<div dir="ltr"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:0.8em;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;display:inline;text-transform:uppercase;color:rgb(102,102,102)"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit">AUGUST 28, 2015 | BY <a href="https://www.eff.org/about/staff/danny-obrien-0" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">DANNY O'BRIEN</a></div></div></div><div class="" style="margin:0px 0px 1em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"></div><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><h2 class="" style="margin:0.5em 0px;padding:0px;border:0px;font-family:DINWeb-CondBold,Arial,sans-serif;font-size:30px;font-style:inherit;font-variant:inherit;font-weight:normal;font-stretch:inherit;line-height:inherit">Speech that Enables Speech: China Takes Aim at Its Coders</h2></div></div><div class="" style="margin:0px 0px 1em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"></div><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:1em 0px 0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;clear:both"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:21px;color:rgb(0,0,0)">The maintainer of GoAgent, one of China's more popular censorship circumvention tools emptied out the project's <a href="https://github.com/phuslu/goagent/" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">main</a> source code <a href="https://github.com/goagent/goagent" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">repositories</a> on Tuesday. Phus Lu, the developer, renamed the repository’s description to “Everything that has a beginning has an end”. Phus Lu’s Twitter account's historywas also deleted, except for a <a href="https://twitter.com/phuslu/status/636186971631677440" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">single tweet</a> that linked to a Chinese translation of Alexander Solzhenitsyn’s <a href="http://www.washingtonpost.com/wp-dyn/content/article/2008/08/04/AR2008080401822_pf.html" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">“Live Not By Lies”</a>. That essay was originally published in 1974 on the day of the Russian dissident’s arrest for treason.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:21px;color:rgb(0,0,0)">We can guess what caused Phus Lu to erase over four years’ work on an extremely popular program from the brief comments of another Chinese anti-censorship programmer, Clowwindy. Clowwindy was the chief developer of ShadowSocks, another tool that circumvented the Great Firewall of China by creating an encrypted tunnel between a simple server and a portable client. Clowwindy also deleted his or her Github repositories last week. In a comment on the now empty Github archive Clowwindy <a href="https://en.greatfire.org/blog/2015/aug/chinese-developers-forced-delete-softwares-police" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">wrote in English</a>:</p><blockquote style="padding:10px;border-width:0px 0px 0px 3px;border-left-style:solid;border-left-color:rgb(102,102,102);font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:21px;quotes:none;color:rgb(102,102,102);background-color:rgb(242,245,246)"><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit">Two days ago the police came to me and wanted me to stop working on this. Today they asked me to delete all the code from Github. I have no choice but to obey.</p></blockquote><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:21px;color:rgb(0,0,0)"><a href="https://www.eff.org/deeplinks/2015/08/speech-enables-speech-china-takes-aim-its-coders" style="font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;line-height:inherit">https://www.eff.org/deeplinks/2015/08/speech-enables-speech-china-takes-aim-its-coders</a></p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:21px;color:rgb(0,0,0)">The author deleted that comment too shortly afterwards.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:21px;color:rgb(0,0,0)">Github, the host for both repositories, reported a DDoS attack on the days between these two incidents. While Github has not commented on the source of the current attack, <a href="https://citizenlab.org/2015/04/chinas-great-cannon/" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">the evidence strongly suggests</a> that a previous DDoS against Github in March was <a href="https://www.eff.org/deeplinks/2015/04/china-uses-unencrypted-websites-to-hijack-browsers-in-github-attack" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">conducted by the Chinese government</a> to pressure the company to remove the repositories of two other anti-censorship programs.</p><div><div class="" style="margin:0px;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:14px;color:rgb(0,0,0)"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:1em 0px 0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;clear:both"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">The Chinese government’s control of the Internet passes through regular waves of enhanced repression, often tied to a significant political event or protest. Many commentators have connected a current wave of <a href="http://chinadigitaltimes.net/2015/08/beijing-shuts-commemoration-parade-rehearsal" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">media and Internet crackdowns</a> to a forthcoming military parade commemorating World War II in Beijing on September 3.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">But even as a peak moment in a temporary spate of repression, the intimidation of GoAgent and ShadowSock’s creators represents a continuing escalation by the authorities against technologists.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">Chinese law has long forbidden the selling of telecommunication services that bypass the Great Firewall of China, as well as the creation or distribution of “harmful information”. Until recently, however, the authorities have not targeted the authors of non-commercial circumvention software, nor its users. <a href="http://www.hrichina.org/en" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">Human Rights in China</a>, a Chinese rights advocacy and research organization, told EFF that, based on its preliminary review, VPNs and circumvention software is not specifically prohibited under Chinese law. While the state interferes with people's ability to use such software, it has not outlawed the software itself.