preferred method of communication among Iranians. This has been seen on the Psiphon network with more bytes transferred to social media sites than ever before. As stated previously, from the period before the protests and the blocking event to the end of the protests, Psiphon gained 22.2 million new users. This has led to an increase of one million average daily users; prior to the blocking Psiphon on average supported two million users per day in Iran and now supports about three million users per day.&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;span id=&#34;docs-internal-guid-4068d30b-65a0-7496-fa17-014b46209e42&#34; style=&#34;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&#34;&gt;&lt;/span&gt;&lt;span&gt;&lt;br&gt;
Psiphon continues to operate at this new normal and must be prepared to increase capacity further in the event of another blocking event. However, there are considerable operating costs associated for any circumvention tool. In order to provide reliable connections to users in Iran, circumvention tools, like Psiphon, need consistent support. In addition, without access to these tools, Iranians may be compelled to migrate to government-supported and controlled domestic social media platforms. In order to maintain support for internet freedom, existing program models and support may require re-engineering. This would ideally include broader support from major social media platforms as their content is being delivered by much smaller, less funded organizations. In addition, more investments in technologies that can deliver content, expand the range of services, provide augmented capacity and adaptation will be necessary. As the Iranian government devotes resources to the development of its NIN, the internet freedom community will need to continually improve and build its capabilities.&lt;br&gt;--&lt;br&gt;By: Ariel Leuthard and Jacob Klein&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;1&amp;nbsp;&lt;a href=&#34;https://en.radiofarda.com/a/iran-students-arrested-protests/28956425.html&#34;&gt;“More Students Arrested in Iran as
Protests Continue,”&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt;
Radio Farda, January 2, 2018.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt;2 Associated Press, &lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt;&#34;&gt;&lt;a href=&#34;https://www.politico.com/story/2018/01/02/iran-2018-slash-demonstrators-security-forces-319916&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;“At least 9 killed in Iran overnight as
protesters, security forces clash,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt; retrieved from Politico, January 2, 2018.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt;&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;3&amp;nbsp;&lt;a href=&#34;http://pubdocs.worldbank.org/en/810181507054517387/MEM-Oct2017-Iran-ENG.pdf&#34;&gt;“Iran’s Economic Outlook,”&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt; The World Bank, October 11, 2017.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;line-height: 115%;&#34;&gt;&lt;span style=&#34;line-height: 115%;&#34;&gt;&lt;span style=&#34;font-size: 14.6667px;&#34;&gt;4&amp;nbsp;&lt;/span&gt;&lt;a href=&#34;http://pubdocs.worldbank.org/en/810181507054517387/MEM-Oct2017-Iran-ENG.pdf&#34; style=&#34;font-size: 10pt;&#34;&gt;“Iran’s Economic
Outlook,”&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt; The World Bank, October
11, 2017.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt;5 Saidi, Mike, &lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt;&#34;&gt;&lt;a href=&#34;https://www.criticalthreats.org/wp-content/uploads/2018/01/Iran-Protests-Dataset_SAIDI_FINAL-FOR-PUBLICATION.pdf&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;“Iranian Anti-Regime Protests and
Security Flaws: A Dataset,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt; Critical Threats Project, American Enterprise Institute, January 12,
2018.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt;6&amp;nbsp;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt;&#34;&gt;&lt;a href=&#34;https://www.reuters.com/article/us-iran-budget/irans-rouhani-submits-conservative-2018-budget-as-u-s-tensions-overshadow-economy-idUSKBN1E40I3&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;“Iran’s Rouhani submits conservative
2018 budget as US tensions overshadow economy,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt; Reuters, December 10, 2017.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;7&amp;nbsp;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt; line-height: 115%;&#34;&gt;&lt;a href=&#34;https://freedomhouse.org/country/iran/freedom-net/2017&#34;&gt;&lt;span style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;“Country Profile:
Iran,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt; &lt;i&gt;Freedom on the Net 2017&lt;/i&gt;, Freedom House, 2017.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal; text-indent: 0px;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; text-indent: -21.75pt;&#34;&gt;8&amp;nbsp;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt; text-indent: -21.75pt;&#34;&gt;&lt;a href=&#34;http://latimesblogs.latimes.com/world_now/2012/03/iran-internet-council-khamenei.html&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;“Iran’s supreme leader calls for new
internet oversight committee,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; text-indent: -21.75pt;&#34;&gt; Los Angeles Times, March 7, 2012.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal; text-indent: 0px;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt; text-indent: -29px;&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;9&amp;nbsp;&lt;a href=&#34;https://www.iranhumanrights.org/2015/09/khamenei-internet-policy-iran/&#34;&gt;“Khamenei consolidates power over
Internet policy in hardline council he controls,”&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; text-indent: -29px;&#34;&gt; Center for Human Rights in Iran, September
14, 2015.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span lang=&#34;EN&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;&lt;a href=&#34;https://www.iranhumanrights.org/2015/09/khamenei-internet-policy-iran/&#34;&gt;https://www.iranhumanrights.org/2015/09/khamenei-internet-policy-iran/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt;10&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt;&#34;&gt;&lt;a href=&#34;https://freedomhouse.org/report/freedom-net/2017/iran&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;“Country Profile: Iran,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt; &lt;i&gt;Freedom
on the Net 2017&lt;/i&gt;, Freedom House, 2017.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span style=&#34;font-size: 10pt;&#34;&gt;11 This has been reported for connections to
Google services such as Gmail as well as traffic via specific protocols
including HTTPS, SSH and VPN tunnels.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;12 Simurgh Aryan, Homa Aryan, and J. Alex Halderman, &lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt; line-height: 115%;&#34;&gt;&lt;a href=&#34;https://www.usenix.org/system/files/conference/foci13/foci13-aryan.pdf&#34;&gt;&lt;span style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;“Internet Censorship in
Iran: A First Look,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;,
Presented as part of the 3rd USENIX Workshop on Free and Open Communications on
the Internet,” 2013.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt;&#34;&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;13&amp;nbsp;&lt;a href=&#34;https://freedomhouse.org/report/freedom-net/2017/iran&#34;&gt;“Country Profile: Iran,”&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt;&#34;&gt; &lt;i&gt;Freedom
on the Net 2017&lt;/i&gt;, Freedom House, 2017.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;14 Durov, Pavel, &lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt; line-height: 115%;&#34;&gt;&lt;a href=&#34;https://t.me/durov/69&#34;&gt;&lt;span style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;Telegram post&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;,
December 31, 2017.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;15&amp;nbsp;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt; line-height: 115%;&#34;&gt;&lt;a href=&#34;https://metrics.torproject.org/userstats-relay-country.html?start=2017-12-25&amp;amp;end=2018-01-18&amp;amp;country=ir&amp;amp;events=off&#34;&gt;&lt;span style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;“Directly connecting
users from Iran,” &lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;Tor
Project, accessed February 2018.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;16&amp;nbsp;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;Parisa Hafezi, &lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 11pt; line-height: 115%;&#34;&gt;&lt;a href=&#34;https://www.reuters.com/article/us-iran-telegram-apps/irans-judiciary-bans-use-of-telegram-messaging-app-state-tv-idUSKBN1I11JM&#34;&gt;&lt;span style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;“Iran’s judiciary bans
use of Telegram messaging app: state TV,”&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt; Reuters, April 30, 2018.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34; style=&#34;line-height: normal;&#34;&gt;
&lt;span&gt;&lt;span lang=&#34;EN&#34; style=&#34;font-size: 10pt; line-height: 115%;&#34;&gt;17&amp;nbsp;&lt;/span&gt;&lt;span style=&#34;font-size: 10pt;&#34;&gt;World Bank, “World
Development Indicators Dataset: Iran,” retrieved March 2018.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>The State of Data Logging: An Evaluation of Threat Levels and Security Practices</title>
      <link>/2018/05/15/the-state-of-data-logging-an-evaluation-of-threat-levels-and-security-practices/</link>
      <pubDate>Tue, 15 May 2018 13:12:00 +0000</pubDate>
      
