https://cyber.harvard.edu/difficultproblems/history/Problem_Statement_and_Introduction?feed=atom&Problem Statement and Introduction - Revision history2024-03-28T08:53:14ZRevision history for this page on the wikiMediaWiki 1.39.5https://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1769&oldid=prevKbharris at 02:10, 6 February 20112011-02-06T02:10:26Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:10, 5 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l34">Line 34:</td>
<td colspan="2" class="diff-lineno">Line 34:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In our view, a host that consistently provides authentic videos of interest to the human rights community, media, and concerned people throughout the world would be a strong step forward. By developing a consistent track record of impact, such a site could then develop a strong reputation encouraging new content to be sent. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In our view, a host that consistently provides authentic videos of interest to the human rights community, media, and concerned people throughout the world would be a strong step forward. By developing a consistent track record of impact, such a site could then develop a strong reputation encouraging new content to be sent. </div></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del style="font-weight: bold; text-decoration: none;"></del></div></td><td colspan="2" class="diff-side-added"></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Solutions==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Solutions==</div></td></tr>
</table>Kbharrishttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1768&oldid=prevKbharris at 02:08, 6 February 20112011-02-06T02:08:39Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:08, 5 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l25">Line 25:</td>
<td colspan="2" class="diff-lineno">Line 25:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Access=== </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Access=== </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the Internet or particular websites.<ref>Or in the case of Egypt, currently, the entire <del style="font-weight: bold; text-decoration: none;">internet</del>.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as VPNs, public key encryption, or other methods of evading Internet-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the Internet or particular websites.<ref>Or in the case of Egypt, currently, the entire <ins style="font-weight: bold; text-decoration: none;">Internet</ins>.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as VPNs, public key encryption, or other methods of evading Internet-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td></tr>
</table>Kbharrishttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1767&oldid=prevKbharris at 02:06, 6 February 20112011-02-06T02:06:51Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:06, 5 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l13">Line 13:</td>
<td colspan="2" class="diff-lineno">Line 13:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==The Problems==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==The Problems==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The raw number of video-capable devices operating in oppressive regimes suggests capacity for a lot more video sharing than currently occurs.<ref>Cf. http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use. While many of the phones operating in oppressive regimes will not have video cameras, it is reasonable to think that a significant portion do have recording capabilities, meaning that millions of such cameras are currently operational.</ref> There are well-documented problems facing the people who share videos online right now that may also serve to prevent the medium from reaching its full potential. This section seeks to identify some of those problems and <del style="font-weight: bold; text-decoration: none;">begin </del>to sketch out the solutions developed more fully in subsequent sections of our project.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The raw number of video-capable devices operating in oppressive regimes suggests capacity for a lot more video sharing than currently occurs.<ref>Cf. http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use. While many of the phones operating in oppressive regimes will not have video cameras, it is reasonable to think that a significant portion do have recording capabilities, meaning that millions of such cameras are currently operational.</ref> There are well-documented problems facing the people who share videos online right now that may also serve to prevent the medium from reaching its full potential. This section seeks to identify some of those problems and <ins style="font-weight: bold; text-decoration: none;">begins </ins>to sketch out the solutions developed more fully in subsequent sections of our project.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Reprisals===</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Reprisals===</div></td></tr>
</table>Kbharrishttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1766&oldid=prevKbharris at 02:05, 6 February 20112011-02-06T02:05:39Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 22:05, 5 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l21">Line 21:</td>
<td colspan="2" class="diff-lineno">Line 21:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>First, and perhaps most obviously, the person doing the filming or uploading/exfiltrating the video may be targeted for punishment.<ref>See http://news.bbc.co.uk/2/hi/8487179.stm (describing the arrest of one Burmese journalist for cooperation with news media and noting that another journalist received a 20 year prison sentence “after a military court found she had provided video for the Democratic Voice of Burma.”)</ref> Authorities may have a number of ways of identifying the source of video that appears online. For example, they could be monitoring or logging Internet traffic within their borders, allowing them to easily track less sophisticated Internet users who attempt to post data. Even more sophisticated users will be vulnerable to governments that use correspondingly sophisticated snooping techniques. In addition, governments might be able to use metadata or circumstantial evidence from the videos after they are broadcast to identify authors. Even if such information is not immediately accessible to the average web user, governments may exert pressure on host websites to reveal information kept internally, such as server logs or private messages.<ref>For example, Yahoo! provided substantial information regarding at least one journalist to the Chinese government in 2005, citing its obligation “to operate within each country's laws.” See http://news.bbc.co.uk/2/hi/4221538.stm.</ref> Large multinational corporations that serve as content or communication platforms might be particularly susceptible to this form of government pressure because of the interests of their employees and shareholders.