SlideShare a Scribd company logo
Charles Mok 莫乃光 | Cyber Policy Center, Stanford University | Internet Society | ICANN-APAC TWNIC Engagement Forum | 2023.5.19
Compliance through
Compulsion
The trend and impact of access restriction becoming a policy tool
for compliance
Censorship is almost as old as IP address and DNS
• GFW of China (and any
other censor)
• DNS injection
• Packet dropping
• DNS poisoning
• Content/packet
inspection
• etc….
Views on access restrictions
from another era
• “DNS RPZ and similar DNS blocking
technologies work very well when the
protected users’ interests are aligned with
their ISP’s interests” (e.g. malware)
• “On the other hand it’s merely a minor and
temporary inconvenience to have domain
names that would hurt a user not work any
more that the user likes and depends on…”
(e.g. pirated movies, but users can use
VPN)
• “There would be no need to mandate
blocking of domain names users
fi
nd
harmful; the invisible hand of the market
would automatically take care of the matter.”
• Paul Vixie, 2011.
So, when did censorship become “access restriction”?
• Let’s take the example of the UK's Protective Domain Name Service (PDNS)
• PDNS was built to hamper the use of DNS for malware distribution and operation. It has been created by
the National Cyber Security Centre (NCSC), and is implemented by Nominet.
• PDNS is a recursive resolver, which means it
fi
nds answers to DNS queries. Management of your own
domains (authoritative DNS) is done separately to this NCSC service and will not be a
ff
ected by the
adoption of PDNS.
• It is a free and reliable internet accessible DNS service and is one of the NCSC’s widely deployed Active
Cyber Defencecapabilities. It has been mandated for use by central government departments by the
Cabinet O
ffi
ce but is also available to other organisations that wish to use it (see eligibility section below).
• PDNS prevents access to domains known to be malicious, by simply not resolving them. Preventing access
to malware, ransomware, phishing attacks, viruses, malicious sites and spyware at source makes the
network more secure.
• https://www.ncsc.gov.uk/information/pdns
• It is not available to the private sector.

Recommended for you

security in IOT.pptx
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptx

This document discusses security issues related to the Internet of Things (IoT) and smart buildings. It describes the various phases of an IoT system from data collection to delivery. It then discusses security threats in three dimensions: by phase (e.g. data leakage), by architecture (e.g. external attacks), and by component (e.g. sensors). Specific attacks like denial of service attacks and IP spoofing are explained. Finally, the document discusses privacy threats in smart buildings related to user behavior, location privacy from wireless networks and RFID, and visual privacy from video surveillance.

#iot
Paper id 2820149
Paper id 2820149Paper id 2820149
Paper id 2820149

Paper id 2820149

Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things

The Internet of Things describes a world in which smart technologies enable objects with a network to communicate with each other and interface with humans effortlessly. This connected world of convenience and technology does not come without its drawbacks, as interconnectivity implies hackability. Security Solutions for Hyperconnectivity and the Internet of Things offers insights from cutting-edge research about the strategies and techniques that can be implemented to protect against cyber-attacks.

So the good guys use it too, right?
Hong Kong after NSL
• Hong Kong’s National Security Law requires ISPs to block access to websites, for the
fi
rst
time in Hong Kong (but the NSL is imposed from the central government and not a local
law).
• It’s unclear whether the national security police mandates the use of which technologies to
do the job.
• It is believed that various ISPs are using DNS RPZ and IP address blocking.
• Since May 2023, ISPs are provided or incentivized with a “safe harbor provision” to relieve
them of liabilities if they comply with orders to block.
• More attempts will be made with local legislations to empower the authorities to remove
websites deemed undesirable (e.g. cybercrime law, cybersecurity law, misinformation law,
local version of national security law, etc. etc.)
• Similar trends all over Asia.
But it can be the US too
• One country, many systems
How about Taiwan?

Recommended for you

Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.

This document discusses the technical, legal, and political issues related to combating terrorism on the internet. It notes that terrorists increasingly use the internet and encryption to communicate and spread propaganda. From a technical perspective, challenges include the large and growing amount of data online, anonymity tools like TOR, and the difficulty of regulating content on distributed networks. Legally, countries struggle to balance security, privacy and freedom of expression. Politically, questions arise around jurisdiction, international cooperation, and which entities are responsible when the infrastructure is distributed across borders.