      <guid>/2018/05/15/the-state-of-data-logging-an-evaluation-of-threat-levels-and-security-practices/</guid>
      <description>&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;/div&gt;&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;Psiphon Inc. has for years been leading the charge to open the internet to those living under censoring regimes. Despite facing no content restrictions online, users from Western countries are turning to VPNs such as Psiphon, to protect their personal privacy online. Yet in March 2017, the Pew Research Center released a startling statistic that some 70% of American internet users are not sure what purpose a VPN serves.&lt;sup&gt;&lt;span style=&#34;font-size: xx-small;&#34;&gt;1&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
If the ever-increasing number of Psiphon accounts is any indication of the growing number of VPN users worldwide, a substantial influx of independent users are entering a market in which they have no metric for critically evaluating the products. This group now bears the burden of understanding risks in the unfamiliar domain of cybersecurity. As such, they are therefore highly susceptible to misinformation. One such term that puts users on high alert is the pervasiveness of the term &lt;u&gt;&lt;i&gt;data logging&lt;/i&gt;&lt;/u&gt; throughout VPN websites and forums, and a misrepresentation of individual risks and methods to efficiently protect oneself.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
According to Techopedia, “data logging is the process of collecting and storing data over a period of time in order to analyze specific trends or record the data-based events/actions of a system, network or IT environment. It enables the tracking of all interactions through which data, files or applications are stored, accessed or modified on a storage device or application.”&lt;sup&gt;&lt;span style=&#34;font-size: xx-small;&#34;&gt;2&lt;/span&gt;&lt;/sup&gt;&amp;nbsp; Many VPNs market a zero-logging policy as a seemingly unique product feature, thus insinuating that the internet traffic of average citizens is otherwise at constant risk of being logged and possibly exploited for commercial and legal purposes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
This has become a hot button issue following the April 2017 repeal of certain FCC protections that would have required American Internet Services Providers (ISPs) to obtain permission before sharing user data (had it ever taken effect as intended in December 2017). The thought of their government advocating for ISPs to make logs of our personal internet histories and then selling or disclosing them without consent is alarming to most internet users.&lt;/span&gt;&lt;/div&gt;
&lt;a href=&#34;https://www.blogger.com/blogger.g?blogID=7138530452612874390&#34; style=&#34;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&#34;&gt;&lt;/a&gt;&lt;span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
As a strong proponent of internet freedom, Psiphon strives daily to ensure that our users receive fair and open access to an uncensored internet without repercussions. The expanding legality of the unauthorized use of user data and browsing history creates a troubling narrative that demonstrates that profits often outweigh ethics. But Psiphon took a deeper dive into understanding the landscape of traffic and data logging practices.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;b&gt;&lt;span style=&#34;font-size: large;&#34;&gt;A Brief Comparative Analysis of Data Logging Policies in the US, the EU, and Canada&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;span&gt;&lt;a href=&#34;https://www.blogger.com/blogger.g?blogID=7138530452612874390&#34; style=&#34;margin-left: 1em; margin-right: 1em;&#34;&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
In general, Western nations have defined protections and regulations through the scope of stored data security. These laws set provisions pertaining to the standards of security to which firms are held while collecting and storing user data. They also outline the issues of legality pertaining to information disclosure. However, all the laws referenced in this paper leave the decisions regarding the type of data and the situations in which it is collected, was well as the duration such data is retained, in the discretion of the collecting organization.&amp;nbsp; While in many cases these organizations must justify the logic behind their policies to a central governing body, such legislation creates a double-edged sword, as it tacitly supports data retention in many cases.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
For example, there are no over-arching regulations in the US pertaining to data logging at present. ISPs are free to collect and store user data, provided that the user is made aware that they are subject to such practices in the terms of service or user licensing agreement. However, companies are governed by the Stored Communications Act, which interdicts the disclosure of user data, including electronic communications, “to any person other than the addressee or intended recipient.”&lt;sup&gt;&lt;span style=&#34;font-size: xx-small;&#34;&gt;3&lt;/span&gt;&lt;/sup&gt;&amp;nbsp; While the American government burdens all firms with protection of user data, they do not expressly limit logging practices or reasonable duration of data storage.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;
The bigger question of ISP logging is not a new one, and it also is not a stand-alone issue. In fact, the question of data logging is rooted in the same legal questions recently resurged net neutrality debate in the US.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
The European Union passed a piece of bloc-wide legislation titled the General Data Protection Regulation (GDPR) in April 2016 that builds upon the original Data Protection Directive of 2012 and outlines data security guidelines, user rights, and legal classifications of subjects. However, individual member states are obliged to determine the appropriate duration of data retention and are not subjected to a bloc-wide mandated timeframe.&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;a href=&#34;/images/datalogging_1.png&#34; style=&#34;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&#34;&gt;&lt;span style=&#34;color: black;&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;693&#34; data-original-width=&#34;672&#34; height=&#34;339&#34; src=&#34;/images/datalogging_1.png&#34; width=&#34;310&#34;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span&gt;
Data retention regulations in the EU are designed to ensure the security of user data and its availability to law enforcement agencies, and much of the language used in the original Data Protection Directive suggests that data retention is necessary for the ease and timeliness of legal investigations. It goes as far as to codify Article 6, which allows for specific legal classifications such as suspected criminals, convicted criminals, and victims to be legally distinguished from other persons during logging and data retention processes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
Independent firms are responsible for determining the appropriate duration of retention for data collected, while additional periods of retention may be set for “archiving in the public interest scientific, statistical or historical use.”&lt;sup&gt;&lt;span style=&#34;font-size: xx-small;&#34;&gt;4&lt;/span&gt;&lt;/sup&gt;&amp;nbsp; However, under the provisions of the GDPR, a private citizen has the “right to be forgotten” and may request that their personal data be removed from a server.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
Finally, Canada’s federalist structure has created a multi-tiered jurisdictional organization regarding its data logging regulations. It has enacted the Personal Information Protection and Electronic Documents Act (PIPEDA), which outlines nationwide directives and regulations regarding the collection of information for commercial activity, and setting a national standard definition for personally identifiable information, which includes:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
•&lt;span style=&#34;white-space: pre;&#34;&gt; &lt;/span&gt;age, name, ID numbers, income, ethnic origin, and blood type;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
•&lt;span style=&#34;white-space: pre;&#34;&gt; &lt;/span&gt;opinions, evaluations, comments, social status, or disciplinary actions, etc.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
•&lt;span style=&#34;white-space: pre;&#34;&gt; &lt;/span&gt;employee files, credit records, loan records, medical records, existence of a dispute between a consumer and a merchant, intentions (for example, to acquire goods or services, or change jobs).&lt;sup&gt;&lt;span style=&#34;font-size: xx-small;&#34;&gt;5&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
Similar to the EU Directive, provisions are included to allow for the disclosure of information to the Financial Transactions and Reports Analysis Centre of Canada (FINTRAC) pertaining to individuals who are suspected of criminal acts such as financing terrorism. However, PIPEDA does not explicitly outline processes for securing information and limiting the legal duration of storage of information. While paragraph 4.5.3 states that “information that is no longer required to fulfill the identified purposes should be destroyed,” individual firms are at liberty to implement their own procedures.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
Further down the chain, provinces that are capable of creating their own laws to ensure data protection may supersede the PIPEDA provisions.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;b&gt;&lt;span style=&#34;font-size: large;&#34;&gt;So, are the alarmist VPNs right?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
VPNs successfully alarm prospective customers for three fundamental flaws in current logging regimes:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
1.&lt;span style=&#34;white-space: pre;&#34;&gt; &lt;/span&gt;Your personally identifiable data may not be adequately secure&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
2.&lt;span style=&#34;white-space: pre;&#34;&gt; &lt;/span&gt;ISPs and online companies may use your personal data for commercial gain&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
3.&lt;span style=&#34;white-space: pre;&#34;&gt; &lt;/span&gt;Databases of personal information being held by ISPs and online companies are at the disposal of law enforcement and government agencies&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
All three evaluated states have allowed for the legal collection and retention of personally identifiable user data. While ISPs and online companies are legally obliged to secure such information, at its core, this has created a weak trust-based system that lacks clear oversight in virtually every jurisdiction.&amp;nbsp; It is easy to say that those who are not using the internet for compromising or illegal activities need not worry, but at Psiphon we believe that all internet users have a reasonable expectation of privacy, regardless of online behaviors.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
As such, it can be assumed that ISPs have the right to log user data. This may be troubling to individual internet users who fear the unauthorized use of private information such as medical records or banking information, or the malicious intrusion into such databases. Additionally, if an ISP received a National Security Letter or warrant requesting user records, they would be bound by law to provide such information to law enforcement.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
With the current laws in place, online companies are not at liberty to sell personally identifiable data for commercial purposes or to disclose such information. However, they are well within their rights to retain and use this data for a variety of internal processes such as customer statistics. With the potentially imminent erosion of net neutrality in the United States, stores of personally identifiable data may be exploited or released without consent. Yet, a leading cause for concern among VPN users is the risk of such data being maliciously exfiltrated, despite the best intentions of the service provider.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
Internet users will always bear the burden of educating themselves on the practices of the companies with whom they engage. A primary concern is that some end users may be unable to understand the meaning or consequences of terms of use and may base their usage on vague and often misleading social and technical standards of whether the VPN is trustworthy and reliable. Not to mention the market research that must be done to ensure that VPNs are truly abiding by the privacy policies they put forth to potential users, especially if the VPN service requires the creation of user accounts that are built around personally identifiable information.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
What’s more, once an educated decision is reached, users in specific geographic locations and on specific sites may find that they feel comfortable using an unencrypted or standard https connection. But where there is still confusion or concern, a no-log VPN such as Psiphon may be used to protect personally identifiable data from being collected online.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;b&gt;&lt;span style=&#34;font-size: large;&#34;&gt;Can a VPN protect me from data logging?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
Many internet users turn to VPNs to anonymize themselves online and avoid data logging practices of commercial services online. However, it must be stated that no VPN can offer complete anonymity online. But those that are committed to a freely accessible internet, such as Psiphon, incorporate strong security measures into their services that protect the privacy of their users. By using a VPN proxy, internet traffic cannot be attributed to specific users, but users are still connected to and participating in the use of internet services.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
In an effort to gain user trust and increase individual privacy, commercially available VPNs often highlight no-logging policies. They claim to discard all records of use, thus making it impossible. However, many VPN service agreements do not provide detailed explanations of such policies. In order to create an account or open an encrypted session, a VPN might require some detailed user information. Once again, the burden falls on the individual user to carefully read through the terms of service and make a determination whether to trust the VPN.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;a href=&#34;/images/datalogging_2.png&#34; style=&#34;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&#34;&gt;&lt;span style=&#34;color: black;&#34;&gt;&lt;img border=&#34;0&#34; data-original-height=&#34;729&#34; data-original-width=&#34;556&#34; height=&#34;402&#34; src=&#34;/images/datalogging_2.png&#34; width=&#34;306&#34;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
The structure of the internet requires that certain information must be exchanged in order for online communication to occur. No data can be sent or received without a functioning IP address, which includes the legitimate IP address of the VPN user. However, because none of the legislation assessed in this paper mandates that VPNs store user data for a specified amount of time, the core values of Psiphon and other VPN services might cause them to erase such information from their networks upon termination of an encrypted session.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
What makes Psiphon different from traditional VPN services? Quite simply, we are borne from and exist predominantly for internet freedom. By design, the Psiphon platform does not store any personally identifiable information regarding end users’ browsing session. Because using Psiphon does not require an account, the software is virtually incapable of creating or storing information pertaining to any individual user. There is therefore no record of use, reassuring those who evade surveillance or fear the disclosure of personally identifiable information to unauthorized parties that using the Psiphon network cannot be attributed to a unique user or geolocation.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&#34;text-align: justify;&#34;&gt;&lt;span&gt;
To ensure that our network remains efficient and scales with changing level of demand, we engage in internal data assessment, which includes traffic volume and user location information aggregated at the country level.&lt;span style=&#34;font-size: xx-small;&#34;&gt;&lt;sup&gt;6&lt;/sup&gt;&amp;nbsp;&lt;/span&gt; This is the most detailed information retained by the service. But if, for example, a nefarious outside actor was to breach this statistical information, no personally identifiable information would be at risk.&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;br&gt;--&lt;br&gt;By: Jacob Klein&lt;br&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;br&gt;&lt;/span&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;Footnote&#34;&gt;
&lt;span&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 9pt;&#34;&gt;1&amp;nbsp;&lt;/span&gt;&lt;span lang=&#34;EN-US&#34;&gt;&lt;span class=&#34;Hyperlink0&#34;&gt;&lt;span style=&#34;font-size: 9pt;&#34;&gt;&lt;a href=&#34;http://www.pewinternet.org/2017/03/22/what-the-public-knows-about-cybersecurity/&#34;&gt;http://www.pewinternet.org/2017/03/22/what-the-public-knows-about-cybersecurity/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;span lang=&#34;EN-US&#34;&gt;&lt;span class=&#34;Hyperlink0&#34;&gt;&lt;span style=&#34;font-size: 9pt;&#34;&gt;2&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; lang=&#34;EN-US&#34; style=&#34;font-size: 9pt;&#34;&gt;&amp;nbsp;&lt;/span&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; lang=&#34;EN-US&#34; style=&#34;font-size: 12pt;&#34;&gt;&lt;span class=&#34;Hyperlink0&#34;&gt;&lt;span style=&#34;font-size: 9pt;&#34;&gt;&lt;a href=&#34;https://www.techopedia.com/definition/596/data-logging&#34;&gt;https://www.techopedia.com/definition/596/data-logging&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;Footnote&#34;&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; lang=&#34;EN-US&#34; style=&#34;font-size: 9pt;&#34;&gt;3 S.Rep.
No. 99-541, 97th Cong. 2nd Sess. 37, reprinted in 1986 U.S.C.C.A.N. 3555, 3591.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;span&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 9pt;&#34;&gt;4 Ibid. Paragraph 26.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 12pt;&#34;&gt;&lt;span class=&#34;Hyperlink0&#34; face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;
&lt;/span&gt;&lt;/span&gt;
&lt;p&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 12pt;&#34;&gt;&lt;span class=&#34;Hyperlink0&#34; face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 9pt;&#34;&gt;5 &lt;a href=&#34;http://laws-lois.justice.gc.ca/eng/acts/P-8.6/FullText.html&#34;&gt;&lt;a href=&#34;http://laws-lois.justice.gc.ca/eng/acts/P-8.6/FullText.html&#34;&gt;http://laws-lois.justice.gc.ca/eng/acts/P-8.6/FullText.html&lt;/a&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 12pt;&#34;&gt;&lt;span class=&#34;Hyperlink0&#34; face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: 9pt;&#34;&gt;6 However, city-level data will be automatically aggregate
only after the usage within a country surpasses a threshold at which it would
be statistically impossible for individual users to be identified via an evaluation
of the number of active connections within the city. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 12pt;&#34;&gt;&lt;span class=&#34;Hyperlink0&#34; face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;
&lt;/span&gt;&lt;/span&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div&gt;
&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 12pt;&#34;&gt;&lt;span class=&#34;Hyperlink0&#34; face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 12pt;&#34;&gt;&lt;span class=&#34;Hyperlink0&#34; face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34;&gt;&lt;/p&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
   &lt;w:UseFELayout/&gt;
  &lt;/w:Compatibility&gt;
  &lt;w:DoNotOptimizeForBrowser/&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&#34;Cambria Math&#34;/&gt;
   &lt;m:brkBin m:val=&#34;before&#34;/&gt;
   &lt;m:brkBinSub m:val=&#34;&amp;#45;-&#34;/&gt;
   &lt;m:smallFrac m:val=&#34;off&#34;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&#34;0&#34;/&gt;
   &lt;m:rMargin m:val=&#34;0&#34;/&gt;
   &lt;m:defJc m:val=&#34;centerGroup&#34;/&gt;
   &lt;m:wrapIndent m:val=&#34;1440&#34;/&gt;
   &lt;m:intLim m:val=&#34;subSup&#34;/&gt;
   &lt;m:naryLim m:val=&#34;undOvr&#34;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
&lt;p&gt;&amp;lt;w:LatentStyles DefLockedState=&amp;ldquo;false&amp;rdquo; DefUnhideWhenUsed=&amp;ldquo;false&amp;rdquo;
DefSemiHidden=&amp;ldquo;false&amp;rdquo; DefQFormat=&amp;ldquo;false&amp;rdquo; DefPriority=&amp;ldquo;99&amp;rdquo;
LatentStyleCount=&amp;ldquo;375&amp;rdquo;&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;0&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Normal&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 7&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 8&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;9&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;heading 9&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 7&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 8&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index 9&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 7&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 8&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;toc 9&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Normal Indent&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;footnote text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;annotation text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;header&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;footer&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;index heading&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;35&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;caption&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;table of figures&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;envelope address&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;envelope return&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;footnote reference&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;annotation reference&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;line number&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;page number&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;endnote reference&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;endnote text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;table of authorities&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;macro&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;toa heading&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Bullet&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Number&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Bullet 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Bullet 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Bullet 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Bullet 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Number 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Number 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Number 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Number 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;10&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Title&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Closing&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Signature&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;1&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Default Paragraph Font&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text Indent&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Continue&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Continue 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Continue 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Continue 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Continue 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Message Header&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;11&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Subtitle&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Salutation&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Date&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text First Indent&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text First Indent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Note Heading&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text Indent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Body Text Indent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Block Text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Hyperlink&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;FollowedHyperlink&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;22&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Strong&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;20&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Emphasis&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Document Map&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Plain Text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;E-mail Signature&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Top of Form&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Bottom of Form&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Normal (Web)&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Acronym&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Address&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Cite&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Code&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Definition&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Keyboard&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Preformatted&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Sample&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Typewriter&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;HTML Variable&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Normal Table&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;annotation subject&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;No List&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Outline List 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Outline List 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Outline List 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Simple 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Simple 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Simple 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Classic 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Classic 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Classic 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Classic 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Colorful 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Colorful 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Colorful 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Columns 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Columns 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Columns 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Columns 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Columns 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 7&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Grid 8&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 7&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table List 8&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table 3D effects 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table 3D effects 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table 3D effects 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Contemporary&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Elegant&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Professional&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Subtle 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Subtle 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Web 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Web 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Web 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Balloon Text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; Name=&amp;ldquo;Table Grid&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Table Theme&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Placeholder Text&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;1&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;No Spacing&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;60&amp;rdquo; Name=&amp;ldquo;Light Shading&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;61&amp;rdquo; Name=&amp;ldquo;Light List&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;62&amp;rdquo; Name=&amp;ldquo;Light Grid&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;63&amp;rdquo; Name=&amp;ldquo;Medium Shading 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;64&amp;rdquo; Name=&amp;ldquo;Medium Shading 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;65&amp;rdquo; Name=&amp;ldquo;Medium List 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;66&amp;rdquo; Name=&amp;ldquo;Medium List 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;67&amp;rdquo; Name=&amp;ldquo;Medium Grid 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;68&amp;rdquo; Name=&amp;ldquo;Medium Grid 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;69&amp;rdquo; Name=&amp;ldquo;Medium Grid 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;70&amp;rdquo; Name=&amp;ldquo;Dark List&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;71&amp;rdquo; Name=&amp;ldquo;Colorful Shading&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;72&amp;rdquo; Name=&amp;ldquo;Colorful List&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;73&amp;rdquo; Name=&amp;ldquo;Colorful Grid&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;60&amp;rdquo; Name=&amp;ldquo;Light Shading Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;61&amp;rdquo; Name=&amp;ldquo;Light List Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;62&amp;rdquo; Name=&amp;ldquo;Light Grid Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;63&amp;rdquo; Name=&amp;ldquo;Medium Shading 1 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;64&amp;rdquo; Name=&amp;ldquo;Medium Shading 2 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;65&amp;rdquo; Name=&amp;ldquo;Medium List 1 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Revision&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;34&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;List Paragraph&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;29&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Quote&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;30&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Intense Quote&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;66&amp;rdquo; Name=&amp;ldquo;Medium List 2 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;67&amp;rdquo; Name=&amp;ldquo;Medium Grid 1 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;68&amp;rdquo; Name=&amp;ldquo;Medium Grid 2 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;69&amp;rdquo; Name=&amp;ldquo;Medium Grid 3 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;70&amp;rdquo; Name=&amp;ldquo;Dark List Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;71&amp;rdquo; Name=&amp;ldquo;Colorful Shading Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;72&amp;rdquo; Name=&amp;ldquo;Colorful List Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;73&amp;rdquo; Name=&amp;ldquo;Colorful Grid Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;60&amp;rdquo; Name=&amp;ldquo;Light Shading Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;61&amp;rdquo; Name=&amp;ldquo;Light List Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;62&amp;rdquo; Name=&amp;ldquo;Light Grid Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;63&amp;rdquo; Name=&amp;ldquo;Medium Shading 1 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;64&amp;rdquo; Name=&amp;ldquo;Medium Shading 2 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;65&amp;rdquo; Name=&amp;ldquo;Medium List 1 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;66&amp;rdquo; Name=&amp;ldquo;Medium List 2 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;67&amp;rdquo; Name=&amp;ldquo;Medium Grid 1 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;68&amp;rdquo; Name=&amp;ldquo;Medium Grid 2 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;69&amp;rdquo; Name=&amp;ldquo;Medium Grid 3 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;70&amp;rdquo; Name=&amp;ldquo;Dark List Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;71&amp;rdquo; Name=&amp;ldquo;Colorful Shading Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;72&amp;rdquo; Name=&amp;ldquo;Colorful List Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;73&amp;rdquo; Name=&amp;ldquo;Colorful Grid Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;60&amp;rdquo; Name=&amp;ldquo;Light Shading Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;61&amp;rdquo; Name=&amp;ldquo;Light List Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;62&amp;rdquo; Name=&amp;ldquo;Light Grid Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;63&amp;rdquo; Name=&amp;ldquo;Medium Shading 1 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;64&amp;rdquo; Name=&amp;ldquo;Medium Shading 2 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;65&amp;rdquo; Name=&amp;ldquo;Medium List 1 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;66&amp;rdquo; Name=&amp;ldquo;Medium List 2 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;67&amp;rdquo; Name=&amp;ldquo;Medium Grid 1 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;68&amp;rdquo; Name=&amp;ldquo;Medium Grid 2 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;69&amp;rdquo; Name=&amp;ldquo;Medium Grid 3 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;70&amp;rdquo; Name=&amp;ldquo;Dark List Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;71&amp;rdquo; Name=&amp;ldquo;Colorful Shading Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;72&amp;rdquo; Name=&amp;ldquo;Colorful List Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;73&amp;rdquo; Name=&amp;ldquo;Colorful Grid Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;60&amp;rdquo; Name=&amp;ldquo;Light Shading Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;61&amp;rdquo; Name=&amp;ldquo;Light List Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;62&amp;rdquo; Name=&amp;ldquo;Light Grid Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;63&amp;rdquo; Name=&amp;ldquo;Medium Shading 1 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;64&amp;rdquo; Name=&amp;ldquo;Medium Shading 2 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;65&amp;rdquo; Name=&amp;ldquo;Medium List 1 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;66&amp;rdquo; Name=&amp;ldquo;Medium List 2 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;67&amp;rdquo; Name=&amp;ldquo;Medium Grid 1 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;68&amp;rdquo; Name=&amp;ldquo;Medium Grid 2 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;69&amp;rdquo; Name=&amp;ldquo;Medium Grid 3 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;70&amp;rdquo; Name=&amp;ldquo;Dark List Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;71&amp;rdquo; Name=&amp;ldquo;Colorful Shading Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;72&amp;rdquo; Name=&amp;ldquo;Colorful List Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;73&amp;rdquo; Name=&amp;ldquo;Colorful Grid Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;60&amp;rdquo; Name=&amp;ldquo;Light Shading Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;61&amp;rdquo; Name=&amp;ldquo;Light List Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;62&amp;rdquo; Name=&amp;ldquo;Light Grid Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;63&amp;rdquo; Name=&amp;ldquo;Medium Shading 1 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;64&amp;rdquo; Name=&amp;ldquo;Medium Shading 2 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;65&amp;rdquo; Name=&amp;ldquo;Medium List 1 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;66&amp;rdquo; Name=&amp;ldquo;Medium List 2 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;67&amp;rdquo; Name=&amp;ldquo;Medium Grid 1 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;68&amp;rdquo; Name=&amp;ldquo;Medium Grid 2 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;69&amp;rdquo; Name=&amp;ldquo;Medium Grid 3 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;70&amp;rdquo; Name=&amp;ldquo;Dark List Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;71&amp;rdquo; Name=&amp;ldquo;Colorful Shading Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;72&amp;rdquo; Name=&amp;ldquo;Colorful List Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;73&amp;rdquo; Name=&amp;ldquo;Colorful Grid Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;60&amp;rdquo; Name=&amp;ldquo;Light Shading Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;61&amp;rdquo; Name=&amp;ldquo;Light List Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;62&amp;rdquo; Name=&amp;ldquo;Light Grid Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;63&amp;rdquo; Name=&amp;ldquo;Medium Shading 1 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;64&amp;rdquo; Name=&amp;ldquo;Medium Shading 2 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;65&amp;rdquo; Name=&amp;ldquo;Medium List 1 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;66&amp;rdquo; Name=&amp;ldquo;Medium List 2 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;67&amp;rdquo; Name=&amp;ldquo;Medium Grid 1 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;68&amp;rdquo; Name=&amp;ldquo;Medium Grid 2 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;69&amp;rdquo; Name=&amp;ldquo;Medium Grid 3 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;70&amp;rdquo; Name=&amp;ldquo;Dark List Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;71&amp;rdquo; Name=&amp;ldquo;Colorful Shading Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;72&amp;rdquo; Name=&amp;ldquo;Colorful List Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;73&amp;rdquo; Name=&amp;ldquo;Colorful Grid Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;19&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Subtle Emphasis&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;21&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Intense Emphasis&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;31&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Subtle Reference&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;32&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Intense Reference&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;33&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Book Title&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;37&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;Bibliography&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;39&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo;
UnhideWhenUsed=&amp;ldquo;true&amp;rdquo; QFormat=&amp;ldquo;true&amp;rdquo; Name=&amp;ldquo;TOC Heading&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;41&amp;rdquo; Name=&amp;ldquo;Plain Table 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;42&amp;rdquo; Name=&amp;ldquo;Plain Table 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;43&amp;rdquo; Name=&amp;ldquo;Plain Table 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;44&amp;rdquo; Name=&amp;ldquo;Plain Table 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;45&amp;rdquo; Name=&amp;ldquo;Plain Table 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;40&amp;rdquo; Name=&amp;ldquo;Grid Table Light&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo; Name=&amp;ldquo;Grid Table 1 Light&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;Grid Table 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;Grid Table 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;Grid Table 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;Grid Table 5 Dark&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo; Name=&amp;ldquo;Grid Table 6 Colorful&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo; Name=&amp;ldquo;Grid Table 7 Colorful&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;Grid Table 1 Light Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;Grid Table 2 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;Grid Table 3 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;Grid Table 4 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;Grid Table 5 Dark Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;Grid Table 6 Colorful Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;Grid Table 7 Colorful Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;Grid Table 1 Light Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;Grid Table 2 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;Grid Table 3 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;Grid Table 4 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;Grid Table 5 Dark Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;Grid Table 6 Colorful Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;Grid Table 7 Colorful Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;Grid Table 1 Light Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;Grid Table 2 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;Grid Table 3 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;Grid Table 4 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;Grid Table 5 Dark Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;Grid Table 6 Colorful Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;Grid Table 7 Colorful Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;Grid Table 1 Light Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;Grid Table 2 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;Grid Table 3 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;Grid Table 4 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;Grid Table 5 Dark Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;Grid Table 6 Colorful Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;Grid Table 7 Colorful Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;Grid Table 1 Light Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;Grid Table 2 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;Grid Table 3 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;Grid Table 4 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;Grid Table 5 Dark Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;Grid Table 6 Colorful Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;Grid Table 7 Colorful Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;Grid Table 1 Light Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;Grid Table 2 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;Grid Table 3 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;Grid Table 4 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;Grid Table 5 Dark Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;Grid Table 6 Colorful Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;Grid Table 7 Colorful Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo; Name=&amp;ldquo;List Table 1 Light&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;List Table 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;List Table 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;List Table 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;List Table 5 Dark&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo; Name=&amp;ldquo;List Table 6 Colorful&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo; Name=&amp;ldquo;List Table 7 Colorful&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;List Table 1 Light Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;List Table 2 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;List Table 3 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;List Table 4 Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;List Table 5 Dark Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;List Table 6 Colorful Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;List Table 7 Colorful Accent 1&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;List Table 1 Light Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;List Table 2 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;List Table 3 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;List Table 4 Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;List Table 5 Dark Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;List Table 6 Colorful Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;List Table 7 Colorful Accent 2&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;List Table 1 Light Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;List Table 2 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;List Table 3 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;List Table 4 Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;List Table 5 Dark Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;List Table 6 Colorful Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;List Table 7 Colorful Accent 3&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;List Table 1 Light Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;List Table 2 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;List Table 3 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;List Table 4 Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;List Table 5 Dark Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;List Table 6 Colorful Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;List Table 7 Colorful Accent 4&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;List Table 1 Light Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;List Table 2 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;List Table 3 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;List Table 4 Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;List Table 5 Dark Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;List Table 6 Colorful Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;List Table 7 Colorful Accent 5&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;46&amp;rdquo;
Name=&amp;ldquo;List Table 1 Light Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;47&amp;rdquo; Name=&amp;ldquo;List Table 2 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;48&amp;rdquo; Name=&amp;ldquo;List Table 3 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;49&amp;rdquo; Name=&amp;ldquo;List Table 4 Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;50&amp;rdquo; Name=&amp;ldquo;List Table 5 Dark Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;51&amp;rdquo;
Name=&amp;ldquo;List Table 6 Colorful Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; Priority=&amp;ldquo;52&amp;rdquo;
Name=&amp;ldquo;List Table 7 Colorful Accent 6&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Mention&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Smart Hyperlink&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Hashtag&amp;rdquo;/&amp;gt;
&amp;lt;w:LsdException Locked=&amp;ldquo;false&amp;rdquo; SemiHidden=&amp;ldquo;true&amp;rdquo; UnhideWhenUsed=&amp;ldquo;true&amp;rdquo;
Name=&amp;ldquo;Unresolved Mention&amp;rdquo;/&amp;gt;
&amp;lt;/w:LatentStyles&amp;gt;
&lt;/xml&gt;&amp;lt;![endif]&amp;ndash;&amp;gt;&lt;/p&gt;
&lt;style&gt;
&lt;!--
 /* Font Definitions */
 @font-face
 {font-family:&#34;Cambria Math&#34;;
 panose-1:2 4 5 3 5 4 6 3 2 4;
 mso-font-charset:0;
 mso-generic-font-family:roman;
 mso-font-pitch:variable;
 mso-font-signature:-536870145 1107305727 0 0 415 0;}
@font-face
 {font-family:&#34;Arial Unicode MS&#34;;
 panose-1:2 11 6 4 2 2 2 2 2 4;
 mso-font-charset:128;
 mso-generic-font-family:swiss;
 mso-font-pitch:variable;
 mso-font-signature:-134238209 -371195905 63 0 4129279 0;}
@font-face
 {font-family:&#34;Futura Medium&#34;;
 panose-1:2 11 6 2 2 2 4 2 3 3;
 mso-font-charset:177;
 mso-generic-font-family:swiss;
 mso-font-pitch:variable;
 mso-font-signature:-2147481497 0 0 0 507 0;}
@font-face
 {font-family:&#34;Helvetica Neue&#34;;
 panose-1:2 0 5 3 0 0 0 2 0 4;
 mso-font-charset:0;
 mso-generic-font-family:auto;
 mso-font-pitch:variable;
 mso-font-signature:-452984065 1342208475 16 0 1 0;}
@font-face
 {font-family:&#34;\@Arial Unicode MS&#34;;
 panose-1:2 11 6 4 2 2 2 2 2 4;
 mso-font-charset:128;
 mso-generic-font-family:swiss;
 mso-font-pitch:variable;
 mso-font-signature:-134238209 -371195905 63 0 4129279 0;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
 {mso-style-unhide:no;
 mso-style-parent:&#34;&#34;;
 margin:0cm;
 margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:12.0pt;
 font-family:&#34;Times New Roman&#34;,serif;
 mso-fareast-font-family:&#34;Arial Unicode MS&#34;;
 border:none;
 mso-ansi-language:EN-US;}
p.Footnote, li.Footnote, div.Footnote
 {mso-style-name:Footnote;
 mso-style-unhide:no;
 mso-style-parent:&#34;&#34;;
 margin:0cm;
 margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&#34;Helvetica Neue&#34;;
 mso-fareast-font-family:&#34;Helvetica Neue&#34;;
 mso-bidi-font-family:&#34;Helvetica Neue&#34;;
 color:black;
 border:none;
 mso-ansi-language:EN-US;}
.MsoChpDefault
 {mso-style-type:export-only;
 mso-default-props:yes;
 font-size:10.0pt;
 mso-ansi-font-size:10.0pt;
 mso-bidi-font-size:10.0pt;
 mso-fareast-font-family:&#34;Arial Unicode MS&#34;;
 border:none;
 mso-ansi-language:EN-US;}
.MsoPapDefault
 {mso-style-type:export-only;}
@page WordSection1
 {size:612.0pt 792.0pt;
 margin:72.0pt 72.0pt 72.0pt 72.0pt;
 mso-header-margin:36.0pt;
 mso-footer-margin:36.0pt;
 mso-paper-source:0;}
div.WordSection1
 {page:WordSection1;}
--&gt;
&lt;/style&gt;
&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&#34;Table Normal&#34;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&#34;&#34;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin:0cm;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:10.0pt;
 font-family:&#34;Times New Roman&#34;,serif;
 border:none;
 mso-ansi-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;
&lt;p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Why You Don&#39;t Need Google&#39;s Domain Fronting</title>
      <link>/2018/04/24/why-you-dont-need-googles-domain-fronting/</link>
      <pubDate>Tue, 24 Apr 2018 13:22:00 +0000</pubDate>
      