<ref>See generally Goldsmith & Wu, Who Controls the Internet 49–86 (2006).</ref> </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>First, and perhaps most obviously, the person doing the filming or uploading/exfiltrating the video may be targeted for punishment.<ref>See http://news.bbc.co.uk/2/hi/8487179.stm (describing the arrest of one Burmese journalist for cooperation with news media and noting that another journalist received a 20 year prison sentence “after a military court found she had provided video for the Democratic Voice of Burma.”)</ref> Authorities may have a number of ways of identifying the source of video that appears online. For example, they could be monitoring or logging Internet traffic within their borders, allowing them to easily track less sophisticated Internet users who attempt to post data. Even more sophisticated users will be vulnerable to governments that use correspondingly sophisticated snooping techniques. In addition, governments might be able to use metadata or circumstantial evidence from the videos after they are broadcast to identify authors. Even if such information is not immediately accessible to the average web user, governments may exert pressure on host websites to reveal information kept internally, such as server logs or private messages.<ref>For example, Yahoo! provided substantial information regarding at least one journalist to the Chinese government in 2005, citing its obligation “to operate within each country's laws.” See http://news.bbc.co.uk/2/hi/4221538.stm.</ref> Large multinational corporations that serve as content or communication platforms might be particularly susceptible to this form of government pressure because of the interests of their employees and shareholders.<ref>See generally Goldsmith & Wu, Who Controls the Internet 49–86 (2006).</ref> </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Second, the person or people filmed in human rights media might be targeted for punishment. After the 2009 protests in Iran, the government circulated photographs and stills from videos in an attempt to identify anti-government protesters.<ref>See http://www.gerdab.ir/fa/pages/?cid=422; http://hub.witness.org/en/node/11999</ref> Traditionally, documentary filmmakers in the human rights arena operated by asking for consent from their subjects,<ref> A discussion regarding informed consent and the need to protect subjects can be found at http://blog.witness.org/2010/06/protecting-yourself-your-subjects-and-your-human-rights-videos-on-youtube/</ref> yet shooting spontaneous video on the street or the use video obtained second-hand may not afford filmmakers the ability to request or obtain consent from subjects. Accordingly, the need to protect the subjects depicted within videos is particularly acute for filmmakers who wish to broadcast recordings of events that may lead to reprisals against subjects of the video. Videographers might also desire to protect the dignity of a subject who has been subjected to certain types of treatment.<ref>For example, the treatment of Emad el-Kabir at the hands of the Egyptian police was particularly gruesome and documented on cell phone video. See http://www.time.com/time/world/article/0,8599,1581608,00.html. While activists were able to convince the victim to come forward in this case, in future cases they might want to disseminate such footage without providing the name or identity of the victim, particularly if the victim is unknown.</ref></div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Second, the person or people filmed in human rights media might be targeted for punishment. After the 2009 protests in Iran, the government circulated photographs and stills from videos in an attempt to identify anti-government protesters.<ref>See http://www.gerdab.ir/fa/pages/?cid=422; http://hub.witness.org/en/node/11999</ref> Traditionally, documentary filmmakers in the human rights arena operated by asking for consent from their subjects,<ref> A discussion regarding informed consent and the need to protect subjects can be found at http://blog.witness.org/2010/06/protecting-yourself-your-subjects-and-your-human-rights-videos-on-youtube/</ref> yet shooting spontaneous video on the street or the use <ins style="font-weight: bold; text-decoration: none;">of </ins>video obtained second-hand may not afford filmmakers the ability to request or obtain consent from subjects. Accordingly, the need to protect the subjects depicted within videos is particularly acute for filmmakers who wish to broadcast recordings of events that may lead to reprisals against subjects of the video. Videographers might also desire to protect the dignity of a subject who has been subjected to certain types of treatment.<ref>For example, the treatment of Emad el-Kabir at the hands of the Egyptian police was particularly gruesome and documented on cell phone video. See http://www.time.com/time/world/article/0,8599,1581608,00.html. While activists were able to convince the victim to come forward in this case, in future cases they might want to disseminate such footage without providing the name or identity of the victim, particularly if the victim is unknown.</ref></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Access=== </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Access=== </div></td></tr>
</table>Kbharrishttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1736&oldid=prevEfletcher at 00:08, 5 February 20112011-02-05T00:08:55Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 20:08, 4 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l1">Line 1:</td>
<td colspan="2" class="diff-lineno">Line 1:</td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The average citizen’s ability to capture video in countries around the world – in the form of cheap digital recorders and cell phone cameras – combined with the spread of free online video hosting websites has created a powerful new tool for human rights. But, with some notable exceptions,<ref> See, e.g., http://en.wikipedia.org/wiki/Death_of_Neda_Agha-Soltan</ref> <del style="font-weight: bold; text-decoration: none;">it seems that </del>this tool has not been harnessed to the extent that it could or should be. <del style="font-weight: bold; text-decoration: none;">Our project set out to identify the </del>problems that led to this state of affairs <del style="font-weight: bold; text-decoration: none;">as well as identify some of the </del>solutions. This <del style="font-weight: bold; text-decoration: none;">section </del>is particularly focused on <del style="font-weight: bold; text-decoration: none;">setting out </del>the problems we identified.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The average citizen’s ability to capture video in countries around the world – in the form of cheap digital recorders and cell phone cameras – combined with the spread of free online video hosting websites has created a powerful new tool for human rights. But, with some notable exceptions,<ref> See, e.g., http://en.wikipedia.org/wiki/Death_of_Neda_Agha-Soltan</ref> this tool has not been harnessed to the extent that it could or should be. <ins style="font-weight: bold; text-decoration: none;">In our research, we identified some </ins>problems that led to this state of affairs <ins style="font-weight: bold; text-decoration: none;">and then attempted to work out practical </ins>solutions. This <ins style="font-weight: bold; text-decoration: none;">Section </ins>is particularly focused on <ins style="font-weight: bold; text-decoration: none;">describing </ins>the problems we identified.