Читать интересную книгу Великий китайский файрвол - Джеймс Гриффитс

Шрифт:

-
+

Интервал:

-
+

Закладка:

Сделать
1 ... 84 85 86 87 88 89 90 91 92 ... 101
Congressional Research Service Report RL33437, 2006, p. 1.

201

D. Ownby, Falun Gong and the Future of China, New York NY: Oxford University Press, 2008, p. 138.

202

Программа, которую разрабатывали в рамках проекта по установке комплекса цензурных фильтров на все компьютеры, продающиеся в Китае. Впоследствии от проекта отказались.

203

‘A technical analysis of the Chinese “Green Dam Youth-Escort” censorship software’, WikiLeaks, 10 June 2009, https://wikileaks.org/wiki/A_technical_analysis_of_the_Chinese_%27Green_Dam_Youth-Escort%27_censorship_software

204

J. Ng, Blocked on Weibo: what gets suppressed on China’s version of Twitter (and why), New York NY: The New Press, 2013, p. 42.

205

Интервью автора с Биллом Ся, сентябрь 2017 г.

206

V. Beiser, ‘Digital weapons help dissidents punch holes in China’s Great Firewall’, Wired, 1 November 2010, https://www.wired.com/2010/11/ff_firewallfighters/

207

I. Clarke, ‘A distributed decentralised information storage and retrieval system’, master’s thesis, University of Edinburgh, 1999, https://freenetproject.org/papers/ddisrs.pdf

208

R. Sandvik, ‘The New York Times is now available as a Tor Onion service’, The New York Times, 27 October 2017, https://open.nytimes.com/https-open-nytimes-com-the-new-york-times-as-a-tor-onion-service-e0d0b67b7482

209

J. Biggs, ‘Daily Stormer has officially retreated to the dark web’, TechCrunch, 24 August 2017, https://techcrunch.com/2017/08/24/daily-stormer-has-officially-retreated-to-the-dark-web/

210

J. Damm and S. Thomas, Chinese Cyberspaces: technological changes and political effects, Abingdon: Routledge, 2006, p. 70.

211

Раздел с информацией о программах UltraSurf и UltraReach, UltraSurf, 2018, https://ultrasurf.us/about/

212

C. Callanan, H. Dries-Ziekenheiner, A. Escudero-Pascual and R. Guerra, Leaping Over the Firewall: a review of censorship circumvention tools, Washington DC: Freedom House, 2011, https://freedomhouse.org/sites/default/files/inline_images/Censorship.pdf

213

‘J. Applebaum, Technical Analysis of the Ultrasurf Proxying Software, Cambridge MA: Tor Project, 2012, p. 1, https://media.torproject.org/misc/2012-04-16-ultrasurf-analysis.pdf

214

Сейчас UltraSurf рекомендует пользователям проверять цифровую подпись инсталлятора по списку на сайте для защиты от атак на уровне дистрибутива. См.: https://ultrasurf.us/verify/

215

‘Tor’s critique of Ultrasurf: a reply from the Ultrasurf developers’, UltraSurf, 16 April 2012, https://web.archive.org/web/20170515185101/https://ultrasurf.us/Ultrasurf-response-to-Tor-definitive-review.pdf

216

Beiser, ‘Digital weapons help dissidents punch holes in China’s Great Firewall’.

217

Устав компании Global Internet Freedom Inc., штат Северная Каролина, 2001 г.

218

J. Hudson, ‘US repeals propaganda ban, spreads government-made news to Americans’, Foreign Policy, 14 July 2013, http://foreignpolicy.com/2013/07/14/u-s-repeals-propaganda-ban-spreads-government-made-news-to-americans/

219

‘Mission’, Broadcasting Board of Governors, https://www.bbg.gov/who-we-are/mission/

220

‘Radio Free Asia’, Congressional Report, 24 October 1997, https://web.archive.org/web/20070927001620/http://opencrs.cdt.org/rpts/97-52_19971024.pdf

221

Китайский язык как будто специально создан для обхода цензурных фильтров, ведь это тональный язык, в котором мало изолированных фонем. Самый известный пример: словосочетание, которое пишется 肏你妈 и означает что-то вроде «** твою мать», произносится примерно так же, как 草泥马 («болотная лошадь») – «цао ни ма».

222

J. Ramirez, ‘Internet freedom group helps dissidents abroad’, Newsweek, 25 January 2010, http://www.newsweek.com/internet-freedom-group-helps-dissidents-abroad-71155

223

Broadcasting Board of Governors, ‘Dynamic Internet Technology Inc. in Secaucus, NJ, Mailing and Distribution Services (R604)’, 28 August 2007.