      <guid>/2018/04/24/why-you-dont-need-googles-domain-fronting/</guid>
      <description>&lt;p&gt;&lt;span&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;&lt;i&gt;&lt;b&gt;Google’s removal of domain fronting emphasizes the need for solutions like Psiphon.&lt;/b&gt;&lt;/i&gt;&lt;/span&gt;&lt;br&gt;
&lt;br&gt;
&lt;span id=&#34;docs-internal-guid-b2e5c756-f8e4-bdf0-c74b-7661ea38e1e5&#34;&gt;&lt;span style=&#34;font-size: large;&#34;&gt;&lt;a href=&#34;https://www.theverge.com/2018/4/18/17253784/google-domain-fronting-discontinued-signal-tor-vpn&#34;&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;span&gt;Google has confirmed&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; that they will block domain fronting across Google domains and App Engine. For many apps and publishers, this represents a step backwards in the fight for internet freedom. While Psiphon has never relied on this Google service, many app developers continued to depend on the practice as a convenient and straightforward means of circumventing state-level censorship, despite the long-running speculation that Google would close this loophole (eg. Will Scott’s &lt;/span&gt;&lt;a href=&#34;https://wills.co.tt/1746/another-strike-against-domain-fronting&#34;&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;span&gt;blog post&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; in 2017).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;br&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;While the announcement has been met with criticism from internet activists and service providers alike, Google has defended their decision, saying “&lt;a href=&#34;https://www.theverge.com/2018/4/18/17253784/google-domain-fronting-discontinued-signal-tor-vpn&#34;&gt;&lt;span&gt;domain fronting has never been a supported feature&lt;/span&gt;&lt;/a&gt;”.&lt;/span&gt;&lt;br&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;span id=&#34;docs-internal-guid-eecc4f6e-f894-0734-8074-9d006ae2de11&#34;&gt;&lt;/span&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span id=&#34;docs-internal-guid-eecc4f6e-f89c-28b4-5c9c-4f9a472b6102&#34;&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;&lt;span style=&#34;font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Domain fronting has been a popular means of censorship circumvention for several years, being embraced by popular apps like &lt;/span&gt;&lt;a href=&#34;https://signal.org/blog/doodles-stickers-censorship/&#34;&gt;&lt;span style=&#34;font-variant-east-asian: normal; font-variant-numeric: normal; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;span&gt;Signal, who publicly adopted the practice in 2016&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;. While using Google domains to front traffic does not require advanced technical knowledge, it is a half measure that relies on Google, without consultation, to provide infrastructure for something it was not designed to do. In short, using the Google App Engine for domain fronting meant taking advantage of an unsupported loophole. For this reason, the practice would inevitably face restrictions as it gained popularity. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;&lt;/span&gt;&lt;/p&gt;
&lt;br&gt;
&lt;/span&gt;&lt;center&gt;
&lt;blockquote class=&#34;twitter-tweet&#34; data-conversation=&#34;none&#34; data-lang=&#34;en&#34;&gt;
&lt;div dir=&#34;ltr&#34; lang=&#34;en&#34;&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;&#34;Now that Google is disabling domain fronting it&#39;s a good time for tools to start thinking about new infrastructures for circumvention. Recent Telegram efforts in Russia proved how dangerous Google/Amazon reliance was for access to the entire Internet.&#34; &lt;br&gt;
&lt;a href=&#34;https://t.co/0ZblXVE8ED&#34;&gt;https://t.co/0ZblXVE8ED&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;— mahsa alimardani 🌒 (@maasalan) &lt;a href=&#34;https://x.com/maasalan/status/986933336689053696?ref_src=twsrc%5Etfw&#34;&gt;April 19, 2018&lt;/a&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span face=&#34;&amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif&#34; style=&#34;font-size: large;&#34;&gt;
&lt;script async=&#34;&#34; charset=&#34;utf-8&#34; src=&#34;https://platform.x.com/widgets.js&#34;&gt;&lt;/script&gt;&lt;/span&gt;&lt;/center&gt;
&lt;span&gt;&lt;span id=&#34;docs-internal-guid-eecc4f6e-f8ab-8fe7-5734-26da2c2a583b&#34;&gt;&lt;span style=&#34;font-size: large;&#34;&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;In 2015, Cloudflare also ended domain fronting across its domains when it began matching the SNI and host header of web traffic, after &lt;/span&gt;&lt;a href=&#34;https://www.wsj.com/articles/u-s-cloud-providers-face-backlash-from-chinas-censors-1426541126&#34; style=&#34;text-decoration-line: none;&#34;&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;span&gt;its infrastructure was implicated&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; in censorship circumvention.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;font-size: large;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Most recently, in a frenzied attempt to block Telegram, which has made use of this loophole, Russian censorship authority Roskomnadzor blocked an estimated &lt;/span&gt;&lt;a href=&#34;https://usher2.club/en/&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;span&gt;17 million IP addresses&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;. The interference disrupted access to Gmail, Google search, Google Play, YouTube, and other Google services.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&#34;font-size: large;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: large; white-space: pre-wrap;&#34;&gt;Domain fronting is hardly the preeminent censorship circumvention solution. In cases where Google itself is blocked, as it is in Iran, any site or application that used Google for domain fronting would be unavailable as well. Psiphon’s network relies on a wide variety of protocols and obfuscation techniques to deliver Internet freedom. The complex and ever-changing nature of our network protects against over-reliance on one technology or approach. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;span style=&#34;font-size: large;&#34;&gt;&lt;span id=&#34;docs-internal-guid-eecc4f6e-f8e0-3d1d-d99f-b7788e5e2cbd&#34;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;font-size: large;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The importance of a diversified circumvention toolbox cannot be overstated - for apps like Signal, reliance on Google domain fronting resulted in the need for an&lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;immediate and complete shift to another CDN&lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;. &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Tools like Psiphon seek to mitigate this risk by implementing numerous protocols, thereby eliminating reliance on any one method. Both Telegram and Tor’s use of multiple domain fronts minimized the disturbance caused to their services.&lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon Completes Another Third Party Security Review</title>
      <link>/2018/02/16/psiphon-completes-another-third-party-security-review/</link>
      <pubDate>Fri, 16 Feb 2018 15:37:00 +0000</pubDate>
      