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Historical Overview==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Historical Overview==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Video has long been recognized as a uniquely powerful tool with which to document human rights abuse and advocate for change. Videos and photographs from the liberated Nazi concentration camps at Bergen-Belsen and Dachau documented the horrific abuses of the Holocaust and precipitated the international demand that Nazi leaders be brought to justice.<ref> See http://www.bbc.co.uk/history/worldwars/wwtwo/liberation_camps_01.shtml</ref> Soon after home televisions proliferated in the United States, video had a tremendous effect on the Civil Rights movement. Stark images of discrimination, segregation, and brutality, such as those surrounding the integration of Little Rock, Arkansas’s public schools in 1957, captured the American attention.<ref> See, e.g., Gene Roberts & Hank Klibanoff, The Race Beat: The Press, the Civil Rights Struggle, and the Awakening of a Nation 182 (2006) (“the daily visual broadcasts of news as it happened [in Little Rock] had a profound impact on the nation’s understanding of the race drama in the South.”)</ref> Domestically, many Americans, including many of the journalists themselves, were appalled and motivated to promote and advocate for change.<ref> See generally id at Chapter 11.</ref> The continued reports out of Little Rock also proved to be a significant source of embarrassment for the United States internationally, which generated an entirely different set of pressures on the Eisenhower administration.<ref>Michael L. Krenn, “Unfinished Business”: Segregation and Diplomacy at the 1958 World’s Fair, 20 Diplomatic History 591 (1996), available at: http://vi.uh.edu/pages/buzzmat/DH%20articles/African%20Americans/krenn.pdf </ref> </div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Video has long been recognized as a uniquely powerful tool with which to document human rights abuse and advocate for change. Videos and photographs from the liberated Nazi concentration camps at Bergen-Belsen and Dachau documented the horrific abuses of the Holocaust and precipitated the international demand that Nazi leaders be brought to justice.<ref> See http://www.bbc.co.uk/history/worldwars/wwtwo/liberation_camps_01.shtml</ref> Soon after home televisions proliferated in the United States, video had a tremendous effect on the Civil Rights movement. Stark images of discrimination, segregation, and brutality, such as those surrounding the integration of Little Rock, Arkansas’s public schools in 1957, captured the American attention.<ref> See, e.g., Gene Roberts & Hank Klibanoff, The Race Beat: The Press, the Civil Rights Struggle, and the Awakening of a Nation 182 (2006) (“the daily visual broadcasts of news as it happened [in Little Rock] had a profound impact on the nation’s understanding of the race drama in the South.”)</ref> Domestically, many Americans, including many of the journalists themselves, were appalled and <ins style="font-weight: bold; text-decoration: none;">thus </ins>motivated to promote and advocate for change.<ref> See generally id at Chapter 11.</ref> The continued reports out of Little Rock also proved to be a significant source of embarrassment for the United States internationally, which generated an entirely different set of pressures on the Eisenhower administration.<ref>Michael L. Krenn, “Unfinished Business”: Segregation and Diplomacy at the 1958 World’s Fair, 20 Diplomatic History 591 (1996), available at: http://vi.uh.edu/pages/buzzmat/DH%20articles/African%20Americans/krenn.pdf </ref> </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>However, at this time the video cameras belonged to large corporations that could afford the new and expensive technology needed to both capture and broadcast video. The networks could exercise a strong amount of editorial control with regards to the quantity and type of content recorded and broadcast.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>However, at this time the video cameras belonged to large corporations that could afford the new and expensive technology needed to both capture and broadcast video. The networks could exercise a strong amount of editorial control with regards to the quantity and type of content recorded and broadcast.</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l21">Line 21:</td>
<td colspan="2" class="diff-lineno">Line 21:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>First, and perhaps most obviously, the person doing the filming or uploading/exfiltrating the video may be targeted for punishment.<ref>See http://news.bbc.co.uk/2/hi/8487179.stm (describing the arrest of one Burmese journalist for cooperation with news media and noting that another journalist received a 20 year prison sentence “after a military court found she had provided video for the Democratic Voice of Burma.”)</ref> Authorities may have a number of ways of identifying the source of video that appears online. For example, they could be monitoring or logging Internet traffic within their borders, allowing them to easily track less sophisticated Internet users who attempt to post data. Even more sophisticated users will be vulnerable to governments that use correspondingly sophisticated snooping techniques. In addition, governments might be able to use metadata or circumstantial evidence from the videos after they are broadcast to identify authors. Even if such information is not immediately accessible to the average web user, governments may exert pressure on host websites to reveal information kept internally, such as server logs or private messages.<ref>For example, Yahoo! provided substantial information regarding at least one journalist to the Chinese government in 2005, citing its obligation “to operate within each country's laws.” See http://news.bbc.co.uk/2/hi/4221538.stm.</ref> Large multinational corporations that serve as content or communication platforms might be particularly susceptible to this form of government pressure because of the interests of their employees and shareholders.<ref>See generally Goldsmith & Wu, Who Controls the Internet 49–86 (2006).</ref> </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>First, and perhaps most obviously, the person doing the filming or uploading/exfiltrating the video may be targeted for punishment.<ref>See http://news.bbc.co.uk/2/hi/8487179.stm (describing the arrest of one Burmese journalist for cooperation with news media and noting that another journalist received a 20 year prison sentence “after a military court found she had provided video for the Democratic Voice of Burma.”)