{"id":24882,"date":"2025-06-24T16:00:00","date_gmt":"2025-06-24T13:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/a-splintered-web\/"},"modified":"2025-06-24T16:00:00","modified_gmt":"2025-06-24T13:00:00","slug":"a-splintered-web","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/a-splintered-web\/","title":{"rendered":"A splintered web"},"content":{"rendered":"<p>The internet delivers inventions such as AI straight to your device and, for some, opens access to vital services. It is also the \u201cblood of the blockchain\u201d: a cohesive web keeps open source alive and accelerates the development of an alternative financial system.<\/p>\n<p>In this new ForkLog piece, we examine regulators\u2019 latest moves to curb internet freedom, outline Europe\u2019s specific plans, review the \u201csuccessful\u201d measures of China, Russia, Iran, Turkmenistan and others, and look at who is pushing back and how.<\/p>\n<p><iframe loading=\"lazy\" width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless=\"\" src=\"https:\/\/share.transistor.fm\/e\/f72793b0\"><\/iframe><\/p>\n<h2 class=\"wp-block-heading\">European democracy<\/h2>\n<p>After the headline-grabbing MiCA, adopted in 2023, the blockchain industry in the EU gained clearer contours, with all the consequences that entails.<\/p>\n<p>The following year, 2024, became a period of implementing a raft of laws aimed at protecting citizens\u2019 digital rights. They include a fairer distribution of roles among Big Tech and their market clout. Data openness, disclosure of end-to-end encryption keys and control over AI are the main goals of regulation. As a result, the 27 EU countries risk becoming a discrete cluster within what was once a unified global network.<\/p>\n<p>Main European Parliament initiatives aimed at safeguarding the digital sphere: <\/p>\n<ul class=\"wp-block-list\">\n<li>Digital Services Act (<a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/digital-services-act-package\" target=\"_blank\" rel=\"noopener\" title=\"\">DSA<\/a>). Ensures platform safety and transparency and combats illegal content and disinformation. Mandatory since February 2024. The law applies to channel providers, hosting services, online platforms and marketplaces;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>Digital Markets Act (DMA). Designed to foster market competition by regulating <span data-descr=\"the most influential Big Tech companies (search engines, online platforms) with more than 45 million users\" class=\"old_tooltip\">gatekeepers<\/span> such as Google, Microsoft and Amazon. In force since spring 2024. Firms must comply with interoperability rules for devices and messaging platforms\u2014with a ban on \u201cself-preferencing\u201d: they must be interchangeable rather than stand out through unique features. In Apple\u2019s case, authorities <a href=\"https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_25_816\" target=\"_blank\" rel=\"noopener\" title=\"\">demanded<\/a> that iOS operate on third-party devices in the EU;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/data-act\" target=\"_blank\" rel=\"noopener\" title=\"\">Data Act<\/a>. Entered into force in January 2024 and seeks to ensure fair access to user and machine data. Under it, <span data-descr=\"application programming interface\" class=\"old_tooltip\">API<\/span> standards open access to user data for public authorities in emergencies. The regulation also defines who owns data and how it may be used. It covers manufacturers of appliances, electronics and IoT devices, along with their owners and sellers;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>Data Governance Act (<a href=\"https:\/\/www.european-data-governance-act.com\/\" target=\"_blank\" rel=\"noopener\" title=\"\">DGA<\/a>). In force since September 2023. It introduced provisions to govern data sharing between companies. Unlike the earlier <span data-descr=\"General Data Protection Regulation\" class=\"old_tooltip\">GDPR<\/span>, it is not limited to personal data and has a broader scope. Using soft coordination and structure, it served as a preparatory step for the Data Act and even included requirements for smart contracts executing data-sharing agreements;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>Cyber Resilience Act (<a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cyber-resilience-act\" target=\"_blank\" rel=\"noopener\" title=\"\">CRA<\/a>). Phased in from December 2024, the law strengthens security standards for products with digital components and obliges manufacturers and sellers to ensure conditions throughout a product\u2019s life cycle. Full implementation is due by 2027. It covers all products directly or indirectly connected to devices or networks, with some exceptions.