      <guid>/2018/02/16/psiphon-completes-another-third-party-security-review/</guid>
      <description>&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;In late June 2017, Psiphon continued to prove its commitment to open source development &lt;span id=&#34;docs-internal-guid-bc973448-a018-441c-6d65-cf621b084a29&#34;&gt;&lt;span style=&#34;font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline;&#34;&gt;(you can access our code repository&lt;/span&gt;&lt;a href=&#34;https://github.com/Psiphon-Inc&#34; style=&#34;text-decoration-line: none;&#34;&gt;&lt;span style=&#34;vertical-align: baseline;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;vertical-align: baseline;&#34;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-variant-east-asian: normal; font-variant-numeric: normal; vertical-align: baseline;&#34;&gt;),&lt;/span&gt;&lt;/span&gt; by commissioning &lt;a href=&#34;https://cure53.de/&#34;&gt;Cure53&lt;/a&gt; to perform a security audit of our services. The security review took 22 days and a total of 9 testers to complete what was described as a review with a “vast scope” and the Cure53 testers were very thorough.  &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;This is our &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;2nd&lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-weight: 700; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;security audit of this kind in 3 years (you can see the results of the 1st one, performed by iSec &lt;/span&gt;&lt;a href=&#34;https://psiphon3.com/en/blog/psiphon-security-assessment.html&#34; style=&#34;text-decoration-line: none;&#34;&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;here&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The report’s description of what was included in the scope reads:&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;i&gt;&lt;span style=&#34;color: #666666; font-family: &amp;quot;arial&amp;quot;; white-space: pre-wrap;&#34;&gt;“In scope were multiple components of the Psiphon software compound, including the tunnel-core client and server, the library glue, the Psiphon iOS app and, last but not least, the Psiphon iOS browser. This very broad premise and scope explain the necessity for involving a rather large number of testers with properly matched expertise in different arenas. In sum, the tests included code audits, actual penetration tests, protocol and configuration reviews, and a cryptographic audit.&#34;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We are very happy with the results of the security audit and proud to relay that “&lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;no noteworthy &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;security risks could be unveiled” (pg.19). In the spirit of transparency you can read the full detailed report in pdf form &lt;a href=&#34;https://drive.google.com/open?id=1cv4KWrDpiNNo8bkBFeUeGgLlkP10lU3T&#34;&gt;here&lt;/a&gt;. &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; white-space: pre-wrap;&#34;&gt;Of the two vulnerabilities found, one has already been fixed (and confirmed by Cure53) and steps have been taken to address the other in upcoming releases.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The testers also noted 7 other miscellaneous issues that you can find listed in the report, four of these have also already been addressed. &lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;color: #666666;&#34;&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;“&lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The testers shared a conviction that the software compound greatly benefitted from a number of software security audits in the past. Needless to say, this is reflected in findings. Among the total nine issues discovered, only two were marked as security vulnerabilities and were further ascribed with the lowest “Informational” severity ranking.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The Cure53 testers noted several times throughout the report how clean and quality driven the code is and came to the following conclusion:&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;color: #666666; font-family: &amp;quot;arial&amp;quot;; font-style: italic; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;“Despite investing considerable time and personnel resources into attempting a compromise, the Psiphon components in scope held up to scrutiny and presented themselves strong and robust in face of adversarial efforts. The bottom line is that no noteworthy security risks could be unveiled.”&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.38; margin-bottom: 12pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We hope that you will find this report interesting, and that it will assure you of our commitment to providing first-class software that will always be open source and secure.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Internet Freedom Festival 2017</title>
      <link>/2017/03/20/internet-freedom-festival-2017/</link>
      <pubDate>Mon, 20 Mar 2017 14:09:00 +0000</pubDate>
      
      <guid>/2017/03/20/internet-freedom-festival-2017/</guid>
      <description>&lt;div style=&#34;line-height: 1.295; margin-bottom: 0pt; margin-top: 12pt;&#34;&gt;
&lt;/div&gt;
&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;span style=&#34;font-family: &amp;quot;calibri&amp;quot;; font-size: 11pt; margin-left: 1em; margin-right: 1em; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;br&gt; &lt;br&gt; Another successful Internet Freedom Festival (IFF) was held 6-10 March, 2017. The week-long &#34;global unconference&#34; festival takes place every year in &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Valencia&lt;/a&gt;, Spain. It is a great opportunity for those in the Internet Freedom community to meet up, share experiences, learn from one another, and discuss issues affecting the Internet today. Once again, Psiphon team members were in attendance at this year&#39;s IFF.&lt;br&gt; &lt;br&gt; This year’s sessions focused on &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;eight different themes&lt;/a&gt;: Community; Training &amp;amp; Best Practices; Internet Freedom: Present and Future; Tools &amp;amp; Technology; Policy &amp;amp; Advocacy; Regions &amp;amp; Groups; Communications &amp;amp; Design; and Journalism &amp;amp; Media. The IFF encourages collaboration, diversity, and inclusivity. The days were filled with engaging sessions, each of which presented an opportunity to meet colleagues from around the world and undertake the shared common goal of Internet Freedom.&lt;br&gt; &lt;br&gt; Learn more about what participants have to say about the IFF through the Twitter hashtag &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;#InternetIFF&lt;/a&gt;. &lt;br&gt;&lt;br&gt;&lt;b&gt;1st Vietnam Cyber Dialogue&lt;/b&gt;&lt;br&gt;&lt;br&gt; A day before IFF kicked off, the first ever &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Vietnam Cyber Dialogue&lt;/a&gt; (VCD) took place. Inspired by &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;ASL 19&lt;/a&gt;’s &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Iran Cyber Dialogue&lt;/a&gt;, the event was a lively gathering of community leaders, activists, policy makers, and technologists working towards improving access to information and greater freedom of expression in Vietnam. The event was organized by &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Article 19&lt;/a&gt;, &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Việt Tân&lt;/a&gt;, &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Aspiration&lt;/a&gt;, and &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Reporters Without Borders&lt;/a&gt;.&lt;br&gt; &lt;br&gt; Ahead of the event, Việt Tân shared “&lt;a href=&#34;https://www.blogger.com/#&#34;&gt;10 Things to know about Vietnam and the internet&lt;/a&gt;,” with attendees. Vietnam has the largest number of internet users in Southeast Asia and a vibrant cyber community. There is certainly lots to discuss when it comes to Vietnam’s media landscape and online environment. The VCD provided safe space for collaboration and dialogue between the Vietnamese community, its diaspora, and technologist allies. &lt;br&gt; Hear what Việt Tân’s &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Loa&lt;/a&gt; and &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;The 88 Project&lt;/a&gt; had to say about the Vietnam Cyber Dialogue in&lt;a href=&#34;https://www.blogger.com/#&#34;&gt; this YouTube video&lt;/a&gt;.&lt;br&gt;&lt;/span&gt;&lt;h3 style=&#34;text-align: left;&#34;&gt;&lt;span&gt; Upcoming events&lt;/span&gt;&lt;/h3&gt;&lt;span&gt; If you’re interested in Internet Freedom check out these upcoming events:&lt;br&gt; &lt;br&gt; &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Iran Cyber Dialogue&lt;/a&gt; 27-28 March, 2017&lt;br&gt; &lt;br&gt; &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;RightsCon Brussels 2017 &lt;/a&gt; 29 – 31 March, 2017 &lt;br&gt;&lt;br&gt; Want to collaborate with Psiphon in 2017? &lt;br&gt;&lt;br&gt; Contact us at&lt;a href=&#34;https://www.blogger.com/#&#34;&gt; info@psiphon.ca &lt;/a&gt; &lt;br&gt; &lt;br&gt; &lt;br&gt; &lt;br&gt; Follow our&lt;a href=&#34;https://www.blogger.com/#&#34;&gt; Twitter &lt;/a&gt;and &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Facebook&lt;/a&gt; for more updates! &lt;/span&gt;&lt;br&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Happy 2017 to Psiphon Users!</title>
      <link>/2017/01/02/happy-2017-to-psiphon-users/</link>
      <pubDate>Mon, 02 Jan 2017 12:48:00 +0000</pubDate>
      
      <guid>/2017/01/02/happy-2017-to-psiphon-users/</guid>
      <description>&lt;p&gt;&lt;span&gt;&lt;br&gt; 2016 was an eventful year, with plenty of world events to be informed about. While access to the Internet and thus information around the world &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;grew&lt;/a&gt;, censorship of all kinds including the blocking of websites also &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;rose&lt;/a&gt;. &lt;br&gt; &lt;br&gt; &lt;br&gt; Here at Psiphon we have also seen more users of our software than ever before, and while this comes hand in hand with increasing information controls on the internet, we are happy to be able to help people get round them. &lt;br&gt; &lt;br&gt; &lt;br&gt; &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Freedom House&lt;/a&gt;&amp;rsquo;s annual report on Internet Freedom noted a decline in said freedom for the sixth year running, and found that two-thirds of Internet users around the world live in countries where criticizing the government, military or monarchy results in censorship. Their other major observation was that governments are increasingly targeting messaging apps. &lt;br&gt; &lt;br&gt; &lt;br&gt; This chimes with some of the things we&amp;rsquo;ve seen on our network this year. For example in January VoIP services were blocked in &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Morocco&lt;/a&gt;, upsetting users of popular free calling services like Viber, Whatsapp, Skype and Facetime. For the month long duration of the ban, we saw our Moroccan traffic triple in the first week and then double each week after that. Then in May &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;a Brazilian judge ordered the blocking of Whatsapp&lt;/a&gt;, not for the first time. Again we saw traffic from the country triple, this time in 24 hours.  &lt;br&gt; &lt;br&gt; &lt;br&gt; National elections are another flashpoint for censorship, and we&amp;rsquo;ve seen people turn to Psiphon as their governments block social media or oppositions websites, for example in August in &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;Gabon&lt;/a&gt;.  Another trend we&amp;rsquo;ve seen this year is the &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;shutting down altogether of the internet&lt;/a&gt; in some countries during turbulent events - something that even Psiphon can&amp;rsquo;t do anything about. &lt;br&gt; &lt;br&gt; &lt;br&gt; Our hope is that in 2017 we can help people around the world to communicate and stay informed without restrictions. Happy New Year to all our friends and we wish you a safe, happy and free 2017!&lt;/span&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon Is 10 Years Old!</title>
      <link>/2016/12/13/psiphon-is-10-years-old/</link>
      <pubDate>Tue, 13 Dec 2016 14:37:00 +0000</pubDate>
      