</ref> Authorities may have a number of ways of identifying the source of video that appears online. For example, they could be monitoring or logging Internet traffic within their borders, allowing them to easily track less sophisticated Internet users who attempt to post data. Even more sophisticated users will be vulnerable to governments that use correspondingly sophisticated snooping techniques. In addition, governments might be able to use metadata or circumstantial evidence from the videos after they are broadcast to identify authors. Even if such information is not immediately accessible to the average web user, governments may exert pressure on host websites to reveal information kept internally, such as server logs or private messages.<ref>For example, Yahoo! provided substantial information regarding at least one journalist to the Chinese government in 2005, citing its obligation “to operate within each country's laws.” See http://news.bbc.co.uk/2/hi/4221538.stm.</ref> Large multinational corporations that serve as content or communication platforms might be particularly susceptible to this form of government pressure because of the interests of their employees and shareholders.<ref>See generally Goldsmith & Wu, Who Controls the Internet 49–86 (2006).</ref> </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Second, the person or people filmed in human rights media might be targeted for punishment. After the 2009 protests in Iran, the government circulated photographs and stills from videos in an attempt to identify anti-government protesters.<ref>See http://www.gerdab.ir/fa/pages/?cid=422; http://hub.witness.org/en/node/11999</ref> Traditionally, documentary filmmakers in the human rights arena operated by asking for consent from their subjects,<ref> A discussion regarding informed consent and the need to protect subjects can be found at http://blog.witness.org/2010/06/protecting-yourself-your-subjects-and-your-human-rights-videos-on-youtube/</ref> yet shooting spontaneous video on the street or the use video obtained second-hand may not afford filmmakers the ability to request or obtain consent from subjects. Accordingly, the need to protect the subjects depicted within videos is particularly acute for filmmakers who wish to broadcast recordings of events that may lead to reprisals against subjects of the video. Videographers might also desire to protect the dignity of a subject who has been subjected to certain types of treatment.<ref>For example, the treatment of Emad el-Kabir at the hands of the Egyptian police was particularly gruesome and documented on cell phone video. See http://www.time.com/time/world/article/0,8599,1581608,00.html. While activists were able to convince the victim to come forward in this case, in <del style="font-weight: bold; text-decoration: none;">other </del>cases they might want to disseminate such footage without providing the name or identity of the victim if the <del style="font-weight: bold; text-decoration: none;">victim’s identity cannot be ascertained</del>.</ref></div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Second, the person or people filmed in human rights media might be targeted for punishment. After the 2009 protests in Iran, the government circulated photographs and stills from videos in an attempt to identify anti-government protesters.<ref>See http://www.gerdab.ir/fa/pages/?cid=422; http://hub.witness.org/en/node/11999</ref> Traditionally, documentary filmmakers in the human rights arena operated by asking for consent from their subjects,<ref> A discussion regarding informed consent and the need to protect subjects can be found at http://blog.witness.org/2010/06/protecting-yourself-your-subjects-and-your-human-rights-videos-on-youtube/</ref> yet shooting spontaneous video on the street or the use video obtained second-hand may not afford filmmakers the ability to request or obtain consent from subjects. Accordingly, the need to protect the subjects depicted within videos is particularly acute for filmmakers who wish to broadcast recordings of events that may lead to reprisals against subjects of the video. Videographers might also desire to protect the dignity of a subject who has been subjected to certain types of treatment.<ref>For example, the treatment of Emad el-Kabir at the hands of the Egyptian police was particularly gruesome and documented on cell phone video. See http://www.time.com/time/world/article/0,8599,1581608,00.html. While activists were able to convince the victim to come forward in this case, in <ins style="font-weight: bold; text-decoration: none;">future </ins>cases they might want to disseminate such footage without providing the name or identity of the victim<ins style="font-weight: bold; text-decoration: none;">, particularly </ins>if the <ins style="font-weight: bold; text-decoration: none;">victim is unknown</ins>.</ref></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Access=== </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Access=== </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the Internet or particular websites.<ref>Or in the case of Egypt, <del style="font-weight: bold; text-decoration: none;">now</del>, the entire internet.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as <del style="font-weight: bold; text-decoration: none;">VPN</del>, public<del style="font-weight: bold; text-decoration: none;">-</del>key encryption, or other methods of evading Internet-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the Internet or particular websites.<ref>Or in the case of Egypt, <ins style="font-weight: bold; text-decoration: none;">currently</ins>, the entire internet.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as <ins style="font-weight: bold; text-decoration: none;">VPNs</ins>, public key encryption, or other methods of evading Internet-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l31">Line 31:</td>
<td colspan="2" class="diff-lineno">Line 31:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Audience===</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>===Audience===</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Finally, there is no single place to “go” in order to find new human rights media or video content. In December 2007, Witness created The Hub to provide a central repository for human rights video.<ref>http://hub.witness.org/</ref> However, <del style="font-weight: bold; text-decoration: none;">they </del>discontinued accepting new content in 2009, citing technical difficulties and changing priorities.<ref>See http://blog.witness.org/2010/08/update-on-the-hub-and-witness-new-online-strategy/</ref> At present, the spread of human rights video content appears to be primarily viral, and therefore, a bit haphazard. A number of disjointed avenues exist for distribution, but there is no centralized channel or place that serves as a home for content. One might also be concerned about the authenticity and/or lack of context that accompanies videos posted to disparate, relatively unknown hosts by anonymous authors. </div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Finally, there is no single place to “go” in order to find new human rights media or video content. In December 2007, Witness created The Hub to provide a central repository for human rights video.