Lantern (software)

Last updated
Original author(s) Adam Fisk [1]
Stable release
7.7.1 [2]   OOjs UI icon edit-ltr-progressive.svg / 22 December 2023;46 days ago (22 December 2023)
Repository
Written in Go
Operating system Linux, OS X, Windows, Android
Type Internet censorship circumvention
License Apache License 2.0 [3]
Website lantern.io

Lantern is a free [lower-alpha 1] internet censorship circumvention tool that operates in some of the most extreme censorship environments, such as China, Iran, and Russia. [5] It uses wide variety of protocols and techniques that obfuscate network traffic and/or co-mingle traffic with protocols censors are reluctant to block. It also uses domain fronting. [6] It is not an anonymity tool like Tor. [1]

Contents

Lantern was developed and is maintained by Brave New Software Project, a 501c3 nonprofit organization. Brave New Software was founded in 2010 and “is dedicated to keeping the internet open and decentralized through user-focused open tools that solve practical problems in how the internet works for people."

Early versions of Lantern allowed users in countries having free internet access to share their internet connection with those who are in countries where the network is partly blocked. [7] Network connections will be dispersed between multiple computers running Lantern so it will not put undue stress on a single connection or computer. [8]

Lantern's CEO and lead developer is Adam Fisk, is a former lead engineer of LimeWire and LittleShoot. [9]

History

In early versions, Lantern's framework required the use of Google Talk for users to invite other trusted users from their Google Talk contacts. [8] Lantern has won awards from the US Department of State to support internet freedom. This has raised some concerns about the privacy of users, though Fisk has said the State Department is "incredibly hands off" and never dictates how they should write Lantern, or how they should talk about it. [1] [8]

In early December 2013, Lantern had a surge of Chinese users and could reach from 200 users to 10,000 users in just two weeks. [10] Soon after that, the network was almost blocked by the Chinese government. [11] Another surge occurred after the 2022 Russian invasion of Ukraine when internet freedoms in Russia were severely curtailed. [12]

The software received US$2.2 million (HK$17.1 million) in seed funding from the US State Department. [13]

Lantern is hosted on a wide variety and continually changing set of data centers around the world. It has used Digital Ocean at times, which was briefly reported as blocked in Iran during the civil unrest on January 2, 2018. [14] Users are not required to connect by invite since version 2.0 was released in 2015.

Privacy policy

Per Lantern's privacy policy document on their website

Lantern servers do not and will never log:

Lantern collects as little information about their customers as possible in order to run their service:

Our guiding principle toward data collection is to collect only the minimal data required to operate a world-class service at scale. We designed our systems to not have sensitive data about our customers; even when compelled, we cannot provide data that we do not possess.

At the beginning of 2019, it was reported that the Guangdong police had imposed penalties on the basis of the "Interim Provisions on the Administration of the International Network of Computer Information Network of the People's Republic of China" for a Lantern user to "create and use illegal channels for international networking." The fine is a thousand Yuan. The document of the punishment was publicized on the “Guangdong Public Security Law Enforcement Information Disclosure Platform”. [16] [ non-primary source needed ]
In March of 2022 it was reported that Russian users were employing Lantern to bypass censorship measures put in place by the Russian government. [17]

See also

Notes

  1. Lantern's open source repository has been archived. [4]

Related Research Articles

<span class="mw-page-title-main">Proxy server</span> Computer server that makes and receives requests on behalf of a user

In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and performance in the process.

China censors both the publishing and viewing of online material. Many controversial events are censored from news coverage, preventing many Chinese citizens from knowing about the actions of their government, and severely restricting freedom of the press. China's censorship includes the complete blockage of various websites, apps, video games, inspiring the policy's nickname, the "Great Firewall of China", which blocks websites. Methods used to block websites and pages include DNS spoofing, blocking access to IP addresses, analyzing and filtering URLs, packet inspection, and resetting connections.

Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network usage, troubleshooting network performance, ensuring that data is in the correct format, checking for malicious code, eavesdropping, and internet censorship, among other purposes. There are multiple headers for IP packets; network equipment only needs to use the first of these for normal operation, but use of the second header is normally considered to be shallow packet inspection despite this definition.

