Forgot your password?
typodupeerror
Censorship Australia Education Electronic Frontier Foundation Government

Australian Networks Block Community University Website 97

Posted by timothy
from the you-cannot-read-this-error-message dept.
Peter Eckersley writes "At the EFF we were recently contacted by the organisers of the Melbourne Free University (MFU), an Australian community education group, whose website had been unreachable from a number of Australian ISPs since the 4th of April. It turns out that the IP address of MFU's virtual host has been black-holed by several Australian networks; there is suggestive but not conclusive evidence that this is a result of some sort of government request or order. It is possible that MFU and 1200 other sites that use that IP address are the victims of a block that was put in place for some other reason. Further technical analysis and commentary is in our blog post."
This discussion has been archived. No new comments can be posted.

Australian Networks Block Community University Website

Comments Filter:
  • by sirwired (27582) on Thursday April 11, 2013 @04:02PM (#43426079)

    Hmmm... which is more likely? An utterly inoffensive group providing free education materials on the internet is the victim of a shadowy government conspiracy, or that one of the 1,200 other sites on the same IP did something sufficiently stupid as to attract govt. attention.

    I know that the summary and the article both mention that the latter is a possibility, but the headline, summary, and article, are all written as if the most likely possibility was that MFU was targeted directly.

    I suspect that the ISP got a request from somebody about one of the hosted sites doing something very naughty, and the person who's job it was to pay attention to such requests didn't get them or ignored them, so an IP block was the next step.

  • by plover (150551) on Thursday April 11, 2013 @06:43PM (#43427959) Homepage Journal

    Completely off-topic question regarding your sig:

    Do you care about the security of your wireless mouse?

    Did you ever solve your mousey dilemma? If not, Bluetooth v2.1 solves it by default (if you're careful about avoiding interception during the pairing process.) The bigger question is how you determine which version of Bluetooth stack a vendor's mouse supports?

NOWPRINT. NOWPRINT. Clemclone, back to the shadows again. - The Firesign Theater

Working...