Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
The only brave person surrounding Wikileaks appears to Assnage...
To find other brave wikileaks activists, just look at the names on the subpeona: Jacob Appelbaum @ioerror -Tor spokesman who subbed in for Julian Assange at the HOPE conference, and a lot has been written about him elsewhere, including Rolling Stone. He's on the way back from Iceland to Seattle today, so hopefully he won't be detained again. There's a crowd of wikileaks supporters waiting for him. Rop Gonggrijp @rop_g - Hacker/activist who helped produce and release the Collateral Murder video. He no longer works for wikileaks since he's spending most of his time cracking voting machines in India/Brazil.
Birgitta Jónsdóttir @birgittaj - The Icelandic Parliament Member with an impressive history of activism.
All of these people have done more for the spread of democracy and freedom of speech than most of us ever will. No wonder they are under investigation by the DOJ.
The Tor project has seen an increased focus on Internet censorship as many more users adopted Tor to get around blocking. In the past year, Tor was a popular means of bypassing censorship in Iran, China, and around the world. Firewall operators have been noticing. Tor has also had to contend with new organized efforts to block access to the network, and has rolled out the “bridges” blocking-resistance system in earnest. Alongside the perpetual need to get more Tor nodes, it’s become important to get users to run bridges – and to experiment with ways of communicating bridge addresses to users affected by censorship. The current censorship landscape will be explored, along with the bridge mechanism and efforts to recruit more bridges. There will also be an update on how Tor developers are responding to the growing pains and dealing with scaling challenges associated with Tor’s popularity. You’ll also hear about the challenge of counting the number of users on an anonymity network, and how client software can force the use of encryption to protect users from some attacks after their traffic leaves the Tor network.