      <guid>/2016/12/13/psiphon-is-10-years-old/</guid>
      <description>&lt;p&gt;&lt;span&gt;This month &lt;a href=&#34;https://www.blogger.com/blog/post/edit/7138530452612874390/5270567787689713045#&#34;&gt;Psiphon turns 10 years old&lt;/a&gt;! We would like to thank you for your support, as we look forward keeping the Internet open for many more years!&lt;br&gt;&lt;br&gt;&lt;br&gt;Psiphon began at the University of Toronto’s &lt;a href=&#34;https://citizenlab.ca/&#34;&gt;Citizen Lab&lt;/a&gt; as a ‘network of trust’ amongst people who knew each other. The first version of the software allowed a person’s computer in a non-censored country to act as a server for a friend in a censored region, and helped to prove that there was a real need for the open Internet.&lt;br&gt;&lt;br&gt;Psiphon 2 was developed soon after, no longer requiring people in censored regions to know people in an uncensored country. Psiphon runs servers, known as Psiphon nodes, which act as proxies for users in censored regions, and can be accessed via a simple URL.&lt;br&gt;&lt;br&gt;In 2008, Psiphon &lt;a href=&#34;https://www.nouvelobs.com/rue89/rue89-tech/20080214.RUE3153/psiphon-un-logiciel-anticensure-netxplorateur-de-l-annee.html&#34;&gt;won the Netxplorateur &lt;/a&gt;Grand Prix 2008. The panelists called Psiphon “the world’s most original, significant and exemplary Net and Digital Initiative.”  The following year, Psiphon was recognized with The Economist Best New Media Award&lt;/a&gt; by &lt;a href=&#34;https://www.indexoncensorship.org/2009/04/freedom-of-expression-award-2009-recipients-announced/&#34;&gt;Index on Censorship&lt;/a&gt;.&lt;br&gt;&lt;br&gt;In 2011 a downloadable Psiphon app – known as Psiphon 3 –  was launched for Windows, allowing any application that recognized system proxies to access the network through a Psiphon tunnel. At the end of 2012, Psiphon 3 became available for mobile devices. Psiphon 3 is dynamic and resilient. Our specialist team of top developers continuously work to improve the software and fight the ever more advanced censorship techniques faced on the internet. This means Psiphon often works when other simple VPNs do not. All of Psiphon’s software is open source, and has been independently security audited. &lt;br&gt;&lt;br&gt;Psiphon popularity is due in a large part to promotion through our media sponsors and partners. We work closely with Toronto-based NGO ASL19, who help Internet users in the Middle East and North Africa region assert their digital rights online and access information. We also work with major broadcasters, including Deutsche Welle, BBC, and Voice of America, to help them reach their audiences, and to provide Psiphon users with access to news and to an open Internet.&lt;br&gt;&lt;br&gt;We have also been able to work with many organizations to help bring awareness to their various projects through our content distribution network. Last year we promoted the BFI Flare Film Festival, which helped raise awareness of LGBT issues. We also promoted &lt;a href=&#34;https://www.actionagainsthunger.org/&#34;&gt;Action Against Hunger&lt;/a&gt; after the earthquake in Nepal to bring awareness and donations to the disaster-stricken region. This year, we have also worked with Google’s Jigsaw and VICE News to promote a series of documentaries about freedom of expression, as well as partnering with Global Citizen to encourage US voters to take part in this year’s Presidential election.&lt;br&gt;&lt;br&gt;Aside from our diverse partnership opportunities, our team actively engages in local events and international conferences to gain understanding and share ideas about pressing issues that are affecting Internet freedom. Last week, we hosted a session at the &lt;a href=&#34;https://www.intgovforum.org/en&#34;&gt;Internet Governance Forum&lt;/a&gt; on the implications of VoIP crackdown on government, telecom, and civil society. We also recently attended the first Asia Pacific School of Internet Governance in Thailand to learn about the rising problems to Internet Governance in Asia Pacific. We have participated numerous times at the &lt;a href=&#34;https://www.internetfreedomfestival.org/&#34;&gt;Internet Freedom Festival&lt;/a&gt; where we learn about censorship trends and connect with the wider Internet freedom community, and contributed to a PETS paper for the wider technical community.&lt;br&gt;&lt;br&gt;It has been an eventful, innovative, and exciting ten years for Psiphon! We look forward to what the future brings. Look out for more innovations and product releases in 2017!&lt;br&gt;&lt;br&gt;Visit &lt;a href=&#34;https://psiphon.ca&#34;&gt;psiphon.ca&lt;/a&gt; to see our 10-year anniversary web site, and be one of the first to play our game!&lt;br&gt;&lt;br&gt;Want to collaborate with Psiphon in 2017? Contact us at &lt;a href=&#34;mailto:info@psiphon.ca&#34;&gt;&lt;a href=&#34;mailto:info@psiphon.ca&#34;&gt;info@psiphon.ca&lt;/a&gt;&lt;/a&gt; &lt;br&gt;&lt;br&gt;Follow our &lt;a href=&#34;https://twitter.com/PsiphonInc&#34;&gt;Twitter&lt;/a&gt; and &lt;a href=&#34;https://facebook.com/psiphoninc&#34;&gt;Facebook&lt;/a&gt; for more updates!&lt;/span&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Gambia&#39;s Election Shutdown</title>
      <link>/2016/12/07/gambias-election-shutdown/</link>
      <pubDate>Wed, 07 Dec 2016 17:06:00 +0000</pubDate>
      
      <guid>/2016/12/07/gambias-election-shutdown/</guid>
      <description>&lt;div class=&#34;p1&#34;&gt;
&lt;span class=&#34;s1&#34;&gt;Access Now recently reported that there have been &lt;a href=&#34;https://www.accessnow.org/keepiton/#keepiton-quotes-next&#34;&gt;over 50 Internet shutdowns around the world in 2016&lt;/a&gt;, compared to 15 known shutdowns the previous year. Many of these shutdowns have taken place in Africa - as seen in a recent &lt;a href=&#34;https://blog-en.psiphon.ca/2016/10/internet-curfew-in-gabon.html&#34;&gt;Psiphon blog piece&lt;/a&gt;&amp;nbsp;documenting a shutdown and social media blocking event in Gabon.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;p2&#34;&gt;
&lt;span&gt;&lt;span class=&#34;s1&#34;&gt;&lt;/span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;p1&#34;&gt;&lt;span&gt;
Last week, another shutdown happened in Gambia. Just after 9pm local time on November 30th 2016, we received a message from our friend &lt;a href=&#34;https://moseskaranja.com/&#34;&gt;Moses Karanja&lt;/a&gt;, a researcher at the research fellow at the Centre for Intellectual Property and Information Technology Law (CIPIT) in Kenya. Moses asked if we were able to verify reports he had seen on social media, saying that the Internet was unavailable in Gambia.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;p2&#34;&gt;
&lt;span&gt;&lt;span class=&#34;s1&#34;&gt;&lt;/span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;style type=&#34;text/css&#34;&gt;
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 11.0px Helvetica; color: #000000; -webkit-text-stroke: #000000}
p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 11.0px Helvetica; color: #000000; -webkit-text-stroke: #000000; min-height: 13.0px}
span.s1 {font-kerning: none}
&lt;/style&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;p1&#34;&gt;
&lt;span class=&#34;s1&#34;&gt;From our network monitoring, we could see that there had been a total drop-off in Psiphon traffic at just after 8pm local time. To verify this, we contacted Akamai’s State of the Internet team, to see if they had also seen a drop in traffic. Within a few minutes, they confirmed it for us, and tweeted to let the world know.&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class=&#34;twitter-tweet&#34; data-lang=&#34;en&#34;&gt;
&lt;div dir=&#34;ltr&#34; lang=&#34;en&#34;&gt;
&lt;span&gt;&lt;a href=&#34;https://twitter.com/hashtag/Internet?src=hash&#34;&gt;#Internet&lt;/a&gt; disruption in &lt;a href=&#34;https://twitter.com/hashtag/Gambia?src=hash&#34;&gt;#Gambia&lt;/a&gt; has dropped &lt;a href=&#34;https://twitter.com/Akamai&#34;&gt;@akamai&lt;/a&gt; traffic to the country to zero over the last hour. (h/t &lt;a href=&#34;https://twitter.com/PsiphonInc&#34;&gt;@PsiphonInc&lt;/a&gt;) &lt;a href=&#34;https://t.co/MUe4NWvFss&#34;&gt;pic.twitter.com/MUe4NWvFss&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;
— StateOfTheInternet (@akamai_soti) &lt;a href=&#34;https://twitter.com/akamai_soti/status/804078632222294016&#34;&gt;November 30, 2016&lt;/a&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;span&gt;
We followed this up with our own tweet, showing a similar effect on our network.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;blockquote class=&#34;twitter-tweet&#34; data-lang=&#34;en&#34;&gt;
&lt;div dir=&#34;ltr&#34; lang=&#34;en&#34;&gt;&lt;span&gt;
Ongoing Internet outage identified in &lt;a href=&#34;https://twitter.com/hashtag/Gambia?src=hash&#34;&gt;#Gambia&lt;/a&gt;. No network traffic from Gambia since 2010 GMT. &lt;a href=&#34;https://t.co/SiNFKO6rvU&#34;&gt;pic.twitter.com/SiNFKO6rvU&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span&gt;
— Psiphon Inc. (@PsiphonInc) &lt;a href=&#34;https://twitter.com/PsiphonInc/status/804089275017023488&#34;&gt;November 30, 2016&lt;/a&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span&gt;&lt;script async=&#34;&#34; charset=&#34;utf-8&#34; src=&#34;//platform.twitter.com/widgets.js&#34;&gt;&lt;/script&gt; This outage occurred on the eve of the country’s presidential election on December 1st. The incumbent, Yahya Jammeh, had &lt;a href=&#34;http://www.voanews.com/a/gambia-president-vows-zero-tolerance-of-election-violence/3613449.html&#34;&gt;warned against people taking part in any protests&lt;/a&gt; that would follow an election he expected to win.&lt;br&gt;
&lt;br&gt;
Following Jammeh&#39;s defeat in the election to Adama Barrow, the candidate chosen to represent seven opposition parties, Internet and telecommunication services began to be restored. The outage was expected to last into Saturday December 3rd, but instead was reversed by 11.30 on Friday December 2nd.&lt;br&gt;
&lt;br&gt;
The reporting of the shutdown and confirmation at the network level came about due to close collaboration between the research community and the private sector, and helped to highlight the growing number of Internet shutdowns that are occurring across the world. For more information, read &lt;a href=&#34;https://moseskaranja.com/the-gambia-shuts-down-the-internet-on-the-eve-of-presidential-elections/&#34;&gt;this piece from Moses Karanja,&lt;/a&gt; as he continues to &lt;a href=&#34;https://moseskaranja.com/tracking-internet-shutdowns-in-africa/&#34; target=&#34;_blank&#34;&gt;track and document Internet shutdowns in Africa&lt;/a&gt;.&lt;br&gt;
&lt;/span&gt;&lt;div&gt;
&lt;br&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Global Citizen ShowupVote and the United States Election</title>
      <link>/2016/12/01/global-citizen-showupvote-and-the-united-states-election/</link>
      <pubDate>Thu, 01 Dec 2016 11:15:00 +0000</pubDate>
      
      <guid>/2016/12/01/global-citizen-showupvote-and-the-united-states-election/</guid>
      <description>&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span&gt;&lt;span style=&#34;font-family: inherit;&#34;&gt;&lt;span style=&#34;line-height: 107%;&#34;&gt;Ahead of the 2016 United States elections, &lt;/span&gt;&lt;span lang=&#34;EN-US&#34;&gt;&lt;a href=&#34;https://goo.gl/qIiWYi&#34;&gt;&lt;span lang=&#34;EN-CA&#34; style=&#34;line-height: 107%;&#34;&gt;&lt;span&gt;Global Citizen&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&#34;line-height: 107%;&#34;&gt; launched its &lt;span&gt;“&lt;/span&gt;&lt;/span&gt;&lt;span lang=&#34;EN-US&#34;&gt;&lt;span lang=&#34;EN-CA&#34; style=&#34;line-height: 107%;&#34;&gt;&lt;span&gt;&lt;a href=&#34;https://goo.gl/rw3grb&#34;&gt;Show Up and Vote”&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;font-family: inherit;&#34;&gt;&lt;span lang=&#34;EN-US&#34;&gt;&lt;span lang=&#34;EN-CA&#34; style=&#34;line-height: 107%;&#34;&gt;&lt;span&gt;&lt;a href=&#34;https://goo.gl/rw3grb&#34;&gt;campaign&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;line-height: 107%;&#34;&gt;&lt;span style=&#34;font-family: inherit;&#34;&gt; to encourage young Americans to vote. In addition to an online campaign, represented by&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;font-family: inherit;&#34;&gt;the hashtag #ShowupVote, Global Citizen hosted a series of events and concerts with high-profile artists.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;h3&gt;
&lt;b&gt;&lt;span style=&#34;font-family: inherit;&#34;&gt;Psiphon #ShowupVote Promotion During Elections&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span&gt;&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;In the week ahead of the election, Psiphon promoted the #ShowupVote campaign to our US audience,&lt;/span&gt;&lt;br&gt;
&lt;span style=&#34;font-family: inherit;&#34;&gt;showing a selection of images and a brief paragraph explaining the importance of the project.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;In the final two days ahead of the election, the promotion was changed to ensure maximum visibility of the #ShowupVote content.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;As election day ended, Psiphon followed this up by taking users to Global Citizen’s live coverage, giving them a chance to follow the results as they came in. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;Overall, Global Citizen’s content was seen 1.5 million times in the US.&lt;span style=&#34;font-size: 12pt;&#34;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;h3&gt;
&lt;span&gt;&lt;span style=&#34;font-family: inherit;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;span style=&#34;font-family: inherit;&#34;&gt;&lt;b&gt;Worldwide Interest in U.S. Elections&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;In highly censored regions, during national and international news events, it is common for the use of circumvention tools to increase as people attempt to acquire news from a variety of sources. The U.S. election was no exception.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit; line-height: 107%;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span style=&#34;font-family: inherit;&#34;&gt;&lt;span style=&#34;line-height: 107%;&#34;&gt;There was an increase in use of Psiphon in many countries, including from Vietnam, Russia, Iran, Kazakhstan, Saudi Arabia, and the United Arab Emirates, during the lead-up to and on the day of the election. The increase was most notable from China, where live-streaming coverage of the U.S. election &lt;/span&gt;&lt;span lang=&#34;EN-US&#34;&gt;&lt;a href=&#34;https://goo.gl/vXR57A&#34;&gt;&lt;span lang=&#34;EN-CA&#34; style=&#34;line-height: 107%;&#34;&gt;&lt;span&gt;was banned&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style=&#34;line-height: 107%;&#34;&gt;&lt;span&gt; &lt;/span&gt;and TV networks were told to avoid “excessive” coverage of the event.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;br&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon&#39;s First Time Supporting Toronto Reel Asian Film Festival</title>
      <link>/2016/11/28/psiphons-first-time-supporting-toronto-reel-asian-film-festival/</link>
      <pubDate>Mon, 28 Nov 2016 12:36:00 +0000</pubDate>
      