The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity

The document summarizes a workshop discussion on the challenges of digital forensics in the cloud computing era. Participants including lawyers, computer scientists, and law enforcement discussed both technical and legal issues. Key technical challenges discussed were that cloud computing data is distributed across networks in various deployment models, requiring different forensic techniques. Additionally, in cloud systems data may not remain in one location as in traditional forensics, and encryption of data in transit and execution makes analysis more difficult. Legal issues around jurisdiction and access to cloud data across international borders were also raised. The group aims to draft a paper further exploring these challenges to digital forensics in light of increased cloud computing.

Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency

This document discusses various techniques to minimize transparency in information flow across computer networks. It begins by explaining how digital information is transmitted using the TCP/IP and OSI models. It then discusses tools like packet sniffers that can intercept network traffic. Various attacks that exploit transparency at different layers are described. Virtual private networks (VPNs) are presented as a method to secure information flow at the network layer through encryption. The document demonstrates traffic analysis with and without a VPN and discusses other strategies like Tor onion services and HTTPS. It concludes by addressing frequently asked questions about VPN services.

cyber securityinformation securityvpn
• Charles Mok 莫乃光
• Visiting Scholar, Cyber Policy
Center, Stanford University
• Trustee, Internet Society
• Founder, Tech for Good Asia
•
•

More Related Content

Similar to ICANN TWNIC TWIGF 2023: Compliance through Compulsion

TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
tahaniali27
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
Marcus Leaning
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
security in IOT.pptx
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptx
Tulasi72
 
Paper id 2820149
Paper id 2820149Paper id 2820149
Paper id 2820149
IJRAT
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
Maurice Dawson
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Abzetdin Adamov
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
Tech and Law Center
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
Usman Arshad
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
Sean Whalen
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
FreefireGarena22
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
James Steele
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
afaque jaya
 
Mongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons LearnedMongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons Learned
Stanford University
 
A Look At The Consequences Of Internet Censorship Through An ISP Lens
A Look At The Consequences Of Internet Censorship Through An ISP LensA Look At The Consequences Of Internet Censorship Through An ISP Lens
A Look At The Consequences Of Internet Censorship Through An ISP Lens
April Smith
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
yogendra singh chahar
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
Excel Asama
 
Building the silver lining seminar slides
Building the silver lining   seminar slidesBuilding the silver lining   seminar slides
Building the silver lining seminar slides
Exponential_e
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
Jay McLaughlin
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
Humza Sajid
 

Similar to ICANN TWNIC TWIGF 2023: Compliance through Compulsion (20)

TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
security in IOT.pptx
security in IOT.pptxsecurity in IOT.pptx
security in IOT.pptx
 
Paper id 2820149
Paper id 2820149Paper id 2820149
Paper id 2820149
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
dccn ppt-1.pptx
dccn ppt-1.pptxdccn ppt-1.pptx
dccn ppt-1.pptx
 
What are data networks?
What are data networks?What are data networks?
What are data networks?
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Mongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons LearnedMongoose H4D 2021 Lessons Learned
Mongoose H4D 2021 Lessons Learned
 
A Look At The Consequences Of Internet Censorship Through An ISP Lens
A Look At The Consequences Of Internet Censorship Through An ISP LensA Look At The Consequences Of Internet Censorship Through An ISP Lens
A Look At The Consequences Of Internet Censorship Through An ISP Lens
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Net Neutrality Capacity Building Seminar
Net Neutrality Capacity Building SeminarNet Neutrality Capacity Building Seminar
Net Neutrality Capacity Building Seminar
 
Building the silver lining seminar slides
Building the silver lining   seminar slidesBuilding the silver lining   seminar slides
Building the silver lining seminar slides
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
 
VPN In Details
VPN In DetailsVPN In Details
VPN In Details
 

More from Charles Mok

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
Charles Mok
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
Charles Mok
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
Charles Mok
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Charles Mok
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
Charles Mok
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Charles Mok
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
Charles Mok
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
Charles Mok
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
Charles Mok
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
Charles Mok
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
Charles Mok
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Charles Mok
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
Charles Mok
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
Charles Mok
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
Charles Mok
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
Charles Mok
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
Charles Mok
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
Charles Mok
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
Charles Mok
 