The Great Firewall is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. Its role in internet censorship in China is to block access to selected foreign websites and to slow down cross-border internet traffic. The Great Firewall operates by checking transmission control protocol (TCP) packets for keywords or sensitive words. If the keywords or sensitive words appear in the TCP packets, access will be closed. If one link is closed, more links from the same machine will be blocked by the Great Firewall. The effect includes: limiting access to foreign information sources, blocking foreign internet tools and mobile apps, and requiring foreign companies to adapt to domestic regulations.

<span class="mw-page-title-main">Psiphon</span> Free and open-source internet circumvention tool

Psiphon is a free and open-source Internet censorship circumvention tool that uses a combination of secure communication and obfuscation technologies, such as a VPN, SSH, and a Web proxy. Psiphon is a centrally managed and geographically diverse network of thousands of proxy servers, using a performance-oriented, single- and multi-hop routing architecture.

<span class="mw-page-title-main">Freegate</span>

Freegate is a software application developed by Dynamic Internet Technology (DIT) that enables internet users from mainland China, South Korea, North Korea, Syria, Vietnam, Iran, United Arab Emirates, Germany, New Zealand, Australia, and the United Kingdom among others, to view websites blocked by their governments. The program takes advantage of a range of proxy servers called Dynaweb. This allows users to bypass Internet firewalls that block web sites by using DIT's Peer-to-peer (P2P)-like proxy network system. FreeGate's anti-censorship capability is further enhanced by a new, unique encryption and compression algorithm in the versions of 6.33 and above. Dynamic Internet Technology estimates Freegate had 200,000 users in 2004. The maintainer and CEO of DIT is Bill Xia.

<span class="mw-page-title-main">Internet censorship</span> Legal control of the internet

Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state. Internet censorship may also put restrictions on what information can be made internet accessible. Organizations providing internet access – such as schools and libraries – may choose to preclude access to material that they consider undesirable, offensive, age-inappropriate or even illegal, and regard this as ethical behaviour rather than censorship. Individuals and organizations may engage in self-censorship of material they publish, for moral, religious, or business reasons, to conform to societal norms, political views, due to intimidation, or out of fear of legal or other consequences.

An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable. It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet. It accesses the Internet on the user's behalf, protecting personal information of the user by hiding the client computer's identifying information such as IP addresses. Anonymous proxy is the opposite of transparent proxy, which sends user information in the connection request header.

<span class="mw-page-title-main">Tor (network)</span> Free and open-source anonymity network based on onion routing

Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic via a free, worldwide, volunteer overlay network that consists of more than seven thousand relays.

The Golden Shield Project, also named National Public Security Work Informational Project, is the Chinese nationwide network-security fundamental constructional project by the e-government of the People's Republic of China. This project includes a security management information system, a criminal information system, an exit and entry administration information system, a supervisor information system, a traffic management information system, among others.

<span class="mw-page-title-main">Ultrasurf</span>

UltraSurf is a freeware Internet censorship circumvention product created by UltraReach Internet Corporation. The software bypasses Internet censorship and firewalls using an HTTP proxy server, and employs encryption protocols for privacy.

Internet censorship circumvention, also referred to as going over the wall or scientific browsing in China, is the use of various methods and tools to bypass internet censorship.

<span class="mw-page-title-main">VPN blocking</span>

VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems. Often used by large organizations such as national governments or corporations, it can act as a tool for computer security or Internet censorship by preventing the use of VPNs to bypass network firewall systems.

Hotspot Shield is a public VPN service operated by AnchorFree, Inc. Hotspot Shield was used to bypass government censorship during the Arab Spring protests in Egypt, Tunisia, and Libya.

uProxy was an extension for Chrome and Firefox, which allowed users to access the Internet via a web proxy. This project has been superseded by Outline VPN. The extension works by enabling a user to share their Internet connection with someone else. Google Ideas provided funding for the development which was carried out by the University of Washington and Brave New Software — the same organization behind the anti-censorship tool Lantern. The extension is intended to allow users to get more secure access to the Internet without being monitored. It is free/libre software under Apache license 2.0. The software has been discontinued, stating on their website " uProxy was an open source project led by the University of Washington and seeded by Jigsaw. Although the project is no longer supported, the code is still available on GitHub."