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">In November, Phus Lu wrote a public declaration to <a href="http://www.chinagfw.org/2014/11/goagent.html" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">clarify </a><a href="http://www.chinagfw.org/2014/11/goagent.html" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">this </a><a href="http://www.chinagfw.org/2014/11/goagent.html" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">p</a>oint. In the statement, he stated that he has received no money to develop GoAgent, provided no circumvention service, nor asserted any political view.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">Phus Lu’s caution at that time was prompted by the police questioning of another technologist, Xu Dong, a supporter of the Hong Kong opposition Umbrella Movement who was detained in the same month for <a href="http://chinachange.org/2014/11/12/young-it-professional-detained-for-developing-software-to-scale-gfw-of-china/" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">“picking quarrels and creating disturbances”</a>. According to the Washington-based blog China Change, Xu Dong, who goes by the nym <a href="https://twitter.com/onionhacker" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">Onionhacker</a> online, had also been working on censorship circumvention code. During his detention he was told by the police that he had committed “crimes of developing software to help Chinese Internet users scale the Great Fire Wall of China.”</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">Even if it's unclear what law Xu Dong had broken, if any, in November, the legal and political climate has grown even more aggressively anti-Internet since then. A new <a href="http://chinalawtranslate.com/2015nsl/?lang=en" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">National Security Law</a> came into effect on July 1 , which provides the authorities with a wide remit to oversee “internet information technology produces and services” that impact national security (Art. 59), as well as maintain <a href="https://en.wikipedia.org/wiki/Network_Sovereignty" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">“network sovereignty”</a> (Art. 25). It seems that is already being interpreted to include the creators of circumvention software. A sweeping <a href="http://chinalawtranslate.com/cybersecuritydraft/?lang=en" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">bill on cyber-security</a> is also in the works.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">The targeting of software developers by China is a new and worrying trend, but one that we’re seeing occur around the world. Authorities everywhere are realising that one way to sabotage free expression is to intimidate those who build the tools that enable that speech.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">Technologists like Phus Lu, Clowwindy and Xu Dong are now facing the same political scrutiny and intimidation in authoritarian regimes as independent writers, publishers, poets or journalists did in Solzhenitsyn’s time. <a href="https://www.eff.org/deeplinks/2015/04/remembering-case-established-code-speech" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit;color:rgb(204,0,0);text-decoration:none">Code is speech</a>: and using police intimidation to compel these creators to delete their code repositories is as serious a violation of human rights law as compelling a writer to burn his or her own books.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">It’s also as ultimately futile: while the Chinese authorities have chosen to target and disrupt two centralised stores of code, thousand of forked copies of the same software exist—both on other accounts on Github and in private copies around the Net. ShadowSocks and GoAgent represent hours of creative work for their authors, but the principle behind them is reproducible by many other coders. The Great Firewall may be growing more sophisticated in detecting and blocking new circumvention systems, but even as it does so, so new code blossoms.</p><p style="margin:0.5em 0px 1.3em;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:21px">Meanwhile the intimidation of programmers remains a violation of the human rights of the coder—and a blow to the rights of everyone who relies on their creativity to exercise their own rights.</p></div></div></div></div></div><div class="" style="margin:0px 0px 1em;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:14px;font-stretch:inherit;line-height:14px;color:rgb(0,0,0)"></div><div class="" style="margin-top:4em;padding:0px;border:0px;font-family:'Lucida Grande','Lucida Sans Unicode',Arial,sans-serif;font-size:0.9em;font-stretch:inherit;line-height:18px;clear:both;color:rgb(0,0,0);margin-right:0px!important;margin-bottom:1em!important;margin-left:0px!important"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px 0px 10px;padding:0px 0px 2em;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"><div class="" style="margin:0px;padding:0px;border:0px;font-family:inherit;font-size:inherit;font-style:inherit;font-variant:inherit;font-stretch:inherit;line-height:inherit"></div></div></div></div></div></div></div></div></div></div></div><div><p style="margin:0px;text-align:center;font-size:12px;font-family:Courier;color:rgb(50,51,51);background-color:rgb(168,198,254)">.O.</p>
<p style="margin:0px;text-align:center;font-size:12px;font-family:Courier;color:rgb(50,51,51);background-color:rgb(168,198,254)">..O</p>
<p style="margin:0px;text-align:center;font-size:12px;font-family:Courier;color:rgb(50,51,51);background-color:rgb(168,198,254)">OOO</p>
<p style="margin:0px 0px 10px;font-size:14px;font-family:Helvetica;color:rgb(35,35,35);background-color:rgb(168,198,254);min-height:17px"><br></p></div>-- <br><div class="gmail_signature"><div dir="ltr"><div>Cari Machet<br>NYC 646-436-7795<br><a href="mailto:carimachet@gmail.com" target="_blank">carimachet@gmail.com</a><br>AIM carismachet<br>Syria +963-099 277 3243<br>Amman +962 077 636 9407<br>Berlin +49 152 11779219 <br>Reykjavik +354 894 8650<br>Twitter: @carimachet <<a href="https://twitter.com/carimachet" target="_blank">https://twitter.com/carimachet</a>><br><br></div>7035 690E 5E47 41D4 B0E5 B3D1 AF90 49D6 BE09 2187<br><div><br>Ruh-roh, this is now necessary: This email is intended only for the <br>addressee(s) and may contain confidential information. If you are not the <br>intended recipient, you are hereby notified that any use of this <br>information, dissemination, distribution, or copying of this email without <br>permission is strictly prohibited.<br><br><br></div></div></div>
</div>