<ref>http://hub.witness.org/</ref> However, <ins style="font-weight: bold; text-decoration: none;">it </ins>discontinued accepting new content in 2009, citing technical difficulties and changing priorities.<ref>See http://blog.witness.org/2010/08/update-on-the-hub-and-witness-new-online-strategy/</ref> At present, the spread of human rights video content appears to be primarily viral, and therefore, a bit haphazard. A number of disjointed avenues exist for distribution, but there is no centralized channel or place that serves as a home for content. One might also be concerned about the authenticity and/or lack of context that accompanies videos posted to disparate, relatively unknown hosts by anonymous authors. </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In our view, a host that consistently provides authentic videos of interest to the human rights community, media, and concerned people throughout the world would be a strong step forward. By developing a consistent track record of impact, such a site could then develop a strong reputation encouraging new content to be sent. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In our view, a host that consistently provides authentic videos of interest to the human rights community, media, and concerned people throughout the world would be a strong step forward. By developing a consistent track record of impact, such a site could then develop a strong reputation encouraging new content to be sent. </div></td></tr>
</table>Efletcherhttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1718&oldid=prevKbharris: Problem Statement/Introduction moved to Problem Statement and Introduction2011-02-04T06:22:05Z<p><a href="/difficultproblems/Problem_Statement/Introduction" class="mw-redirect" title="Problem Statement/Introduction">Problem Statement/Introduction</a> moved to <a href="/difficultproblems/Problem_Statement_and_Introduction" title="Problem Statement and Introduction">Problem Statement and Introduction</a></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<tr class="diff-title" lang="en">
<td colspan="1" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="1" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 02:22, 4 February 2011</td>
</tr><tr><td colspan="2" class="diff-notice" lang="en"><div class="mw-diff-empty">(No difference)</div>
</td></tr></table>Kbharrishttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1576&oldid=prevKbharris: Skipped Level 1 of section formatting since it is the page name level (see http://www.mediawiki.org/wiki/Help:Formatting)2011-02-01T06:00:46Z<p>Skipped Level 1 of section formatting since it is the page name level (see http://www.mediawiki.org/wiki/Help:Formatting)</p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 02:00, 1 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l1">Line 1:</td>
<td colspan="2" class="diff-lineno">Line 1:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The average citizen’s ability to capture video in countries around the world – in the form of cheap digital recorders and cell phone cameras – combined with the spread of free online video hosting websites has created a powerful new tool for human rights. But, with some notable exceptions,<ref> See, e.g., http://en.wikipedia.org/wiki/Death_of_Neda_Agha-Soltan</ref> it seems that this tool has not been harnessed to the extent that it could or should be. Our project set out to identify the problems that led to this state of affairs as well as identify some of the solutions. This section is particularly focused on setting out the problems we identified.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The average citizen’s ability to capture video in countries around the world – in the form of cheap digital recorders and cell phone cameras – combined with the spread of free online video hosting websites has created a powerful new tool for human rights. But, with some notable exceptions,<ref> See, e.g., http://en.wikipedia.org/wiki/Death_of_Neda_Agha-Soltan</ref> it seems that this tool has not been harnessed to the extent that it could or should be. Our project set out to identify the problems that led to this state of affairs as well as identify some of the solutions. This section is particularly focused on setting out the problems we identified.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>=Historical Overview=</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">=</ins>=Historical Overview<ins style="font-weight: bold; text-decoration: none;">=</ins>=</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Video has long been recognized as a uniquely powerful tool with which to document human rights abuse and advocate for change. Videos and photographs from the liberated Nazi concentration camps at Bergen-Belsen and Dachau documented the horrific abuses of the Holocaust and precipitated the international demand that Nazi leaders be brought to justice.<ref> See http://www.bbc.co.uk/history/worldwars/wwtwo/liberation_camps_01.shtml</ref> Soon after home televisions proliferated in the United States, video had a tremendous effect on the Civil Rights movement. Stark images of discrimination, segregation, and brutality, such as those surrounding the integration of Little Rock, Arkansas’s public schools in 1957, captured the American attention.<ref> See, e.g., Gene Roberts & Hank Klibanoff, The Race Beat: The Press, the Civil Rights Struggle, and the Awakening of a Nation 182 (2006) (“the daily visual broadcasts of news as it happened [in Little Rock] had a profound impact on the nation’s understanding of the race drama in the South.”)</ref> Domestically, many Americans, including many of the journalists themselves, were appalled and motivated to promote and advocate for change.<ref> See generally id at Chapter 11.</ref> The continued reports out of Little Rock also proved to be a significant source of embarrassment for the United States internationally, which generated an entirely different set of pressures on the Eisenhower administration.<ref>Michael L. Krenn, “Unfinished Business”: Segregation and Diplomacy at the 1958 World’s Fair, 20 Diplomatic History 591 (1996), available at: http://vi.uh.edu/pages/buzzmat/DH%20articles/African%20Americans/krenn.pdf </ref> </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Video has long been recognized as a uniquely powerful tool with which to document human rights abuse and advocate for change. Videos and photographs from the liberated Nazi concentration camps at Bergen-Belsen and Dachau documented the horrific abuses of the Holocaust and precipitated the international demand that Nazi leaders be brought to justice.<ref> See http://www.bbc.co.uk/history/worldwars/wwtwo/liberation_camps_01.shtml</ref> Soon after home televisions proliferated in the United States, video had a tremendous effect on the Civil Rights movement. Stark images of discrimination, segregation, and brutality, such as those surrounding the integration of Little Rock, Arkansas’s public schools in 1957, captured the American attention.