      <guid>/2016/11/28/psiphons-first-time-supporting-toronto-reel-asian-film-festival/</guid>
      <description>&lt;p&gt;The &lt;a href=&#34;https://www.reelasian.com/archive/2016festival/&#34;&gt;2016 Toronto Reel Asian International Film Festival&lt;/a&gt; has come to a close after a successful run from 8th to 19th November, 2016. As the largest Asian film festival in Canada, Reel Asian has been bridging the Pan-Asian contemporary cinema and Canadian community through creating a platform for emerging and award-winning directors, actors and the local community to share their work and opinions on films. This year, over half of the film titles were directed by North American filmmakers.&lt;br&gt;&lt;br&gt; This year marked the 20th anniversary, and for the first time new elements were introduced for the film festival&amp;ndash; including Reel Asian&amp;rsquo;s inaugural WEE ASIAN Kids Programme for parents and children, free entries to 10 films for senior and student audience, as well as a new 20/20 Interview Series. 20 candidates who either have worked or attended the film festival in the past 20 years were invited to talk about their memorable stories with Reel Asian, as well as the impact of the film festival on their lives.&lt;br&gt; &lt;br&gt; Psiphon is very excited to collaborate with Reel Asian for the first time in celebration of their 20th anniversary. As much as the festival is a huge success itself with higher than before ticket sales, we helped expand their online exposure to our users in Canada and China, which received over 2.3 million views over the course of the festival. Through Psiphon&amp;rsquo;s content delivery, our users from China learned about media arts that were screening overseas. Psiphon users in Canada and China were also able to watch trailers of selected films on Psiphon Today.  &lt;br&gt; &lt;br&gt; &lt;br&gt; Since our previous partnership with BFI Film Flare Film Festival, Psiphon continues to pursue opportunities to support art and cinematic initiatives. We are more than happy to connect our users to media arts that are relevant to them and provide an open platform for them to engage with the events. &lt;br&gt; Toronto Reel Asian International Film Festival will happen again in November 2017 with great films!&lt;br&gt; &lt;br&gt; Check out this year&amp;rsquo;s Reel Asian Award winners and more festival highlights at www. reelasian.com&lt;br&gt; &lt;br&gt; Want to collaborate with Psiphon Inc. for your next event? Email us at &lt;a href=&#34;mailto:info@psiphon.ca&#34;&gt;info@psiphon.ca&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Social Media and Internet Ban in Turkey</title>
      <link>/2016/11/21/social-media-and-internet-ban-in-turkey/</link>
      <pubDate>Mon, 21 Nov 2016 20:05:00 +0000</pubDate>
      
      <guid>/2016/11/21/social-media-and-internet-ban-in-turkey/</guid>
      <description>&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt;&#34;&gt;Following the &lt;/span&gt;&lt;a href=&#34;https://www.usnews.com/news/world/articles/2016-11-04/explosion-hits-mainly-kurdish-city-in-southeast-turkey&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt;detainment of 12 pro-Kurdish
lawmakers&lt;/span&gt;&lt;/a&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt;&#34;&gt; from the Peoples’ Democratic Party (HDP) in the early hours of November
4&lt;sup&gt;th&lt;/sup&gt;, Facebook, Twitter, Instagram, YouTube, WhatsApp and Skype were &lt;/span&gt;&lt;a href=&#34;https://turkeyblocks.org/2016/11/04/social-media-shutdown-turkey/&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt;blocked in Turkey&lt;/span&gt;&lt;/a&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt;&#34;&gt;. There were reports that Turk
Telekom internet provider completely disabled access to the internet or throttled
the connection to the point that it was impossible to connect. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt;Despite lack of official decision about the restrictions, and BTK’s
explanation that there was a technical problem throughout Turkey, Prime
Minister Binali Yildirim &lt;/span&gt;&lt;a href=&#34;https://www.hurriyetdailynews.com/slowdown-in-access-to-social-media-in-turkey-a-security-measure-says-pm-105744&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt;made a statement
later&lt;/span&gt;&lt;/a&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt; in the day and said “For security reasons, these kinds of measures can
be taken time to time. These are temporary measures. Everything goes back to
normal after the danger is eliminated.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34; lang=&#34;EN-US&#34; style=&#34;font-size: 11pt;&#34;&gt;Social media and internet bans ended the following evening in most of the
country, but there were still some short-term connection problems during the
weekend in some regions, and it was reported that some Turk Telekom users did
not have internet for longer periods.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&#34;MsoNormal&#34;&gt;
&lt;span&gt;&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt;&#34;&gt;On the same day, multiple local outlets reported that Turkey’s
Information and Communication Technologies Authority (BTK) ordered internet
providers in the country &lt;/span&gt;&lt;a href=&#34;https://www.vice.com/en/article/9a3gqp/turkey-doubles-down-on-censorship-with-block-on-vpns-tor&#34;&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt;to block censorship
circumvention tools&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt;&#34;&gt;&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;, including Psiphon. Despite the rumor, Psiphon saw no
indication that its services were affected negatively. &lt;/span&gt;&lt;span face=&#34;arial, helvetica, sans-serif&#34;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt;&lt;br&gt;&lt;/span&gt;
&lt;br&gt;
&lt;/span&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;/div&gt;
&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;
&lt;img border=&#34;0&#34; height=&#34;416&#34; src=&#34;/images/Psiphonturkeytraffic01-09_Nov.png&#34; width=&#34;640&#34;&gt;&lt;/div&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34; lang=&#34;EN-US&#34; style=&#34;font-size: 11pt; mso-ansi-language: EN-US;&#34;&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span face=&#34;Arial, Helvetica, sans-serif&#34;&gt;&lt;span style=&#34;font-size: 11pt;&#34;&gt;The BTK denied that circumvention tools were ordered blocked; however
Ahment Arslan, the Minister of Transport, Maritime and Communication, said “We
only restrict the use of VPNs because of terrorism reasons. Surely nobody would
have an objection about this.&lt;/span&gt;&lt;span style=&#34;font-size: 11pt;&#34;&gt;”&lt;/span&gt;&lt;/span&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon Attending the First APSIG</title>
      <link>/2016/10/24/psiphon-attending-the-first-apsig/</link>
      <pubDate>Mon, 24 Oct 2016 12:17:00 +0000</pubDate>
      
      <guid>/2016/10/24/psiphon-attending-the-first-apsig/</guid>
      <description>&lt;div&gt;&lt;br&gt;&lt;/div&gt;On September 11th to 15th 2016, Psiphon attended the first Asia Pacific School of Internet Governance (APSIG) hosted in Bangkok, Thailand. &lt;br&gt;&lt;br&gt; The weeklong regional school took place at the Asian Institute of Technology (AIT), where more than 30 participants from various countries in Asia Pacific came together to share their experience and knowledge on the Regional Internet Governance issues. Organized by&lt;a href=&#34;https://interlab.ait.ac.th/&#34;&gt; the Internet Education and Research Laboratory&lt;/a&gt; (inTERLab), the five-day workshop featured keynote speakers from various backgrounds such as international organizations, academic institutes, civil society, government and business sectors. These organizations include: &lt;a href=&#34;https://www.icann.org/&#34;&gt;Internet Corporation for Assigned Names and Numbers&lt;/a&gt; (ICANN), &lt;a href=&#34;https://www.eff.org/&#34;&gt;Electronic Frontier Foundation&lt;/a&gt; (EFF), &lt;a href=&#34;https://www.apnic.net/&#34;&gt;Asia-Pacific Network Information Centre&lt;/a&gt; (APNIC), &lt;a href=&#34;https://www.kaist.ac.kr/en/&#34;&gt;Korea Advanced Institute of Science and Technology&lt;/a&gt; (KAIST), &lt;a href=&#34;https://www.opennetkorea.org/&#34;&gt;OpenNet Korea&lt;/a&gt; and &lt;a href=&#34;https://www.comfirstindia.com/&#34;&gt;Com First India&lt;/a&gt;.&lt;br&gt; &lt;br&gt; As a software company that develops a trusted tool that enables unrestricted Internet content access, Psiphon was very excited to share its feedback on Internet Governance issues, including the improvement of public awareness on Internet content freedom in the Asia Pacific Region. We were extremely happy to connect with established users, within the school, to collect and understand feedback provided in regards to our software. Furthermore, Psiphon built relationships with new users from South and Southeast Asian countries, such as Thailand, Pakistan and Philippines. During the role-play workshops, Psiphon contributed to the final report on the facilitation of new Internet users in the next decade. This report is now available on the APSIG official website at apsig.asia.&lt;br&gt; &lt;br&gt; APSIG is a pilot program envisioned by Dr. Kilnam Chon and the next APSIG will also be hosted in Bangkok, Thailand.  &lt;br&gt; Want to invite Psiphon Inc. to your next event? Email us at &lt;a href=&#34;https://www.blogger.com/#&#34;&gt;info@psiphon.ca&lt;/a&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon’s First Time Sponsoring the Toronto Chinatown Festival</title>
      <link>/2016/09/28/psiphons-first-time-sponsoring-the-toronto-chinatown-festival/</link>
      <pubDate>Wed, 28 Sep 2016 13:50:00 +0000</pubDate>
      
      <guid>/2016/09/28/psiphons-first-time-sponsoring-the-toronto-chinatown-festival/</guid>
      <description>&lt;div&gt;&lt;br&gt;&lt;/div&gt;On August 20th and 21st, Psiphon joined the 16th annual &lt;a href=&#34;https://chinatownbia.com/&#34;&gt;Toronto Chinatown Festival&lt;/a&gt; for the first time as one of the event sponsors. &lt;br&gt;&lt;br&gt; In this 2 day event, Psiphon raised public awareness on Internet content access by reaching out to over 200,000 participants and educating more than 200 visitors on Psiphon’s software. Psiphon has also given out 10 visitors a free month of Psiphon Pro and custom made festival giveaways to booth visitors during the event.&lt;br&gt; &lt;br&gt; As an important neighborhood in the downtown core, Chinatown BIA hosts the Toronto Chinatown Festival every year aiming to bring upon pan-Asian community in the city to celebrate its rich cultural heritage.&lt;br&gt;&lt;br&gt; Want to invite Psiphon to your next event? Email us at info@psiphon.ca&lt;br&gt; &lt;br&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>¡Hola Cuba!</title>
      <link>/2016/09/28/hola-cuba/</link>
      <pubDate>Wed, 28 Sep 2016 13:03:00 +0000</pubDate>
      
      <guid>/2016/09/28/hola-cuba/</guid>
      <description>&lt;p&gt;&lt;br&gt; Did you know that Cuba is one of the countries with the most restricted internet access in the world? Home internet access is forbidden, and even though the government is introducing more and more public WiFi spots, they cost 2$ an hour, which in Cuba is one tenth of the monthly wage. Even then users cannot surf the web freely - they are subject to government surveillance and  anti-government websites are blocked.  Internet speeds are extremely slow. &lt;br&gt; &lt;br&gt; Psiphon was in Miami this month at the Cuba Internet Freedom Forum , a conference to discuss and exchange ideas, look at the current state of the internet in Cuba and look for ways to support its growth.&lt;br&gt; &lt;br&gt; Tell all your Cuban friends that Psiphon will help them access the open free internet!&lt;br&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Amid Second Ban, Psiphon Keeps WhatsApp On in Brazil</title>
      <link>/2016/05/08/amid-second-ban-psiphon-keeps-whatsapp-on-in-brazil/</link>
      <pubDate>Sun, 08 May 2016 13:39:00 +0000</pubDate>
      