<span class="mw-page-title-main">Network sovereignty</span> Effort to create boundaries on a network

In internet governance, network sovereignty, also called digital sovereignty or cyber sovereignty, is the effort of a governing entity, such as a state, to create boundaries on a network and then exert a form of control, often in the form of law enforcement over such boundaries.

<span class="mw-page-title-main">Domain fronting</span> Technique for Internet censorship circumvention

Domain fronting is a technique for Internet censorship circumvention that uses different domain names in different communication layers of an HTTPS connection to discreetly connect to a different target domain than is discernable to third parties monitoring the requests and connections.

<span class="mw-page-title-main">HMA (VPN)</span> Virtual private network service founded in 2005

HMA is a VPN service founded in 2005 in the United Kingdom. It has been a subsidiary of the Czech cybersecurity company Avast since 2016.

A virtual private network (VPN) service provides a proxy server to help users bypass Internet censorship such as geoblocking and users who want to protect their communications against data profiling or MitM attacks on hostile networks.

<span class="mw-page-title-main">Snowflake (software)</span> Anti-censorship software

Snowflake is a software package for assisting others in circumventing internet censorship by relaying data requests. Snowflake relay nodes are meant to be created by people in countries where Tor and Snowflake are not blocked. People under censorship then use a Snowflake client, packaged with the Tor Browser or Onion Browser, to access the Tor network, using Snowflake relays as proxy servers. Access to the Tor network can in turn give access to other blocked services. A Snowflake node can be created by either installing a browser extension, installing a stand-alone program, or browsing a webpage with an embedded Snowflake relay. The node runs whenever the browser or program is connected to the internet.

References

  1. 1 2 3 Guthrie Weissman, Cale (October 22, 2013). "Here's an anti-Internet censorship program for activists by activists". Pando. Archived from the original on 4 Jun 2021. Retrieved 13 March 2014.
  2. "Release 7.7.1". 22 December 2023. Retrieved 19 January 2024.
  3. "LICENSE". GitHub. 27 August 2015. Retrieved 27 August 2015.
  4. "getLantern/Lantern". github.com. Retrieved 24 Aug 2020.
  5. "Meet the Secretive US Company Building an 'Unbreakable' Internet Inside Russia". 24 March 2022.
  6. Fifield D, Lan C, Hynes R, Wegmann P, Paxson V (2015-05-15). "Blocking-resistant communication through domain fronting". Proceedings on Privacy Enhancing Technologies. Proceedings on Privacy Enhancing Technologies 2015. 2015 (2): 46–64. doi: 10.1515/popets-2015-0009 . S2CID   5626265.
  7. "Anti-firewall tool Lantern infiltrated by Chinese censors". South China Morning Post. 11 December 2013. Retrieved 13 March 2014.
  8. 1 2 3 McKenzie, Jessica (October 22, 2013). "Could State Department Funded Lantern Be Bigger, Better Tor?". Archived from the original on 26 March 2014. Retrieved 13 March 2014.
  9. "NEXT GENERATION ANTI-CENSORSHIP TOOLS - PANELIST BIOS". techATstate. March 6, 2013. Archived from the original on 29 April 2013. Retrieved 13 March 2014.
  10. "Lantern Program Allows Chinese to Dodge Firewall - China Digital Times (CDT)". China Digital Times . China Digital Times. December 5, 2013. Retrieved 13 March 2014.
  11. "China blocks censorship circumvention software Lantern after a surge of Chinese users". TECH IN ASIA. December 11, 2013. Retrieved 13 March 2014.
  12. "Meet the Secretive US Company Building an 'Unbreakable' Internet Inside Russia". Vice. March 24, 2022. Retrieved 25 March 2022.
  13. "US-funded Lantern program allows Chinese to dodge Great Firewall and view banned websites". South China Morning Post. 4 December 2013. Retrieved 13 January 2016.
  14. "January 3, 2018 Episode Transcript". The Current . CBC. Retrieved 4 January 2018.
  15. "Lantern | Open Internet For All". lantern.io. Retrieved 2023-02-10.
  16. "韶雄公(网)行罚决字 [2019]1号". 广东公安执法信息公开平台 (in Chinese (China)). 2018-12-28. Archived from the original on 2019-01-05. Retrieved 2019-01-05.
  17. "Meet the Secretive US Company Building an 'Unbreakable' Internet Inside Russia". 24 March 2022.