Feeds

Iranians get some services back

Censor’s dead hand still felt on Facebook, Twitter

The Power of One eBook: Top reasons to choose HP BladeSystem

Iranians have a little more Internet access than a few days ago, but access is still highly restricted.

Last week, the country imposed a block on SSL-based VPNs which, it seems, is still in place. Barring SSL/TLS traffic stopped Iranians from using the well-known TOR Project to bypass state censorship of Internet sites. In addition, Iranians found themselves unable to access Web-based mail sites like Gmail, Yahoo! Mail and Hotmail, along with a host of other popular services.

The Washington Post is now reporting that the blocks on e-mail services seem to be easing, although access remains blocked to Facebook and Twitter.

Users running into the officially-denied blocks either wait an eternity for sites to load, or receive a block-page attributing their lack of access to “computer crime regulations”.

The blocks are attributed to upcoming elections and the anniversary of its 1979 revolution.

With the country tightening its grip on what users are able to access online, there’s a growing speculation that the country’s so-called “Halal Internet” is imminent. Last April, the country’s head of economic affairs Ali Aqamohammadi told state newsagency IRNA that Iran plans this parallel Internet to counter “American dominance” over the Internet.

Iran has never explained in detail how such a project would operate. An alternate DNS root system creates a walled garden of sorts, but only if users don’t (or cannot) reach the rest of the world’s domains. A national-scale NAT firewall, on the other hand, is difficult to scale – as, arguably, Iran is discovering in its current efforts at censorship.

A member of Iran’s filtering committee, Mohammad Sadegh Afrasiabi, is reported by AFP as telling newspaper Hamshahri that the Iranian “national Internet” is four years away from implementation and won’t involve blocking e-mail. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.