For over a year, SplinterCon – a conference series initiated by Canada-based APC member eQualitie – has been bringing together developers, internet freedom activists, researchers and technologists to tackle the growing challenges of digital fragmentation and preserve the principles of a free, open internet.
You accessed this article through the internet – a global network of networks. Chances are, you didn’t consider where the server hosting this content is located. The internet was designed to seamlessly connect users to information and services worldwide, offering you the freedom to choose any messenger, browser, or file-sharing app, confident that they will all function as intended. This is the “intended web” – the borderless, interoperable system envisioned by the internet’s original architects, promoting free exchange and collaboration on a global scale.
However, over the years, this idealised vision has been steadily eroding. Multiple forces are driving the internet’s fragmentation. Governments are imposing censorship, creating national firewalls, and blocking access to global platforms. Corporations are building walled gardens, locking users into proprietary ecosystems. Environmental disruptions and wars threaten the physical infrastructure that supports global connectivity. As a result, while connectivity often remains available, the freedom to choose how you interact with the web is increasingly restricted. This fragmentation isn’t confined to authoritarian regimes; it’s a global reality affecting users everywhere.
Today, the internet is no longer a truly global network. Instead, it has become a collection of technical fiefdoms. Some are dominated by corporations that restrict access to external services, while others are fenced off by governments intent on controlling information flow. This rise of the 'splinternet' undermines the foundational principles of openness and universality upon which the internet was built.
Navigating the current fragmented digital landscape requires more than just an internet connection – it demands a versatile toolkit that empowers you to maintain your sovereignty and independence as a user. This is where SplinterCon comes into play. Initiated by eQualitie, SplinterCon has been at the forefront of tackling these challenges. For over a year, it has been bringing together developers, circumvention technology experts, activists, and thought leaders to address network fragmentation and preserve digital freedom.
SplinterCon serves as a nexus for innovation that is always on the lookout for innovative tools and strategies designed to help users navigate and mitigate the effects of a fragmented internet. At the upcoming Global Gathering, taking place from 27 to 29 September 2024 in Portugal, SplinterCon will introduce the Blockathon, a circumvention hackathon where developers will be invited to test their tools in a simulated shutdown environment. Participants will confront a set of challenges, new traffic obfuscation techniques, and compete for prizes. For both new and experienced developers, it will be a rare opportunity to put their circumvention skills to the test. Join us and help expand the toolkit for a more open internet.
A toolkit for digital independence
SplinterCon’s mission is to equip users with strategies and tools that preserve digital freedom and sovereignty, even in the face of extreme network fragmentation. By fostering collaboration among technologists and internet freedom advocates, the conference has cultivated a diverse array of solutions that address the multifaceted challenges of the Splinternet. Here are some tools and strategies that we at eQualitie can recommend.
Beyond terrestrial barriers
Satellite-based communication
One of the most effective ways to get around state-controlled internet restrictions is to bypass terrestrial infrastructure entirely, relying instead on satellite-based systems. Satellite communication enables direct, uncensored access to global networks, free from controls that governments impose on national internet service providers (ISPs).
eQSat, an initiative by eQualitie, leverages satellite datacasting to deliver digital content to users in restricted environments. By repurposing satellite television infrastructure, eQSat transmits websites, software updates, and videos without the need for a traditional internet connection. In environments where national networks are heavily monitored or shut down, eQSat bypasses censorship by delivering content directly via low-cost satellite dishes.
Similarly, Toosheh uses satellite datacasting to broadcast digital content – flattened websites, educational materials, and software – to regions like Iran, where heavy censorship is in place. Toosheh allows users to receive essential information daily, even in environments where access to the internet has been blocked.
Satellite-based communication represents a crucial development area for technologists working in fragmented environments. These tools provide uncensored content directly to users, independent of local infrastructure and censorship mechanisms.
If you go into the shadows, take your friends
Peer-to-peer and mesh networks
When access to the global internet is restricted or censored, decentralised network topologies such as peer-to-peer (P2P) and mesh networks offer a resilient fallback. These networks allow direct communication between devices without relying on centralised ISPs, enabling communities to remain connected even in hostile environments.