<\/li>\n<\/ul>\n<p>Some measures remain under consultation, for example the <a href=\"https:\/\/www.digital-fairness-act.com\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Digital Fairness Act<\/a>. The bill targets manipulative behaviour at the interface level. It seeks to curb \u201cdark\u201d UX patterns such as hidden \u201ccancel\u201d buttons, auto-subscriptions and obstructed exits from services. It also opposes \u201cemotional targeting\u201d\u2014ads shown based on a user\u2019s vulnerable state.<\/p>\n<p>Another initiative under discussion in Europe concerns the distribution of illegal content involving minors. Proposed in spring 2025, <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex:52022PC0209\" target=\"_blank\" rel=\"noopener\" title=\"\">CSAM<\/a>\/Chat Control would allow state agencies to obtain the encryption keys of all available messengers to scan content.<\/p>\n<p>Some countries oppose the proposal, arguing, among other things, that it would restrict press freedom. Germany, Poland and the Netherlands have taken a firm line.<\/p>\n<p>In August 2024, the European Parliament adopted the world\u2019s first comprehensive law regulating AI by risk level\u2014the <a href=\"https:\/\/artificialintelligenceact.eu\/high-level-summary\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Artificial Intelligence Act<\/a>.<\/p>\n<p>Risk categories:<\/p>\n<ul class=\"wp-block-list\">\n<li>prohibited (highest) \u2014 bans on AI for social scoring, manipulation of user behaviour and mass surveillance;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>high \u2014 mandatory registration, audit and oversight. Applies to bank lending, medicine, education and employment;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>limited \u2014 user disclosure suffices for chatbots, content generators and simple recommender systems;<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li>no restrictions for games, photo-editing apps and spam filters.<\/li>\n<\/ul>\n<p>Implementation is gradual: the top category applies from February 2025; high-risk provisions are slated through August 2027. AI startups and large companies must adapt their algorithms to the new rules or face fines of up to 7% of annual turnover.<\/p>\n<p>The law requires developers to:<\/p>\n<ul class=\"wp-block-list\">\n<li>check the quality of the data used to train AI to avoid discrimination;<\/li>\n<li>ensure transparency. If a user interacts with AI, they must be told;<\/li>\n<li>keep documentation. Technical descriptions and logging to enable audits;<\/li>\n<li>conduct mandatory risk assessments\u2014especially in critical areas (health care, security, finance);<\/li>\n<li>register in a special European registry\u2014for high-risk systems.<\/li>\n<\/ul>\n<p>These sweeping measures to protect the digital sphere demand a swift response from the sector. Over the next one to two years, companies must adapt to the new reality or forgo users in the euro area. Breaches of the DSA and DMA can bring fines of up to 6% and 10% of annual revenue, respectively. The laws have extraterritorial reach and apply to all EU citizens, wherever they live.<\/p>\n<h2 class=\"wp-block-heading\">The yellow middle<\/h2>\n<p>According to <a href=\"https:\/\/freedomhouse.org\/report\/freedom-net\/2024\/struggle-trust-online\" target=\"_blank\" rel=\"noopener\" title=\"\">Freedom House<\/a>, more than a third of internet users are fully restricted in their access to information due to state censorship. A similar share has \u201cpartial\u201d access, while \u201cfully free\u201d users barely reach 17%.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXeCVqX40V5ygUMocXGIraiKvLj1kfry_CWs0UlJNw5oIrlk3lugJxAWNxIbEf4oD_C2toSXMSIFPy9z6KufiP2Xfrn2T1frS-K464uGCGLGm-N8T9CRE7mpQR7IL7hjpBkfBixV?key=d5-OB29ITkJy5MmgVV2cfA\" alt=\"A splintered web\"\/><figcaption class=\"wp-element-caption\">Level of freedom of internet access worldwide. Data: <a href=\"https:\/\/freedomhouse.org\/\" target=\"_blank\" rel=\"noopener\" title=\"\">Freedom House<\/a>. <\/figcaption><\/figure>\n<p>Of the 72 countries in the study, citizens in only 19 can use the internet freely; 32 face relatively few restrictions; and residents of 21 countries live under strict censorship.