224

‘S. Rimensnyder, ‘Triangle Boy howdy’, Reason, March 2002, https://reason.com/archives/2002/03/01/triangle-boy-howdy; M. Johnson, ‘CIA-backed venture eyes anonymity software’, CNN, 15 February 2001, http://edition.cnn.com/2001/TECH/internet/02/15/anonymity.software.idg/index.html

225

S. Hsu, ‘Triangle Boy white paper’, SafeWeb, 2001, http://www.webrant.com/safeweb_site/html/www/tboy_whitepaper.html

226

P. Roberts, ‘Symantec purchases SSL VPN maker SafeWeb’, Computer World, 20 October 2003, https://www.computerworld.com/article/2572939/security0/symantec-purchases-ssl-vpn-maker-safeweb.html

227

S. Zhou, ‘Global internet freedom: corporate responsibility and the rule of law’, US Senate Subcommittee on Human Rights and the Law, 20 May 2008, https://www.judiciary.senate.gov/meetings/global-internet-freedom-corporate-responsibility-and-the-rule-of-law

228

‘H.R.2764: Consolidated Appropriations Act’, US Congress, 2008, https://www.congress.gov/bill/110th-congress/house-bill/2764/text

229

J. Pomfret, ‘US risks China’s ire with decision to fund software maker tied to Falun Gong’, The Washington Post, 11 May 2010, http://www.washingtonpost.com/wp-dyn/content/article/2010/05/11/AR2010051105154.html

230

Pomfret, ‘US risks China’s ire with decision to fund software maker tied to Falun Gong.

231

A. Sullivan, ‘Twitter maintenance?’, The Atlantic, 15 June 2009, https://www.theatlantic.com/daily-dish/archive/2009/06/twitter-i-maintenance-i/200310/

232

J. Last, ‘Tweeting while Tehran burns’, Weekly Standard, 17 August 2009, http://www.weeklystandard.com/tweeting-while-tehran-burns/article/240739

233

M. Pfeifle, ‘A Nobel Peace Prize for Twitter?’, Christian Science Monitor, 6 July 2009, https://www.csmonitor.com/Commentary/Opinion/2009/0706/p09s02-coop.html

234

Евгений Морозов. Интернет как иллюзия. Обратная сторона сети», пер. И. Кригера. М.: АСТ; Corpus, 2014.

235

‘The Clinton internet doctrine’, The Wall Street Journal, 23 January 2010, https://www.wsj.com/articles/SB10001424052748704320104575014560882205670

236

M. Lander and B. Stelter, ‘Washington taps into a potent new force in diplomacy’, The New York Times, 16 June 2009, http://www.nytimes.com/2009/06/17/world/middleeast/17media.html

237

Хотя в том году награда досталась Бараку Обаме, который провел на посту президента к тому моменту меньше года, так что, возможно, предложение наградить Twitter и не было таким абсурдным.

238

C. Smith et al., The Internet in China: a tool for freedom or suppression? Washington DC: Committee on International Relations, US House of Representatives, SN109–157, 2006, p. 1; ‘Internet in China’ [video], C-Span, 26 February 2006, https://www.c-span.org/video/?191220-1/internet-china

239

J. Goldsmith and T. Wu, Who Controls the Internet?: Illusions of a borderless world, New York NY: Oxford University Press, 2006, p. 10.

240

240

241

S. Levy, In the Plex: how Google thinks, works, and shapes our lives, New York NY: Simon and Schuster, 2011, pp. 278–80.

242

C. Thompson, ‘Google’s China problem (and China’s Google problem)’, The New York Times Magazine, 23 April 2006, http://www.nytimes.com/2006/04/23/magazine/23google.html?pagewanted=all

243

J. Goldsmith, ‘WCIT-12: an opinionated primer and hysteria-debunker’, LawFare, 30 November 2012, https://www.lawfareblog.com/wcit-12-opinionated-primer-and-hysteria-debunker Levy, In the Plex, p. 281.

244

K. Lee, ‘Google 和中国, Kai-fu’s Student Network, 2005, https://web.archive.org/web/20050812012559/http://www.kaifulee.com:80/Articles/googleandchina.htm

245

A. McLaughlin, ‘Google in

1 ... 84 85 86 87 88 89 90 91 92 ... 101
На этом сайте Вы можете читать книги онлайн бесплатно русская версия Великий китайский файрвол - Джеймс Гриффитс.
Книги, аналогичгные Великий китайский файрвол - Джеймс Гриффитс

Оставить комментарий