      <guid>/2016/05/08/amid-second-ban-psiphon-keeps-whatsapp-on-in-brazil/</guid>
      <description>&lt;p&gt;&lt;br&gt;In December, Psiphon blogged about a previous blocking event in Brazil, &lt;a href=&#34;https://psiphon.ca/en/blog/brazil-whatsapp-2015.html&#34;&gt;available here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;Psiphon use surged again in Brazil in response to another nationwide suspension of WhatsApp messaging service. On May 2nd, Brazilian state judge Marcel Maia Montalvão issued an order to &lt;a href=&#34;https://www.nytimes.com/2016/05/03/technology/judge-seeking-data-shuts-down-whatsapp-in-brazil.html&#34;&gt;block WhatsApp for 72 hours&lt;/a&gt;. The judge is seeking user data from WhatsApp as part of a criminal investigation. The five main mobile operators were ordered to block the messaging service, beginning at Monday at 2 p.m. local time.&lt;br&gt;&lt;br&gt;In response to the recent suspension of WhatsApp services, company CEO Jan Koum &lt;a href=&#34;https://www.facebook.com/jan.koum/posts/10154106409995011&#34;&gt;posted a message to Facebook&lt;/a&gt; stating, “Yet again millions of innocent Brazilians are being punished because a court wants WhatsApp to turn over information we repeatedly said we don’t have. Not only do we encrypt messages end-to-end on WhatsApp to keep people’s information safe and secure, we also don&amp;rsquo;t keep your chat history on our servers. When you send an end-to-end encrypted message, no one else can read it – not even us.”&lt;br&gt;&lt;br&gt;The &lt;a href=&#34;https://www.nytimes.com/2016/05/04/technology/brazilian-judge-lifts-suspension-of-whatsapp.html&#34;&gt;suspension was overturned&lt;/a&gt; by another judge on Tuesday following an appeal from WhatsApp’s lawyers, allowing WhatsApp to resume services in Brazil.&lt;br&gt;&lt;br&gt;In March, Judge Montalvão ordered the &lt;a href=&#34;https://www.reuters.com/article/us-facebook-brazil-idUSKCN0W34WF&#34;&gt;arrest of Facebook executive&lt;/a&gt; Diego Dzodan on charges of obstructing justice after WhatsApp failed to deliver messages subpoenaed in the criminal investigation. A day later, an appeals judge overturned that order and Dzodan was released. Although WhatsApp is owned by Facebook Inc, the two companies operate separately.&lt;br&gt;&lt;br&gt;During a press conference that followed, Dzodan stated that &lt;a href=&#34;https://www.theguardian.com/technology/2016/mar/05/facebook-brazil-diego-dzodan-arrest-sao-paulo&#34;&gt;WhatsApp is unable to turn over the data&lt;/a&gt; because it doesn’t store users’ messages after they’ve been delivered. In addition, the messaging service uses end-to-end encryption and messages cannot be intercepted.&lt;br&gt;&lt;br&gt;Using Psiphon, Brazil’s WhatsApp users were able to retain or restore access to the application. The Psiphon user base in Brazil tripled within the first 24h of the ban. Brazil’s Globo news network &lt;a href=&#34;http://g1.globo.com/tecnologia/blog/tira-duvidas-de-tecnologia/post/whatsapp-saiba-os-riscos-de-usar-vpn-no-smartphone.html&#34;&gt;recommended Psiphon&lt;/a&gt; to circumvent the blocking.&lt;br&gt;&lt;br&gt;&lt;b&gt;Psiphon in Brazil: bytes per hour, 29 April – 4 May 2016:&lt;/b&gt;&lt;div class=&#34;row&#34; style=&#34;background-color: #fffaec; box-sizing: border-box; color: #333333; font-family: sans-serif; font-size: 14px; margin-left: -15px; margin-right: -15px;&#34;&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div&gt;&lt;div class=&#34;separator&#34; style=&#34;clear: both; text-align: center;&#34;&gt;&lt;img alt=&#34;&#34; data-original-height=&#34;680&#34; data-original-width=&#34;1028&#34; height=&#34;424&#34; src=&#34;/images/brazil-whatsapp-201605.png&#34; width=&#34;640&#34;&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;br&gt;This case demonstrates that in response to censorship, blocking, and other restrictions, internet users will turn to known tools that connect them to content and to each other.&lt;br&gt;&lt;br&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon Usage Surges as Brazil Blocks WhatsApp</title>
      <link>/2015/12/17/psiphon-usage-surges-as-brazil-blocks-whatsapp/</link>
      <pubDate>Thu, 17 Dec 2015 13:15:00 +0000</pubDate>
      
      <guid>/2015/12/17/psiphon-usage-surges-as-brazil-blocks-whatsapp/</guid>
      <description>&lt;p&gt;&lt;span&gt;&lt;br&gt;At 9PM ET on December 16th &lt;a href=&#34;https://www.dw.com/en/whatsapp-messenger-blocked-in-brazil-for-two-days/a-18923549&#34;&gt;WhatsApp was blocked in Brazil&lt;/a&gt;. The ban came after a judge ordered that the messenger app be blocked for 48 hours when the company refused to hand over private user information related to a criminal case. For months, Brazilian telecommunications companies have been attempting to shut down WhatsApp because it provides free messaging and voice services. WhatsApp is the most popular messenger service in Brazil and &lt;a href=&#34;https://www.zdnet.com/article/mobile-operators-unite-against-whatsapp-in-brazil/&#34;&gt;telecoms blame it for luring millions away&lt;/a&gt; from paid cell phone use. &lt;br&gt;&lt;br&gt; Internet users in Brazil reacted strongly to the ban, criticizing the decision to block WhatsApp widely on social media. Millions turned to alternate messenger services and shared circumvention techniques over social media. Psiphon was praised by people in Brazil for being free, open source, and able to keep them connected throughout the blocking event. Psiphon’s surge capacity was able to cope with the increased demand, with peak data use of more than 8x that of a normal day. Psiphon&amp;rsquo;s unique users in Brazil went from 54,000 on December 16 to 946,000 on December 17. &lt;br&gt;&lt;br&gt; Less than a day after the block was put in place, a &lt;a href=&#34;https://www.reuters.com/article/us-brazil-whatsapp-ban-idUSKBN0U000G20151217&#34;&gt;second judge overturned the lower court’s decision&lt;/a&gt; and WhatsApp was unblocked. He stated that “it does not seem reasonable that millions of users be affected” because WhatsApp refused to disclose user information. While the surge use of Psiphon settled quickly, more than twice the expected amount of data was being served hours after the block was lifted. &lt;br&gt;&lt;/span&gt;&lt;div style=&#34;text-align: center;&#34;&gt;&lt;span style=&#34;color: black;&#34;&gt;&lt;img border=&#34;0&#34; height=&#34;421&#34; src=&#34;/images//brazil-whatsapp-2015.png&#34; width=&#34;640&#34;&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;span&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt; Update: In May 2016 &lt;a href=&#34;https://psiphon3.net/en/blog/brazil-whatsapp-201605.html&#34;&gt;Brazil blocked WhatsApp again&lt;/a&gt;, and again users turned to Psiphon.&lt;/span&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Android Browser Same Origin Policy Bypass Security Vulnerability (CVE-2014-6041)</title>
      <link>/2015/09/17/android-browser-same-origin-policy-bypass-security-vulnerability-cve-2014-6041/</link>
      <pubDate>Thu, 17 Sep 2015 22:33:00 +0000</pubDate>
      
      <guid>/2015/09/17/android-browser-same-origin-policy-bypass-security-vulnerability-cve-2014-6041/</guid>
      <description>&lt;h1 dir=&#34;ltr&#34; style=&#34;line-height: 1.32; margin-bottom: 27pt; margin-left: -11pt; margin-right: -11pt; margin-top: 15pt; margin: 15pt -11pt 27pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;A severe security vulnerability in the Android AOSP browser has been disclosed: &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;a href=&#34;http://goo.gl/1nDW8n&#34;&gt;http://www.rafayhackingarticles.net/2014/08/android-browser-same-origin-policy.html&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The Psiphon team has determined that the built-in browser (&#34;browser-only mode&#34;) in our Psiphon app is affected, on Android versions 3.0 to 4.3, through its use of Android AOSP browser via the WebView component. There is no known mitigation for this security vulnerability other than to disable JavaScript in our built-in browser WebView components.&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;span id=&#34;docs-internal-guid-1d7b61c4-2f56-ef79-72b5-a92569a20073&#34;&gt;&lt;/span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We are releasing Psiphon for Android version 62 which will disable JavaScript in the built-in browser on these versions of Android. We plan to leave this restriction in place until a less disruptive, effective mitigation becomes available; or the Android AOSP browser becomes widely patched.&lt;/span&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon Gives Global Boost to BFI Flare Film Festival 2015</title>
      <link>/2015/04/26/psiphon-gives-global-boost-to-bfi-flare-film-festival-2015/</link>
      <pubDate>Sun, 26 Apr 2015 00:18:00 +0000</pubDate>
      
      <guid>/2015/04/26/psiphon-gives-global-boost-to-bfi-flare-film-festival-2015/</guid>
      <description>&lt;h1 dir=&#34;ltr&#34; style=&#34;line-height: 1.32; margin-bottom: 27pt; margin-left: -11pt; margin-right: -11pt; margin-top: 15pt; margin: 15pt -11pt 27pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;From March 25 - 31, &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon&lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&amp;nbsp;partnered with &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;&lt;a href=&#34;https://www.britishcouncil.org/&#34; style=&#34;text-decoration: none;&#34; target=&#34;_blank&#34;&gt;British Council&lt;/a&gt; &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;to deploy the &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;BFI Flare&lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;#FiveFilms4Freedom&lt;/span&gt;&lt;span style=&#34;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-weight: 400; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;  campaign, a global digital human rights initiative and history’s first global, digital LGBT cinematic event. A leader in contemporary LGBT cinema for 29 years, BFI Flare 2015 sought to encourage the world to watch a film together, and show that love is a basic human right.&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon helped maximize the global impact of the campaign, connecting the festival’s LGBT filmmakers and their stories to audiences in 135 countries around the world, in some of the most heavily censored societies — places where freedom of expression is not a given, in particular for members of the LGBT community. According to #FiveFilms4Freedom Director Alan Gemmell, the initiative “was a truly ground-breaking way to support freedom and equality all over the world and showcase some of our finest short filmmakers… we’re incredibly proud that our campaign reached tens of millions of people and that we were able to show solidarity with people around the world who risk their lives everyday just to live and love.”&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Through the Psiphon platform, more than 5 million viewers were made aware of the festival, and viewed the landing page 13 million times.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The partnership was a litmus test of Psiphon’s capabilities as a publishing platform, and demonstrated its power to connect diverse international audiences to culturally-relevant content, to each other, and to a global conversation on a massive scale.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon CEO Karl Kathuria was pleased with the outcome. “We are really excited to have helped raise awareness of this film festival,” he said. “Many people using our software are in countries where it can be difficult to access LGBT content, so this is a unique opportunity to connect them with #FiveFilms4Freedom and help them to join in with the conversation over social media.”&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Kathuria confirmed that Psiphon will continue to pursue future initiatives in art, cinema, and other cultural activities. “As a content delivery tool, our technology holds substantial and untapped potential to engage a global audience, regardless of information controls that might be imposed on them. Psiphon will be pursuing several more opportunities to promote and distribute content for cinematic events over the remainder of 2015.”&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;#FiveFilms4Freedom will return in 2016 with an expanded international programme. Psiphon’s free and open source software continues to be available for Windows desktops and Android mobile devices, helping people all over the world connect with each other over the open internet.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;To learn more about the #FiveFilms4Freedom project, visit: &lt;/span&gt;&lt;a href=&#34;http://film.britishcouncil.org/our-projects/2015/fivefilms4freedom&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;http://film.britishcouncil.org/our-projects/2015/fivefilms4freedom&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;To learn more about BFI Flare, visit: &lt;/span&gt;&lt;a href=&#34;http://www.bfi.org.uk/flare&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;http://www.bfi.org.uk/flare&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;To learn more about the British Council, visit: &lt;/span&gt;&lt;a href=&#34;http://www.britishcouncil.org/&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;http://www.britishcouncil.org/&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;span id=&#34;docs-internal-guid-ef030f0f-2f85-b426-c78a-ba64ad1d2c0e&#34;&gt;&lt;/span&gt;&lt;br&gt;
&lt;/span&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.71429; margin-bottom: 8pt; margin-left: -11pt; margin-right: -11pt; margin-top: 0pt; margin: 0pt -11pt 8pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;You can also stay in touch with Psiphon via &lt;/span&gt;&lt;a href=&#34;https://twitter.com/PsiphonInc&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Twitter&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; and &lt;/span&gt;&lt;a href=&#34;https://www.facebook.com/pages/Psiphon/207377692624236&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Facebook&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: &amp;quot;arial&amp;quot;; font-size: 14px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>A Technical Description of Psiphon</title>
      <link>/2014/12/03/a-technical-description-of-psiphon/</link>
      <pubDate>Wed, 03 Dec 2014 11:10:00 +0000</pubDate>
      
      <guid>/2014/12/03/a-technical-description-of-psiphon/</guid>
      <description>&lt;style&gt;
  ul li {
  margin-bottom: 0.5em;
}
&lt;/style&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Here&#39;s an update to address two recent questions: in simple terms, what is Psiphon and how does it differ from a VPN service; and, what has changed since the technical design document was last updated.&lt;/span&gt;&lt;/div&gt;
&lt;span&gt;&lt;b id=&#34;docs-internal-guid-24b90f5d-ddd6-3890-f139-707a708859b4&#34; style=&#34;font-weight: normal;&#34;&gt;&lt;br&gt;&lt;/b&gt;
&lt;/span&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 8pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon 3 is a centrally managed, geographically diverse network of 1000s of proxy servers. Most of our infrastructure is hosted with cloud providers. Psiphon 3 is a &#34;one hop&#34; architecture with secure link encryption between clients and servers. We offer clients for the most popular platforms: Windows, Android, and iOS (in alpha).&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 8pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon is&lt;/span&gt;&lt;a href=&#34;https://psiphon.ca/en/open-source.html&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;open source&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;. Our service offers a strong&lt;/span&gt;&lt;a href=&#34;https://play.psiphon3.com/en/faq.html#information-collected&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;privacy policy&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;; there are no user accounts and user network addresses are not logged.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 8pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon differs from standard VPN services in a couple of key ways:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&#34;margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We deploy strategies to distribute subsets of servers to users aiming to provide each user with a handful of servers they can reach while not revealing the entire network to one user. To achieve this goal, the size of our network -- and in particular the diversity of our network addresses -- isn&#39;t simply a function of our traffic load.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 8pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We use protocol obfuscation to bypass DPI blocking.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 8pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon&#39;s technical&lt;/span&gt;&lt;a href=&#34;https://github.com/Psiphon-Inc/psiphon/blob/master/files/DESIGN.pdf&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;design document&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; is out-of-date and what follows is a very brief summary of major technical changes we&#39;ve implemented since the project launched in 2011.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&#34;margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We added the&lt;/span&gt;&lt;a href=&#34;https://github.com/brl/obfuscated-openssh&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;obfuscated SSH&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; protocol to mitigate DPI fingerprinting. This fully random-looking protocol is deployed with a unique obfuscation key per Psiphon server.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We added an optional HTTP prefix to our protocol to mitigate DPI-based whitelisting of HTTP traffic. This simple prefix is sufficient for regex-based DPI (nDPI and l7-filter) to classify Psiphon traffic as HTTP; and was sufficient to defeat an actual adversary at the time we deployed it.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We added remote server lists to augment the embedded and discovery servers concepts. While discovery happens only when connected to an existing server, remote server lists can be downloaded even when all servers are blocked. Remote server lists are distributed on S3 and accessed via &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;https://s3.amazonaws.com&lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; without a distinguishing bucket name in the URL. In this way, it is difficult for an adversary to block our remote server lists without blocking all of S3 or implementing HTTPS traffic analysis.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Email is now a major client propagation mechanism. We have an auto-responder that returns links and attachments to custom sponsor/channel Psiphon clients depending on the email address users send to.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We released an Android client in 2012. The first version included an embedded browser based on Android&#39;s&lt;/span&gt;&lt;a href=&#34;http://developer.android.com/reference/android/webkit/WebView.html&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;WebView&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;. In 2012/2013 we added support for whole device tunneling, which tunnels all Android apps through Psiphon. We have an iptables whole device mode (for rooted Android 2.2+ devices); and a whole device mode that uses Android&#39;s&lt;/span&gt;&lt;a href=&#34;https://developer.android.com/reference/android/net/VpnService.html&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;VpnService&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; with&lt;/span&gt;&lt;a href=&#34;https://code.google.com/archive/p/badvpn/wikis/tun2socks.wiki&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;tun2socks&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt; (for any Android 4+ device). Additional features added include egress region selection and proxy chaining.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;We have an iOS client now in alpha testing. This app has an embedded browser.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Our in-app feedback mechanism sends us messages and optional diagnostics from users. This system has helped us debug many platform issues and blocking issues.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Changes to discovery algorithms: our discovery algorithms evolve as part of an ongoing process of optimizing our network. Major changes include sharing discovery servers across propagation channels; and adding time-of-day as a dimension.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Optimizations to connection algorithms: our clients now launch connections to many servers at once when connecting, and keep the &#34;best&#34; connection. This assists in load balancing as well as reducing user wait time as individual blocked servers do not stall the connection sequence.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;background-color: transparent; font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; list-style-type: disc; text-decoration: none; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;background-color: transparent;font-family: Arial; font-size: 14.6667px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Client auto-upgrade was enhanced to use incremental download and to use out-of-band download sites (authenticated with digital signatures). These changes made it more likely that a new client can be distributed at a time of blocking.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;br&gt;
&lt;span id=&#34;docs-internal-guid-a6c2d533-3246-5e6e-2608-6d7203bd481f&#34;&gt;&lt;ul style=&#34;margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;/ul&gt;
&lt;/span&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Independent Security Assessment of Psiphon 3</title>
      <link>/2014/10/14/independent-security-assessment-of-psiphon-3/</link>
      <pubDate>Tue, 14 Oct 2014 22:45:00 +0000</pubDate>
      