More from Charles Mok (20)

Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Threats to the Internet
Threats to the Internet Threats to the Internet
Threats to the Internet
 
Cyber Risks in Hong Kong
Cyber Risks in Hong KongCyber Risks in Hong Kong
Cyber Risks in Hong Kong
 
全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇全球數位威權趨勢及對台灣的挑戰和機遇
全球數位威權趨勢及對台灣的挑戰和機遇
 
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology FragmentationDigital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
Digital Authoritarianism, Asian Techno-Geopolitics and Technology Fragmentation
 
HKU Tech for Good year2.pdf
HKU Tech for Good year2.pdfHKU Tech for Good year2.pdf
HKU Tech for Good year2.pdf
 
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for DemocracyTechnology4democracy: The Potential of Web3 and Blockchain for Democracy
Technology4democracy: The Potential of Web3 and Blockchain for Democracy
 
APAC Data Center Infrastructure Observations
APAC Data Center Infrastructure ObservationsAPAC Data Center Infrastructure Observations
APAC Data Center Infrastructure Observations
 
Chinese Digital Repression
Chinese Digital RepressionChinese Digital Repression
Chinese Digital Repression
 
Technology, Data and Ethics
Technology, Data and EthicsTechnology, Data and Ethics
Technology, Data and Ethics
 
全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇全球數位威權趨勢對台灣的挑戰和機遇
全球數位威權趨勢對台灣的挑戰和機遇
 
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf台灣數位經濟及區塊鏈的機遇與挑戰.pdf
台灣數位經濟及區塊鏈的機遇與挑戰.pdf
 
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdfCensorship, Surveillance and Cyber Threats in Hong Kong.pdf
Censorship, Surveillance and Cyber Threats in Hong Kong.pdf
 
HKU Tech for Good.pdf
HKU Tech for Good.pdfHKU Tech for Good.pdf
HKU Tech for Good.pdf
 
Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...Why open and interoperable Internet infrastructure is key to the Internet's c...
Why open and interoperable Internet infrastructure is key to the Internet's c...
 
Misinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the WorldMisinformation, Fake News and Harmful Content Laws in the World
Misinformation, Fake News and Harmful Content Laws in the World
 
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and TrendsFrom Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
From Re-Opening to Recovery: Post-COVID Security and Privacy Issues and Trends
 
From Crypto to Trust and Identity
From Crypto to Trust and IdentityFrom Crypto to Trust and Identity
From Crypto to Trust and Identity
 
Have you AI'ed today? A Reality Check
Have you AI'ed today? A Reality CheckHave you AI'ed today? A Reality Check
Have you AI'ed today? A Reality Check
 
The Trouble with "Fake News" Laws
The Trouble with "Fake News" LawsThe Trouble with "Fake News" Laws
The Trouble with "Fake News" Laws
 

Recently uploaded

一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
taqyea
 
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
ffg01100
 
University of Otago degree offer diploma Transcript
University of Otago degree offer diploma TranscriptUniversity of Otago degree offer diploma Transcript
University of Otago degree offer diploma Transcript
ubufe
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
taqyea
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
ubufe
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
Erkinjon Erkinov
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
jom pom
 
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证��)英国赫瑞瓦特大学毕业证如何办理
taqyea
 
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptxSlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
NandakumarP24
 
Book dating , international dating phgra
Book dating , international dating phgraBook dating , international dating phgra
Book dating , international dating phgra
thomaskurtha9
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Thiên Đường Tình Yêu
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
taqyea
 
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
taqyea
 
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
taqyea
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
exgf28
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
byubyu7
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
taqyea
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
Serva AppLabs
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99
 

Recently uploaded (20)

一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
一比一原版(bu毕业证书)英国伯恩茅斯大学毕业证如何办理
 
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
 
University of Otago degree offer diploma Transcript
University of Otago degree offer diploma TranscriptUniversity of Otago degree offer diploma Transcript
University of Otago degree offer diploma Transcript
 
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
一比一原版(greenwich毕业证书)英国格林威治大学毕业证如何办理
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
 
Tarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy FearsTarun Gaur On Data Breaches and Privacy Fears
Tarun Gaur On Data Breaches and Privacy Fears
 
About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
 
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
一比一原版(heriotwatt毕业证书)英国赫瑞瓦特大学毕业证如何办理
 
