Original author(s) | Adam Fisk[1] |
---|---|
Stable release | 7.7.0[2]
/ 14 December 2023 |
Repository | |
Written in | Go |
Operating system | Linux, OS X, Windows, Android |
Type | Internet censorship circumvention |
License | Apache License 2.0[3] |
Website | lantern |
Lantern is a free[lower-alpha 1] internet censorship circumvention tool that operates in some of the most extreme censorship environments, such as China, Iran, and Russia.[5] It uses wide variety of protocols and techniques that obfuscate network traffic and/or co-mingle traffic with protocols censors are reluctant to block. It also uses domain fronting.[6] It is not an anonymity tool like Tor.[1]
Early versions of Lantern allowed users in countries having free internet access to share their internet connection with those who are in countries where the network is partly blocked.[7] Network connections will be dispersed between multiple computers running Lantern so it will not put undue stress on a single connection or computer.[8]
Lantern's CEO and lead developer is Adam Fisk, is a former lead engineer of LimeWire and LittleShoot.[9]
In early December 2013, Lantern had a surge of Chinese users and could reach from 200 users to 10,000 users in just two weeks.[10] Soon after that, the network was almost blocked by the Chinese government.[11] Another surge occurred after the 2022 Russian invasion of Ukraine when internet freedoms in Russia were severely curtailed.[12]
The software received US$2.2 million (HK$17.1 million) in seed funding from the US State Department.[13]
Lantern is hosted on a wide variety and continually changing set of data centers around the world. It has used Digital Ocean at times, which was briefly reported as blocked in Iran during the civil unrest on January 2, 2018.[14]
History
In early versions, Lantern's framework required the use of Google Talk for users to invite other trusted users from their Google Talk contacts.[8] It has received funding from the US Department of State. This has raised some concerns about the privacy of users, though Fisk has said the State Department is "incredibly hands off" and never dictates how they should write Lantern, or how they should talk about it.[1][8]
Users are not required to connect by invite since version 2.0 was released in 2015.
Privacy policy
Per Lantern's privacy policy document on their website
Lantern servers do not and will never log:
- Linking Lantern account to real identity (such as purchase information)
- Connection logs (time stamps of connection of IP addresses from client to Lantern server)
- Browsing history
- Traffic destination or metadata
- DNS queries[15]
Lantern collects as little information about their customers as possible in order to run their service:
Our guiding principle toward data collection is to collect only the minimal data required to operate a world-class service at scale. We designed our systems to not have sensitive data about our customers; even when compelled, we cannot provide data that we do not possess.
Related events
At the beginning of 2019, it was reported that the Guangdong police had imposed penalties on the basis of the "Interim Provisions on the Administration of the International Network of Computer Information Network of the People's Republic of China" for a Lantern user to "create and use illegal channels for international networking." The fine is a thousand Yuan. The document of the punishment was publicized on the “Guangdong Public Security Law Enforcement Information Disclosure Platform”.[16]
In March of 2022 it was reported that Russian users were employing Lantern to bypass censorship measures put in place by the Russian government.[17]
See also
Notes
External links
References
- 1 2 3 Guthrie Weissman, Cale (October 22, 2013). "Here's an anti-Internet censorship program for activists by activists". Pando. Archived from the original on 4 Jun 2021. Retrieved 13 March 2014.
- ↑ "Release 7.7.0". 14 December 2023. Retrieved 19 December 2023.
- ↑ "LICENSE". GitHub. 27 August 2015. Retrieved 27 August 2015.
- ↑ "getLantern/Lantern". github.com. Retrieved 24 Aug 2020.
- ↑ "Meet the Secretive US Company Building an 'Unbreakable' Internet Inside Russia". 24 March 2022.
- ↑ Fifield D, Lan C, Hynes R, Wegmann P, Paxson V (2015-05-15). "Blocking-resistant communication through domain fronting". Proceedings on Privacy Enhancing Technologies. Proceedings on Privacy Enhancing Technologies 2015. 2015 (2): 46–64. doi:10.1515/popets-2015-0009. S2CID 5626265.
- ↑ "Anti-firewall tool Lantern infiltrated by Chinese censors". South China Morning Post. 11 December 2013. Retrieved 13 March 2014.
- 1 2 3 McKenzie, Jessica (October 22, 2013). "Could State Department Funded Lantern Be Bigger, Better Tor?". Archived from the original on 26 March 2014. Retrieved 13 March 2014.
- ↑ "NEXT GENERATION ANTI-CENSORSHIP TOOLS - PANELIST BIOS". techATstate. March 6, 2013. Archived from the original on 29 April 2013. Retrieved 13 March 2014.
- ↑ "Lantern Program Allows Chinese to Dodge Firewall - China Digital Times (CDT)". China Digital Times. China Digital Times. December 5, 2013. Retrieved 13 March 2014.
- ↑ "China blocks censorship circumvention software Lantern after a surge of Chinese users". TECH IN ASIA. December 11, 2013. Retrieved 13 March 2014.
- ↑ "Meet the Secretive US Company Building an 'Unbreakable' Internet Inside Russia". Vice. March 24, 2022. Retrieved 25 March 2022.
- ↑ "US-funded Lantern program allows Chinese to dodge Great Firewall and view banned websites". South China Morning Post. 4 December 2013. Retrieved 13 January 2016.
- ↑ "January 3, 2018 Episode Transcript". The Current. CBC. Retrieved 4 January 2018.
- ↑ "Lantern | Open Internet For All". lantern.io. Retrieved 2023-02-10.
- ↑ "韶雄公(网)行罚决字 [2019]1号". 广东公安执法信息公开平台 (in Chinese (China)). 2018-12-28. Archived from the original on 2019-01-05. Retrieved 2019-01-05.
- ↑ "Meet the Secretive US Company Building an 'Unbreakable' Internet Inside Russia". 24 March 2022.