<ref> See, e.g., Gene Roberts & Hank Klibanoff, The Race Beat: The Press, the Civil Rights Struggle, and the Awakening of a Nation 182 (2006) (“the daily visual broadcasts of news as it happened [in Little Rock] had a profound impact on the nation’s understanding of the race drama in the South.”)</ref> Domestically, many Americans, including many of the journalists themselves, were appalled and motivated to promote and advocate for change.<ref> See generally id at Chapter 11.</ref> The continued reports out of Little Rock also proved to be a significant source of embarrassment for the United States internationally, which generated an entirely different set of pressures on the Eisenhower administration.<ref>Michael L. Krenn, “Unfinished Business”: Segregation and Diplomacy at the 1958 World’s Fair, 20 Diplomatic History 591 (1996), available at: http://vi.uh.edu/pages/buzzmat/DH%20articles/African%20Americans/krenn.pdf </ref> </div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l11">Line 11:</td>
<td colspan="2" class="diff-lineno">Line 11:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In recent years the spread of ubiquitous cheap cell phone cameras combined with free online video hosting has made it possible for millions of people to capture video and broadcast it to the world. While there are examples of poignant videos that have spread in recent years and dramatically captured the public’s attention,<ref> See supra note 1.</ref> video for human rights does not appear to have taken off as one might expect in light of these democratizing technologies. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In recent years the spread of ubiquitous cheap cell phone cameras combined with free online video hosting has made it possible for millions of people to capture video and broadcast it to the world. While there are examples of poignant videos that have spread in recent years and dramatically captured the public’s attention,<ref> See supra note 1.</ref> video for human rights does not appear to have taken off as one might expect in light of these democratizing technologies. </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>=The Problems=</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">=</ins>=The Problems<ins style="font-weight: bold; text-decoration: none;">=</ins>=</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The raw number of video-capable devices operating in oppressive regimes suggests capacity for a lot more video sharing than currently occurs.<ref>Cf. http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use. While many of the phones operating in oppressive regimes will not have video cameras, it is reasonable to think that a significant portion do have recording capabilities, meaning that millions of such cameras are currently operational.</ref> There are well-documented problems facing the people who share videos online right now that may also serve to prevent the medium from reaching its full potential. This section seeks to identify some of those problems and begin to sketch out the solutions developed more fully in subsequent sections of our project.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>The raw number of video-capable devices operating in oppressive regimes suggests capacity for a lot more video sharing than currently occurs.<ref>Cf. http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use. While many of the phones operating in oppressive regimes will not have video cameras, it is reasonable to think that a significant portion do have recording capabilities, meaning that millions of such cameras are currently operational.</ref> There are well-documented problems facing the people who share videos online right now that may also serve to prevent the medium from reaching its full potential. This section seeks to identify some of those problems and begin to sketch out the solutions developed more fully in subsequent sections of our project.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>==Reprisals==</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">=</ins>==Reprisals<ins style="font-weight: bold; text-decoration: none;">=</ins>==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>One of the biggest areas of concern in the human rights media space is reprisals by adversaries, which are typically governments or their officials, but may also include corporate actors or others. The reprisals may be targeted at any person involved in the video recording, production, or dissemination. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>One of the biggest areas of concern in the human rights media space is reprisals by adversaries, which are typically governments or their officials, but may also include corporate actors or others. The reprisals may be targeted at any person involved in the video recording, production, or dissemination. </div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l23">Line 23:</td>
<td colspan="2" class="diff-lineno">Line 23:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Second, the person or people filmed in human rights media might be targeted for punishment. After the 2009 protests in Iran, the government circulated photographs and stills from videos in an attempt to identify anti-government protesters.<ref>See http://www.gerdab.ir/fa/pages/?cid=422; http://hub.witness.org/en/node/11999</ref> Traditionally, documentary filmmakers in the human rights arena operated by asking for consent from their subjects,<ref> A discussion regarding informed consent and the need to protect subjects can be found at http://blog.witness.org/2010/06/protecting-yourself-your-subjects-and-your-human-rights-videos-on-youtube/</ref> yet shooting spontaneous video on the street or the use video obtained second-hand may not afford filmmakers the ability to request or obtain consent from subjects. Accordingly, the need to protect the subjects depicted within videos is particularly acute for filmmakers who wish to broadcast recordings of events that may lead to reprisals against subjects of the video. Videographers might also desire to protect the dignity of a subject who has been subjected to certain types of treatment.<ref>For example, the treatment of Emad el-Kabir at the hands of the Egyptian police was particularly gruesome and documented on cell phone video. See http://www.time.com/time/world/article/0,8599,1581608,00.html. While activists were able to convince the victim to come forward in this case, in other cases they might want to disseminate such footage without providing the name or identity of the victim if the victim’s identity cannot be ascertained.</ref></div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Second, the person or people filmed in human rights media might be targeted for punishment. After the 2009 protests in Iran, the government circulated photographs and stills from videos in an attempt to identify anti-government protesters.