diff --git a/content/post/2024-kazakhstan-report/index.md b/content/post/2024-kazakhstan-report/index.md index e103ce069..0d695c0a3 100644 --- a/content/post/2024-kazakhstan-report/index.md +++ b/content/post/2024-kazakhstan-report/index.md @@ -11,6 +11,8 @@ In recent years, internet censorship in Kazakhstan has been [reported](https://f In this report, we share OONI censorship measurement findings and relevant legal context. We found numerous [news media](https://explorer.ooni.org/search?probe_cc=KZ&test_name=web_connectivity&since=2023-06-01&until=2024-06-01&failure=false&category_code=NEWS&only=anomalies), [human rights](https://explorer.ooni.org/chart/mat?test_name=web_connectivity&axis_x=measurement_start_day&since=2023-06-01&until=2024-06-01&time_grain=day&probe_cc=KZ&axis_y=domain&domain=www.ipetitions.com%2Cwww.change.org%2Cegov.press%2Camnesty.org.ru), and [circumvention tool websites blocked](https://explorer.ooni.org/chart/mat?test_name=web_connectivity&axis_x=measurement_start_day&since=2023-06-01&until=2024-06-01&time_grain=day&probe_cc=KZ&axis_y=domain&category_code=ANON) in Kazakhstan by means of TLS interference. We also found 7 distinct intermediate certificates signed by 4 distinct root CAs being used to carry out TLS man-in-the-middle (MITM) attacks, targeting at least 14 distinct domain names on at least 19 different networks in Kazakhstan. We share more details below. +{{< oonibtn href="/documents/OONI-Report-Kazakhstan-2024-English.pdf" text="Download in PDF" >}} + {{}} ## **Key Findings** diff --git a/content/post/2024-kazakhstan-report/index.ru.md b/content/post/2024-kazakhstan-report/index.ru.md index 22a95e34b..626787d31 100644 --- a/content/post/2024-kazakhstan-report/index.ru.md +++ b/content/post/2024-kazakhstan-report/index.ru.md @@ -11,6 +11,8 @@ categories: ["report"] В этом отчете мы делимся результатами измерений OONI и соответствующим правовым контекстом. Мы обнаружили заблокироваными в Казахстане с помощью TLS-вмешательства множество сайтов [новостных СМИ](https://explorer.ooni.org/search?probe_cc=KZ&test_name=web_connectivity&since=2023-06-01&until=2024-06-01&failure=false&category_code=NEWS&only=anomalies), [правозащитных организаций](https://explorer.ooni.org/chart/mat?test_name=web_connectivity&axis_x=measurement_start_day&since=2023-06-01&until=2024-06-01&time_grain=day&probe_cc=KZ&axis_y=domain&domain=www.ipetitions.com%2Cwww.change.org%2Cegov.press%2Camnesty.org.ru) и [инструментов обхода блокировки](https://explorer.ooni.org/chart/mat?test_name=web_connectivity&axis_x=measurement_start_day&since=2023-06-01&until=2024-06-01&time_grain=day&probe_cc=KZ&axis_y=domain&category_code=ANON). Мы также задокументировали 7 различных промежуточных сертификатов подписанных четырьмя уникальными корневыми сертификатами (НУЦ РК), которые использовались для проведения атак типа ["man-in-the-middle" (MITM) в рамках TLS-рукопожатия](https://explorer.ooni.org/m/20210808015758.022737_KZ_webconnectivity_3b9213f9ee4f2d06) в случае подключения к не менее 14 различным доменным именам в не менее чем 19 различных сетях в Казахстане. Более подробная информация представлена ниже. +{{< oonibtn href="/documents/OONI-Report-Kazakhstan-2024-Russian.pdf" text="Скачать в PDF" >}} + {{}} ## **Основные выводы** diff --git a/static/documents/OONI-Report-Kazakhstan-2024-English.pdf b/static/documents/OONI-Report-Kazakhstan-2024-English.pdf new file mode 100644 index 000000000..9a27d7d7a Binary files /dev/null and b/static/documents/OONI-Report-Kazakhstan-2024-English.pdf differ diff --git a/static/documents/OONI-Report-Kazakhstan-2024-Russian.pdf b/static/documents/OONI-Report-Kazakhstan-2024-Russian.pdf new file mode 100644 index 000000000..1a69cda25 Binary files /dev/null and b/static/documents/OONI-Report-Kazakhstan-2024-Russian.pdf differ