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXfq09wBO-6PVhaagRL-wJ2LCfwbSJJXTMbSgwSCbeta_8XfoZeqcA_hKVcaPCHgzghtW5yvEB2Yk3yfLetJ3w6Pf6TPKcaIVxuSnLi3os-hPhw8MM-Ar-qW0nWauxWLxmEBqHqaUw?key=d5-OB29ITkJy5MmgVV2cfA\" alt=\"A splintered web\"\/><figcaption class=\"wp-element-caption\">Map of internet freedom, 2024. Data: Freedom House.<\/figcaption><\/figure>\n<p>On the infographic above, yellow marks places where access to the internet remains open but with partial restrictions. These include Ukraine, where until February 2022 web browsing was free. Users have faced coercive measures since 2017\u2014blocking of resources from Russia, including Yandex and the social networks VKontakte and Odnoklassniki. More serious changes began five years later. Targeted restrictions have affected almost all resources with the \u201c.ru\u201d domain and their mirrors. The list is now regularly expanded.<\/p>\n<p>Blocking is implemented by the state at the DNS and IP levels. Internet providers obey orders, but many users bypass the ban via VPN and DNS-over-HTTPS (DoH). DoH protocols encrypt the browser\u2019s request for a site\u2019s IP address and substitute it. <\/p>\n<p>Countermeasures in such cases are easy to implement: minimal preparation and knowledge are enough for normal communication with the outside world.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXd_bdIz62piTeaQB_6awUzYJ5vqxsDy71Sde411DxMpSsBoxFNP7RS1Q6aCC8Qn4HW4VYidE_Ar0IOkSJiScgzjCPNIp99Qd-wdhfDZemepqXxrVvrwXABdULIzD1DPCall-92pjg?key=d5-OB29ITkJy5MmgVV2cfA\" alt=\"A splintered web\"\/><figcaption class=\"wp-element-caption\">Countries with high and medium levels of internet freedom. Data: Freedom House.<\/figcaption><\/figure>\n<h2 class=\"wp-block-heading\">Pioneers of \u201cpurple borders\u201d<\/h2>\n<p>Many would name North Korea the undisputed leader of the internet vacuum\u2014and they would be right. In the country, only the elite\u2014senior officials, hackers, researchers\u2014have access to the global network. Even then, all traffic is tightly monitored and filtered.<\/p>\n<p>In 2019 North Korea had 1,024 IP addresses, mostly belonging to state entities. Primary connectivity is via China\u2019s China Unicom and, since 2017, Russia\u2019s TransTeleCom.<\/p>\n<p>A sanctioned analogue\u2014the internal \u201cKwangmyong\u201d network\u2014is available to everyone. It contains mostly educational and propagandistic content. The sole mobile operator, Koryolink, does not support mobile internet. All domestically produced smartphones carry software-level restrictions.<\/p>\n<p>China and Russia stand out as huge purple patches on the internet-freedom map. Both pursue control \u201cto protect citizens\u201d and receive some of the lowest scores in the ranking.<\/p>\n<p>The study uses a composite internet-freedom score from 100 to 0, where a lower value indicates total isolation. If North Korea were included, it would score 0.<\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh7-qw.googleusercontent.com\/docsz\/AD_4nXcRw62TA-zQgD80u9IqhaLAzDeYH9_gOJhisLoMb2t3XpvjP-frNf0BH70Cd9o9ZuB0UzWjF-RbUVxLvmmB5kF4Ik8VjV5MEXNhdbaSxV_4HPBk-OjhJaUtRgEHZrytzjboodpCYg?key=d5-OB29ITkJy5MmgVV2cfA\" alt=\"A splintered web\"\/><figcaption class=\"wp-element-caption\">Countries with medium and low levels of internet freedom. Data: Freedom House.<\/figcaption><\/figure>\n<p>China has built the most extensive digital-control system in the world\u2014technically powerful but politically closed. Freedom of speech is replaced by automated censorship, and independent information by local propaganda.<\/p>\n<p>With a score of 9, on par with Myanmar, China\u2019s national gateway\u2014the Great Firewall\u2014showcases model technocommunism.<\/p>\n<p>All external traffic is filtered using <span data-descr=\"a type of cyberattack in which a hacker redirects a user to a fake website\" class=\"old_tooltip\">DNS spoofing<\/span>, URL keyword matching and analysis inside HTTPS\u2014Deep Packet Inspection (DPI). When banned words are detected, the connection is forcibly terminated.<\/p>\n<p>China has its own equivalents of popular apps: Baidu instead of Google,<br \/>WeChat instead of WhatsApp, Weibo instead of X. Algorithms can automatically delete posts and block accounts. All activity is tracked in real time:<\/p>\n<ul class=\"wp-block-list\">\n<li>censorship systems analyse text, images and video;<\/li>\n<li>AI is used for facial, emotion and speech recognition;<\/li>\n<li>operators must identify users by passport.