<ref>See http://www.gerdab.ir/fa/pages/?cid=422; http://hub.witness.org/en/node/11999</ref> Traditionally, documentary filmmakers in the human rights arena operated by asking for consent from their subjects,<ref> A discussion regarding informed consent and the need to protect subjects can be found at http://blog.witness.org/2010/06/protecting-yourself-your-subjects-and-your-human-rights-videos-on-youtube/</ref> yet shooting spontaneous video on the street or the use video obtained second-hand may not afford filmmakers the ability to request or obtain consent from subjects. Accordingly, the need to protect the subjects depicted within videos is particularly acute for filmmakers who wish to broadcast recordings of events that may lead to reprisals against subjects of the video. Videographers might also desire to protect the dignity of a subject who has been subjected to certain types of treatment.<ref>For example, the treatment of Emad el-Kabir at the hands of the Egyptian police was particularly gruesome and documented on cell phone video. See http://www.time.com/time/world/article/0,8599,1581608,00.html. While activists were able to convince the victim to come forward in this case, in other cases they might want to disseminate such footage without providing the name or identity of the victim if the victim’s identity cannot be ascertained.</ref></div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>==Access== </div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">=</ins>==Access<ins style="font-weight: bold; text-decoration: none;">=</ins>== </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the Internet or particular websites.<ref>Or in the case of Egypt, now, the entire internet.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as VPN, public-key encryption, or other methods of evading Internet-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the Internet or particular websites.<ref>Or in the case of Egypt, now, the entire internet.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as VPN, public-key encryption, or other methods of evading Internet-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l29">Line 29:</td>
<td colspan="2" class="diff-lineno">Line 29:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>==Audience==</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">=</ins>==Audience<ins style="font-weight: bold; text-decoration: none;">=</ins>==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Finally, there is no single place to “go” in order to find new human rights media or video content. In December 2007, Witness created The Hub to provide a central repository for human rights video.<ref>http://hub.witness.org/</ref> However, they discontinued accepting new content in 2009, citing technical difficulties and changing priorities.<ref>See http://blog.witness.org/2010/08/update-on-the-hub-and-witness-new-online-strategy/</ref> At present, the spread of human rights video content appears to be primarily viral, and therefore, a bit haphazard. A number of disjointed avenues exist for distribution, but there is no centralized channel or place that serves as a home for content. One might also be concerned about the authenticity and/or lack of context that accompanies videos posted to disparate, relatively unknown hosts by anonymous authors. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Finally, there is no single place to “go” in order to find new human rights media or video content. In December 2007, Witness created The Hub to provide a central repository for human rights video.<ref>http://hub.witness.org/</ref> However, they discontinued accepting new content in 2009, citing technical difficulties and changing priorities.<ref>See http://blog.witness.org/2010/08/update-on-the-hub-and-witness-new-online-strategy/</ref> At present, the spread of human rights video content appears to be primarily viral, and therefore, a bit haphazard. A number of disjointed avenues exist for distribution, but there is no centralized channel or place that serves as a home for content. One might also be concerned about the authenticity and/or lack of context that accompanies videos posted to disparate, relatively unknown hosts by anonymous authors. </div></td></tr>
<tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l36">Line 36:</td>
<td colspan="2" class="diff-lineno">Line 36:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>=Solutions=</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">=</ins>=Solutions<ins style="font-weight: bold; text-decoration: none;">=</ins>=</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Pharos represents our solutions to many of these problems. Some of the solutions are technical, but many are organizational. It would be entirely possible for actors to tackle some or all of these problems individually, but our hope and belief is that one organization could take on the entire set of issues most effectively. Working with existing organizations and developing a track record of safety, security, judgment, and impact would start a virtuous cycle that could have an immense impact on human rights advocacy throughout the world.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Pharos represents our solutions to many of these problems. Some of the solutions are technical, but many are organizational. It would be entirely possible for actors to tackle some or all of these problems individually, but our hope and belief is that one organization could take on the entire set of issues most effectively. Working with existing organizations and developing a track record of safety, security, judgment, and impact would start a virtuous cycle that could have an immense impact on human rights advocacy throughout the world.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>=References=</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins style="font-weight: bold; text-decoration: none;">=</ins>=References<ins style="font-weight: bold; text-decoration: none;">=</ins>=</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div><references/></div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div><references/></div></td></tr>
</table>Kbharrishttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1567&oldid=prevEfletcher at 05:16, 1 February 20112011-02-01T05:16:55Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 01:16, 1 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l13">Line 13:</td>