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptxSlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
SlideEgg_200767-ICC Mens T20 World Cup 2024.pptx
 
Book dating , international dating phgra
Book dating , international dating phgraBook dating , international dating phgra
Book dating , international dating phgra
 
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhấtBai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5  hot nhất
Bai-Tập-Tiếng-Anh-On-Tập-He lớp 1- lớp 5 hot nhất
 
一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理一比一原版(aber毕业证)亚伯大学毕业证如何办理
一比一原版(aber毕业证)亚伯大学毕业证如何办理
 
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
 
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
一比一原版(lu毕业证书)英国拉夫堡大学毕业证如何办理
 
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirtsJarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
Jarren Duran Fuck EM T shirts Jarren Duran Fuck EM T shirts
 
Corporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptxCorporate Minimal Newspaper Headline Style Newsletter.pptx
Corporate Minimal Newspaper Headline Style Newsletter.pptx
 
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
一比一原版(soas毕业证书)英国伦敦大学亚非学院毕业证如何办理
 
Future Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on WebsitesFuture Trends What's Next for UI UX Design on Websites
Future Trends What's Next for UI UX Design on Websites
 
Megalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor TerpercayaMegalive99 Situs Betting Online Gacor Terpercaya
Megalive99 Situs Betting Online Gacor Terpercaya
 

ICANN TWNIC TWIGF 2023: Compliance through Compulsion

  • 1. Charles Mok 莫乃光 | Cyber Policy Center, Stanford University | Internet Society | ICANN-APAC TWNIC Engagement Forum | 2023.5.19 Compliance through Compulsion The trend and impact of access restriction becoming a policy tool for compliance
  • 2. Censorship is almost as old as IP address and DNS • GFW of China (and any other censor) • DNS injection • Packet dropping • DNS poisoning • Content/packet inspection • etc….
  • 3. Views on access restrictions from another era • “DNS RPZ and similar DNS blocking technologies work very well when the protected users’ interests are aligned with their ISP’s interests” (e.g. malware) • “On the other hand it’s merely a minor and temporary inconvenience to have domain names that would hurt a user not work any more that the user likes and depends on…” (e.g. pirated movies, but users can use VPN) • “There would be no need to mandate blocking of domain names users fi nd harmful; the invisible hand of the market would automatically take care of the matter.” • Paul Vixie, 2011.
  • 4. So, when did censorship become “access restriction”? • Let’s take the example of the UK's Protective Domain Name Service (PDNS) • PDNS was built to hamper the use of DNS for malware distribution and operation. It has been created by the National Cyber Security Centre (NCSC), and is implemented by Nominet. • PDNS is a recursive resolver, which means it fi nds answers to DNS queries. Management of your own domains (authoritative DNS) is done separately to this NCSC service and will not be a ff ected by the adoption of PDNS. • It is a free and reliable internet accessible DNS service and is one of the NCSC’s widely deployed Active Cyber Defencecapabilities. It has been mandated for use by central government departments by the Cabinet O ffi ce but is also available to other organisations that wish to use it (see eligibility section below). • PDNS prevents access to domains known to be malicious, by simply not resolving them. Preventing access to malware, ransomware, phishing attacks, viruses, malicious sites and spyware at source makes the network more secure. • https://www.ncsc.gov.uk/information/pdns • It is not available to the private sector.
  • 5. So the good guys use it too, right?
  • 6. Hong Kong after NSL • Hong Kong’s National Security Law requires ISPs to block access to websites, for the fi rst time in Hong Kong (but the NSL is imposed from the central government and not a local law). • It’s unclear whether the national security police mandates the use of which technologies to do the job. • It is believed that various ISPs are using DNS RPZ and IP address blocking. • Since May 2023, ISPs are provided or incentivized with a “safe harbor provision” to relieve them of liabilities if they comply with orders to block. • More attempts will be made with local legislations to empower the authorities to remove websites deemed undesirable (e.g. cybercrime law, cybersecurity law, misinformation law, local version of national security law, etc. etc.) • Similar trends all over Asia.
  • 7. But it can be the US too • One country, many systems
  • 9. • Charles Mok 莫乃光 • Visiting Scholar, Cyber Policy Center, Stanford University • Trustee, Internet Society • Founder, Tech for Good Asia • •