      <guid>/2014/10/14/independent-security-assessment-of-psiphon-3/</guid>
      <description>&lt;p&gt;&lt;br&gt;At Psiphon, we’re committed to open source development. We talked about this in a &lt;a href=&#34;https://psiphon.ca/en/blog/psiphon-a-technical-description.html&#34;&gt;previous blog post&lt;/a&gt;, and you can access our source code &lt;a href=&#34;https://psiphon.ca/en/open-source.html&#34;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;We were recently offered the chance to take this openness a step further with a formal security audit of our Windows and Android products, to be carried out by &lt;a href=&#34;https://www.isecpartners.com/&#34;&gt;iSEC Partners&lt;/a&gt;. As part of our effort to be transparent in the way we operate, we are pleased to publish this report in full, which you can access &lt;a href=&#34;https://psiphon.ca/assets/Psiphon-3-iSEC-Partners-v1.1-08-2014.pdf&#34;&gt;here&lt;/a&gt;.&lt;br&gt;&lt;br&gt;Overall, we are very happy with the results of the security audit, and for it to be recognized that we are &amp;ldquo;actively invested in ensuring the security of [our] users&amp;rdquo;. We have already addressed the one High Severity item uncovered by iSEC Partners, and will continue to address the other recommendations over time.&lt;br&gt;&lt;br&gt;The main findings of the report are:&lt;br&gt;&lt;ul style=&#34;text-align: left;&#34;&gt;&lt;li&gt;Psiphon follows most industry best-practices and takes measures to mitigate against attacks where it cannot.&lt;/li&gt;&lt;li&gt;Most findings were suggestions to further improve the system, particularly in relation to the growth in the number of people using the software.&lt;/li&gt;&lt;li&gt;No inherent architecture flaws were discovered.&lt;/li&gt;&lt;li&gt;One High Severity issue was found, related to automated server patching. We have now &lt;a href=&#34;https://github.com/Psiphon-Inc/psiphon-automation/commit/1cdfe2a8e9610b396e7796b6afa77afb0727c547&#34;&gt;deployed&lt;/a&gt; automated server patching using &lt;a href=&#34;https://www.ansible.com/&#34;&gt;Ansible&lt;/a&gt;.&lt;/li&gt;&lt;li&gt;Longer-term recommendations are being considered, and where appropriate built in to our development plans.&lt;/li&gt;&lt;/ul&gt;&lt;br&gt;One particular finding of interest is the recognition by iSEC Partners that there is a potential for security issues related to the browser that we use for browser-only mode. We &lt;a href=&#34;https://psiphon.ca/en/blog/psiphon-CVE-2014-6041.html&#34;&gt;wrote about that&lt;/a&gt; recently when a new security flaw in the browser was discovered, and have already taken steps to mitigate against it.&lt;br&gt;&lt;br&gt;We were very pleased to be given the opportunity to engage with this security review. We hope that you will find this report interesting, and that it will reassure you of our commitment to providing first-class software that will always be open source and secure.&lt;br&gt;&lt;/p&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Heartbleed and Psiphon</title>
      <link>/2014/10/04/heartbleed-and-psiphon/</link>
      <pubDate>Sat, 04 Oct 2014 12:51:00 +0000</pubDate>
      
      <guid>/2014/10/04/heartbleed-and-psiphon/</guid>
      <description>&lt;style&gt;
  ul li {
  margin-bottom: 0.5em;
}
&lt;/style&gt;
&lt;h4&gt;Summary of Heartbleed impact on Psiphon:&lt;/h4&gt;
&lt;span id=&#34;docs-internal-guid-24b90f5d-ddd4-9cac-a32c-9c7ec76cf2b5&#34;&gt;&lt;ul style=&#34;margin-bottom: 0pt; margin-top: 0pt;&#34;&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Some Psiphon servers were using affected versions of OpenSSL, leaving the Python web server vulnerable to the Heartbleed attack. Data at risk, within the web server component process, included Psiphon network topology information and network usage statistics in addition to web server key material.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The SSH/SSH+ Psiphon tunnels were not at risk. User traffic flowing through the Psiphon servers was not at risk. VPN Psiphon tunnels were potentially at risk for man-in-the-middle attacks as the per-session authentication secret is in Python web server memory.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;On April 8, 2014, OpenSSL patches were applied to all affected Psiphon servers. In addition, all affected servers had their non-SSH/SSH+ capabilities revoked (out-of-band updates to all clients), ensuring clients will not attempt to use potentially compromised web server key material outside of the secure tunnel.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The Windows client does not use OpenSSL and is not affected by the Heartbleed attack.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The Android client does not use OpenSSL for its tunnel, but does use Android Java SSL for its web requests to Psiphon web servers and Amazon S3. As&lt;/span&gt;&lt;a href=&#34;https://security.googleblog.com/2014/04/google-services-updated-to-address.html&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Android version 4.1.1 is affected by Heartbleed&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;,&lt;/span&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt; our app on this particular version of Android remains vulnerable to Amazon, Psiphon servers, or a man-in-the-middle peeking at app memory.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The email auto-responder server had the affected version of OpenSSL. The attack against it would be to get it to make a SSL connection to a remote mail server (by sending an email request from an address that uses that server), which could then peek into the memory of the mail server. This could potentially expose email content, including addresses. The OpenSSL patches were applied April 8, 2014.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 0pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;The feedback processing server had the affected version of OpenSSL. It may have used that library (via Python +&lt;/span&gt;&lt;a href=&#34;https://github.com/boto/boto&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Boto&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt; to make SSL connections to Amazon AWS services and Google Gmail server. This means that Amazon or Google could have accessed&lt;/span&gt;&lt;a href=&#34;https://psiphon.ca/en/faq.html#information-collected&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;user feedback data&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;. However, it should be noted that this data is already hosted in Amazon EC2 and a subset of this data is emailed to us via Gmail. The OpenSSL patches were applied April 8, 2014.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li dir=&#34;ltr&#34; style=&#34;font-family: Arial; font-size: 16px; list-style-type: disc; margin-left: -15px; vertical-align: baseline;&#34;&gt;&lt;div dir=&#34;ltr&#34; style=&#34;line-height: 1.8; margin-bottom: 16pt; margin-right: -11pt; margin-top: 0pt;&#34;&gt;
&lt;span&gt;&lt;a href=&#34;https://psiphon.ca/&#34; style=&#34;text-decoration: none;&#34;&gt;&lt;span style=&#34;text-decoration: underline; vertical-align: baseline; white-space: pre-wrap;&#34;&gt;Psiphon&lt;/span&gt;&lt;/a&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt; &lt;/span&gt;&lt;span style=&#34;vertical-align: baseline; white-space: pre-wrap;&#34;&gt;was not using an affected version of OpenSSL.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/span&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
    <item>
      <title>Psiphon and the 2013 Iranian Election</title>
      <link>/2013/10/27/psiphon-and-the-2013-iranian-election/</link>
      <pubDate>Sun, 27 Oct 2013 10:58:00 +0000</pubDate>
      
      <guid>/2013/10/27/psiphon-and-the-2013-iranian-election/</guid>
      <description>&lt;p&gt;Psiphon has over a million active users every week. People use our software to get news, information and social media content that they would otherwise not be able to see. We offer apps for Windows and Android devices, mostly distributed through partnerships with news broadcasters and human rights organisations.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;This year, we’ve made a particularly big impact in Iran, coinciding with their Presidential election. Iran has always been a big challenge for us, and it’s also where we see the most people using our software. In a normal week, we see as many as 1.5 million unique users connect to our network from inside Iran. There are somewhere around 45 million people connected to the network in Iran, which accounts for &lt;a href=&#34;http://globalvoicesonline.org/2013/04/20/iran-60-of-irans-population-is-internet-users/&#34;&gt;60% of the population&lt;/a&gt;.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;We knew that the election period was going to cause some problems, but had no idea exactly what we would face. First, as early as March there were reports that VPN software was being blocked inside the country, as &lt;a href=&#34;http://www.wired.co.uk/news/archive/2013-03/11/iran-vpn-block&#34;&gt;reported on Wired magazine’s site&lt;/a&gt;. Psiphon stayed available throughout this period, and in fact the user base doubled in just four weeks. We brought many more servers online to cope with the additional load on our network.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;Then, at the beginning of May, the disruption to the Internet in Iran was brought to a whole new level. We saw a sudden spike in connections, suggesting that the software was rapidly disconnecting and reconnecting. With help from &lt;a href=&#34;http://averysmallbird.com/&#34;&gt;Collin Anderson&lt;/a&gt; and &lt;a href=&#34;https://asl19.org/&#34;&gt;ASL19&lt;/a&gt;, we learned that SSL connections were being cut after 60 seconds, and all connections to sites outside of Iran were being severely throttled.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;People using Psiphon were still able to connect and see some content, but had a heavily degraded experience. Psiphon’s built-in feedback mechanism allowed people to provide diagnostic information that helped us further -- we were receiving feedback at the rate of thousands of messages per day, all containing vital clues that could help us get back to normal.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;Our development team rapidly released an update to Psiphon that provided the first workaround. Six further releases followed in the weeks leading up to the election. Psiphon’s software automatically updates, and these releases were pushed directly to the end users. At least half of our user base had the upgrade within a day of it being released, and by the time of the election, 90% of Psiphon users were connecting with known working versions.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;Psiphon’s goal for the period of the election was to try and keep our network alive, so that anyone with an Internet connection was still able to get to the content they wanted to see. As many as 500 active servers were used to achieve this, on diverse networks, with close monitoring by the technical teams to ensure the system was available throughout that time.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;Reports from Iran suggest that the throttling of SSL, and blocking of all non-HTTP traffic, was increased for the election period, and most specifically on June 14, the day of the election itself. Psiphon’s software remained available throughout this period. &lt;strong&gt;Although there was a reduction in traffic caused by the extreme throttling, there were still over 400,000 connections made by 125,000 unique users.&lt;/strong&gt;&lt;/p&gt;&lt;br&gt;
&lt;p&gt;Psiphon also distributed content for projects set up to support Iranians specifically over the election period. These include &lt;a href=&#34;http://theglobaldialogue.ca&#34;&gt;The Global Dialogue&lt;/a&gt; and &lt;a href=&#34;http://edition.cnn.com/2013/06/11/world/meast/iran-elections-virtual/&#34;&gt;We Choose&lt;/a&gt;, projects offering a platform through which the Iranian Internet audience could discuss matters related to the election, and vote on candidates in a secure, open and fair process.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;You can read a lot more technical detail about the election period in &lt;a href=&#34;https://asl19.org/cctr/iran-2013election-report/&#34;&gt;a report from our colleagues at ASL19&lt;/a&gt;.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;What of the future in Iran? We’ve seen some encouraging signs from Hassan Rouhani, such as his &lt;a href=&#34;https://twitter.com/HassanRouhani&#34;&gt;openness to social media&lt;/a&gt;, but our user base is still growing, and so are &lt;a href=&#34;http://www.iranhumanrights.org/2013/10/rouhani-facebook-twitter/&#34;&gt;the reports&lt;/a&gt; we’re getting of sites being blocked. Last week, Deutsche Welle’s new Director General, Peter Limbourg, called on Rouhani to stop blocking his organization’s &lt;a href=&#34;http://www.dw.de/dw-director-general-calls-on-tehran-to-take-steps-towards-more-transparency/a-17147065&#34;&gt;Persian site&lt;/a&gt;. He also praised the work that we are doing at Psiphon to distribute DW content into Iran.&lt;/p&gt;&lt;br&gt;
&lt;p&gt;This month, we’re also starting two new partnerships with &lt;a href=&#34;http://manoto1.com&#34;&gt;Manoto 1&lt;/a&gt; and &lt;a href=&#34;http://radiozamaneh.com&#34;&gt;Radio Zamaneh&lt;/a&gt;. Both of these broadcasters have a large audience of Farsi speakers, and are trying to get their content seen and heard in Iran. We’re very pleased to be working with these broadcasters, and know that this will help to bring news, information and social media content to even more Iranians.&lt;/p&gt;&lt;br&gt;
&lt;/div&gt;
    &lt;/div&gt;
  &lt;/div&gt;
&lt;!-- no comments on this post --&gt;
</description>
    </item>
    
  </channel>
</rss>