<td colspan="2" class="diff-lineno">Line 13:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=The Problems=</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>=The Problems=</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>The raw number of video-capable devices operating in oppressive regimes suggests capacity for a lot more video sharing than currently occurs. There are well-documented problems facing the people who share videos online right now that may also serve to prevent the medium from reaching its full potential. This section seeks to identify some of those problems and begin to sketch out the solutions developed more fully in subsequent sections of our project.</div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>The raw number of video-capable devices operating in oppressive regimes suggests capacity for a lot more video sharing than currently occurs.<ins style="font-weight: bold; text-decoration: none;"><ref>Cf. http://en.wikipedia.org/wiki/List_of_countries_by_number_of_mobile_phones_in_use. While many of the phones operating in oppressive regimes will not have video cameras, it is reasonable to think that a significant portion do have recording capabilities, meaning that millions of such cameras are currently operational.</ref> </ins> There are well-documented problems facing the people who share videos online right now that may also serve to prevent the medium from reaching its full potential. This section seeks to identify some of those problems and begin to sketch out the solutions developed more fully in subsequent sections of our project.</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Reprisals==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Reprisals==</div></td></tr>
</table>Efletcherhttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1565&oldid=prevEfletcher at 05:08, 1 February 20112011-02-01T05:08:56Z<p></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 01:08, 1 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l31">Line 31:</td>
<td colspan="2" class="diff-lineno">Line 31:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Audience==</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Audience==</div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Finally, there is no single place to “go” in order to find new human rights media or video content. In December 2007, Witness created The Hub to provide a central repository for human rights video.<ref>http://hub.witness.org/</ref> However, they discontinued accepting new content in 2009, citing technical difficulties and changing priorities.<ref>See http://blog.witness.org/2010/08/update-on-the-hub-and-witness-new-online-strategy/</ref> At present, the spread of human rights video content appears to be primarily viral, and therefore, a bit haphazard. A number of disjointed avenues exist for distribution, but there is no centralized channel or place that serves as a home for content. One might also be concerned about the authenticity and/or lack of context that accompanies videos posted to disparate, relatively unknown hosts. </div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Finally, there is no single place to “go” in order to find new human rights media or video content. In December 2007, Witness created The Hub to provide a central repository for human rights video.<ref>http://hub.witness.org/</ref> However, they discontinued accepting new content in 2009, citing technical difficulties and changing priorities.<ref>See http://blog.witness.org/2010/08/update-on-the-hub-and-witness-new-online-strategy/</ref> At present, the spread of human rights video content appears to be primarily viral, and therefore, a bit haphazard. A number of disjointed avenues exist for distribution, but there is no centralized channel or place that serves as a home for content. One might also be concerned about the authenticity and/or lack of context that accompanies videos posted to disparate, relatively unknown hosts <ins style="font-weight: bold; text-decoration: none;">by anonymous authors</ins>. </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In our view, a host that consistently provides authentic videos of interest to the human rights community, media, and concerned people throughout the world would be a strong step forward. By developing a consistent track record of impact, such a site could then develop a strong reputation encouraging new content to be sent. </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>In our view, a host that consistently provides authentic videos of interest to the human rights community, media, and concerned people throughout the world would be a strong step forward. By developing a consistent track record of impact, such a site could then develop a strong reputation encouraging new content to be sent. </div></td></tr>
</table>Efletcherhttps://cyber.harvard.edu/difficultproblems/?title=Problem_Statement_and_Introduction&diff=1561&oldid=prev66.30.9.185: /* Access */2011-02-01T04:53:31Z<p><span dir="auto"><span class="autocomment">Access</span></span></p>
<table style="background-color: #fff; color: #202122;" data-mw="interface">
<col class="diff-marker" />
<col class="diff-content" />
<col class="diff-marker" />
<col class="diff-content" />
<tr class="diff-title" lang="en">
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">← Older revision</td>
<td colspan="2" style="background-color: #fff; color: #202122; text-align: center;">Revision as of 00:53, 1 February 2011</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l25">Line 25:</td>
<td colspan="2" class="diff-lineno">Line 25:</td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Access== </div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>==Access== </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker" data-marker="−"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the <del style="font-weight: bold; text-decoration: none;">internet </del>or particular websites.<ref>Or in the case of Egypt, now, the entire internet.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as VPN, public-key encryption, or other methods of evading <del style="font-weight: bold; text-decoration: none;">internet</del>-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td><td class="diff-marker" data-marker="+"></td><td style="color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>A second set of problems centers around problems of access both by uploaders and by viewers. It is well-known that many repressive regimes block or limit access to the <ins style="font-weight: bold; text-decoration: none;">Internet </ins>or particular websites.<ref>Or in the case of Egypt, now, the entire internet.</ref> Undoubtedly, repressive regimes would seek to limit access to content hosting sites for people who would like to upload videos documenting human rights abuses. Even if a website can use technical workarounds that enhance safety and access, such as VPN, public-key encryption, or other methods of evading <ins style="font-weight: bold; text-decoration: none;">Internet</ins>-blocking, they face the problem of communicating this information to people on the ground in repressive regimes. </div></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><br/></td></tr>
<tr><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td><td class="diff-marker"></td><td style="background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;"><div>Furthermore, some actors have shown a willingness to actively attack human rights websites via DDoS and other methods in order to prevent visitors from uploading or watching video, creating serious access problems for technically unsophisticated websites.<ref>See http://cyber.law.harvard.edu/sites/cyber.law.harvard.edu/files/2010_DDoS_Attacks_Human_Rights_and_Media.pdf</ref> It then becomes highly important that any website billing itself as a human rights repository be able to maintain access and uptime for all visitors.</div></td></tr>
</table>66.30.9.185