Skip to main content

Iran rolls out first stage of internal, national internet

Hand on a computer with the Iranian flag on its screen
123RF
The internet is a mix of perhaps the most global, inter-connective technologies every created, and breaking down barriers and opening up lines of communication between people is arguably its most defining feature. In Iran, however, things are quite different. Although once open, access has slowly been curtailed through blocks and censorship and now the government has launched a new National Internet, which will be restricted, selective, and government controlled.

Of course that isn’t the way it’s being advertised domestically. As the BBC explains, Iran state media claims that it will offer “high quality, high speed” internet at “low cost,” compared to traditional sources. Even if that is the case, many detractors claim it will be even more restrictive than the internet already available through other channels.

Recommended Videos

As it stands, Iran blocks international social networks like Facebook and Twitter, as well as a number of other sources and sites. Teh government has had plans to introduce an internal intranet of sorts for years, in order to control the kind of content people see, and to promote its own brand of Islamic ideals with less influence from other cultures.

Another reason that Iran wants to internalize its internet is digital security. The government has experienced attacks from hackers, both individual and state sponsored, for years. Perhaps most famously its nuclear power plant program was damaged by the Stuxnet worm, which was allegedly created by the U.S. to restrict the country’s nuclear potential.

Currently though the new internet-related release is still in the earliest stages. This debut will see government services and domestic services made available, while a second phase in 2017 will see domestic video content supported. The final introduction will come in March 2017, and will introduce additional services and make it easier for companies dealing internationally to use it without breaking the restrictions.

Privacy advocates are already concerned about this plan though, asserting that user privacy will not be protected and that human rights may be violated by the selected content provided by the Iranian intranet.

The government has denied these claims, stating that the purpose is to protect user information.

Jon Martindale
Jon Martindale is a freelance evergreen writer and occasional section coordinator, covering how to guides, best-of lists, and…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more