<\/li>\n<\/ul>\n<p>Skirting the Great Firewall is technically hard, as China actively combats any form of tunnelling and encryption. Yet even under heavy censorship, independent researchers, developers and journalists find loopholes.<\/p>\n<p>Examples of tools that can work to bypass the Great Firewall:<\/p>\n<ul class=\"wp-block-list\">\n<li><span data-descr=\"intentionally obfuscated code to make detection harder\" class=\"old_tooltip\">obfuscated<\/span> VPNs. OpenVPN with Obfsproxy, Stunnel, Shadowsocks, Outline can work with proper configuration. The software masks traffic as ordinary HTTPS to evade DPI and is often hosted on private servers outside China;<\/li>\n<li>Shadowsocks (SS\/SSR). An effective proxy protocol with non-standard configuration and in combination with VPN. Popular on mobile devices until 2022; now partially detected, but custom installs can still serve;<\/li>\n<li>V2Ray \/ XRay. A modern, flexible framework for circumvention. Supports various protocols and can mask traffic;<\/li>\n<li>Tor with bridges. Core Tor nodes are blocked, but obfuscated relays such as obfs4, meek-azure and Snowflake may work.<\/li>\n<\/ul>\n<p>Russia follows its neighbour\u2019s lead. The internet is not yet fully isolated, but it is rapidly moving toward a Chinese-style model of \u201cdigital sovereignty\u201d\u2014with control, filtering and penalties for online activity.<\/p>\n<p>After the 2019 sovereign-internet law, the risk arose of detaching the Russian segment from the global one. Since 2020 Roskomnadzor has actively used DPI equipment; a national DNS system has been tested since 2023. Pressure on VPN services is also mounting.<\/p>\n<p>Iran is moving in the same direction, sitting between China and Russia in the internet-freedom ranking. The Islamic Republic is rolling out the SHOMA national information network. It is a tightly controlled internet space with censorship and connectivity shutdowns. Authorities regularly cut off access in regions with protests, such as Kurdistan and Baluchistan. As in North Korea, virtually all resources are blocked, including media, human-rights and opposition sites.<\/p>\n<p>Another leader in digital isolation is Turkmenistan. Sitting on the Silk Road, the country is rich in natural gas and closely tied to its main importer, China.<\/p>\n<p>Standing by the golden statue of Turkmenbashi in Ashgabat, you are unlikely to share a picturesque selfie: messengers and video calls are banned. Control is concentrated in the hands of a single operator\u2014Turkmentelecom. Its services are expensive and among the slowest in the world.<\/p>\n<p>In the republic, the internet remains a luxury rather than a basic right, and any hint of independent online activity is a risk for the user. There have been arrests, dismissals and intimidation over likes, posts or VPN use. Authorities can seize phones and check their contents, especially among the young.<\/p>\n<h2 class=\"wp-block-heading\">Conclusions<\/h2>\n<p>The internet is fragmenting before our eyes: jurisdictions are choosing divergent approaches to digital governance, many of which bring more local restrictions rather than genuine user safety. This trend is likely to intensify amid political and technological competition. The scale of change, inevitably, will be revealed over time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet delivers inventions such as AI straight to your device and, for some, opens access to vital services. It is also the \u201cblood of the blockchain\u201d: a cohesive web keeps open source alive and accelerates the development of an alternative financial system. In this new ForkLog piece, we examine regulators\u2019 latest moves to curb [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24881,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1445,36,286],"class_list":["post-24882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-internet","tag-regulation","tag-society"],"aioseo_notices":[],"amp_enabled":true,"views":"49","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/24882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=24882"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/24882\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/24881"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=24882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=24882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=24882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}