Briar is another P2P communication tool that allows users to exchange messages and files via Bluetooth, Wi-Fi or the internet without relying on centralised servers. Briar is specifically designed for use in hostile environments where surveillance and censorship are pervasive. Its end-to-end encryption ensures secure communications, making it a vital tool for journalists, activists, and anyone working in adversarial conditions.
Qaul.net extends the P2P approach further, allowing users to form ad hoc mesh networks for local communication without internet access. These networks operate via local Wi-Fi or Bluetooth connections, creating resilient communication infrastructures that are difficult for governments to disrupt or monitor.
Technologists building decentralised alternatives can look to these tools as a blueprint for creating resilient, censorship-resistant networks that protect user sovereignty.
Decentralised and federated platforms
Federated platforms distribute control across independent servers, reducing central points of failure and control. This architecture is crucial for maintaining user autonomy and sovereignty in an increasingly fragmented internet.
The Matrix Protocol, an open standard for decentralised, real-time communication, supports secure messaging and Voice over Internet Protocol (VoIP) services across a federated network of servers. Because no single entity controls the Matrix network, users can maintain control over their data and communications even in highly censored environments. Matrix is designed for interoperability, allowing it to work alongside other services and resist government censorship by distributing traffic across independent nodes.
Mastodon, a federated social media platform, offers a decentralised alternative to centralised networks like X (formerly Twitter) or Meta (formerly Facebook). Built on the ActivityPub protocol, Mastodon allows users to create and host their own servers, which interact with others across the broader network. This decentralised model provides more control over data and interactions, free from the influence of corporate control or state censorship.
dComms, developed by eQualitie, offers a suite of decentralised communication tools designed to work within fragmented networks. By bundling services like Matrix, Delta Chat, Ceno and Mastodon into a single container, dComms enables continued communication even when global internet connectivity is limited.
Protecting user data
Encryption and privacy
In environments where surveillance and censorship are pervasive, encryption is essential for protecting user privacy and securing communications. Tools like Nahoft and Outline VPN (virtual private network) provide critical defenses against state-imposed monitoring and restrictions.
Nahoft, developed for Persian (Farsi) speakers, encrypts messages into strings of Persian words or embeds them in images. This allows users to communicate securely even in heavily monitored environments. Nahoft operates entirely offline, ensuring that no centralised servers are involved, protecting user privacy.
The Tor Network continues to be a fundamental tool for anonymous communication. Tor routes traffic through a network of volunteer-run servers, obfuscating user locations and enabling censorship-resistant browsing.
Outline VPN, developed by Jigsaw, is an open-source tool that allows users to create and manage their own VPN servers. Decentralising control over VPN infrastructure makes it harder for governments to detect and block encrypted traffic. Outline’s customisable architecture enables users to bypass state-imposed blocks, offering a powerful tool for evading censorship.
Staying connected during shutdowns
Alternative communication channels
In cases where governments enact complete internet shutdowns, alternative communication systems can maintain critical information flows. High-frequency (HF) radio, for example, can be used to transmit digital data without relying on traditional internet infrastructure.
HERMES (High-frequency Emergency and Rural Multimedia Exchange System) uses HF radio to transmit digital data over long distances without the need for an internet connection. Originally designed for rural and remote areas, HERMES can support the transmission of emails, text and other essential information in environments where internet access has been completely cut off.
The Ceno Browser (Censorship No!) is a P2P browser that uses the BitTorrent protocol to cache and distribute web content among users. If a user accesses a website, the content is cached and shared across the network, circumventing the need for a direct connection to external servers. This distributed approach enables users to access blocked content while distributing the load across a network of peers, making censorship efforts less effective.
For more information and to participate in upcoming events, visit splintercon.net. Together, we can build a resilient internet that upholds the values of freedom, privacy and universal access.
This blog post is brought to you by members of the eQualitie team, dedicated to research, development and advocacy for digital freedom and open, resilient internet infrastructure. With a focus on circumventing censorship and preserving user sovereignty in fragmented digital landscapes, the team works on innovative tools and solutions to ensure global connectivity. To get in touch, please reach out at info@splintercon.net.