The latest on our programs, press and research
Mirroring Uncensored News for the Masses
With support from OTF’s Internet Freedom Fund, oLink offers residents of China access to previously blocked information without ever going beyond the Great Firewall
OTF’s FY2019 and FY2020 Annual Report
OTF’s FY2019/2020 Annual Report highlights the innovative projects, impassioned research fellows, and incredible initiatives that work to advance internet freedom around the globe.
An Application and Operational Security Assessment of 'Partisan Telegram'
Telegram is one of the world’s most popular cross-platform cloud-based instant messaging services. However, it’s important to remember that on Telegram, private and group chats are not end-to-end encrypted.
Request for Proposal: OTF’s Rapid Response Fund
The Open Technology Fund (OTF) is soliciting proposals from service providers, organizations and individuals interested to provide services to OTF’s Rapid Response Fund.
Introducing the 2022 Class of Information Controls Fellowship Program (ICFP) Fellows
OTF’s ninth cohort of ICFP fellows selected to advance research and analysis on information controls, specifically repressive censorship and surveillance.
Addressing burnout among human rights defenders facing violence online
“Well-being and self-care are collective efforts”
China’s National Anti-Fraud Center - Security Assessment
Editor’s Note: The auditors did not go through a coordinated disclosure process regarding the vulnerabilities discovered in this report due to the risks involved with engaging a potentially sensitive adversary. However, due to their commitment to privacy and security transparency, the auditors still wish to share their findings.
FileZilla: Making Old School Protocol Cool Again
2020 ICFP Wrap Up
OTF’s seventh class of Information Controls Fellowship Program (ICFP) fellows consists of researchers from both social science and computer science backgrounds. This cohort focuses on research related to various censorship techniques employed by China and the avenues for circumvention. With the cohort’s fellowships completed, we’d like to highlight these fellows and the accomplishments they achieved during their time as ICFP fellows.
7ASecurity, OTF Red Team Lab partner, completes Blackbox Pentest and Privacy Audit of LeaveHomeSafe App
Nation-State Censorship Infrastructures Pose a Risk to the Entire Internet
IFF-supported Geneva project discovers attackers can weaponize censors to launch attacks on victims beyond state borders
OTF at RightsCon 2022
Multiple Vantage Point Validation to Secure Domain Validation
This OTF-supported effort aids the deployment of a more secure domain validation protocol to secure Internet domain validation against attackers that manipulate Internet routing via Border Gateway Protocol (BGP) hijack and interception attacks.
Exposing the Great Firewall's Dynamic Blocking of Fully Encrypted Traffic
This report demonstrates how the GFW identifies and blocks seemingly random traffic, and discusses the implications of such blocking incidents.
OTF’s Budget for the 2022 Fiscal Year
The Effect of Censorship Circumvention on Information Transmission
The following blog post captures the research from an OTF ICFP fellow on the effect of censorship circumvention on information transmission.
A Quick Look at QUIC Censorship
The following blog post was written by ICFP fellow Kathrin Elmenhorst as a summary of their work and research on the QUIC general-purpose transport layer network.
Red Team Lab Refreshes its Information Security Services
OTF is excited to announce the refresh and revamp of its Red Team Lab to carry out security assessments of software projects seeking to enhance privacy and security for their users.
The Evolution of ICFP: From Inception to Impact
The open application window for the ninth class of OTF’s Information Controls Fellowship Program (ICFP) presents an opportunity to look back on how the program arrived at its current state.
Announcing OTF’S Newest Class of Information Controls Fellows
Eighth cohort of ICFP fellows to research potential or existing circumvention techniques; the use of circumvention tools during censorship events; mitigating potential security vulnerabilities in access and privacy tools; identifying the specific tools used in individual countries for information controls; and more.