Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Bypassing Australian internet censorship
#4
Before using Psiphon people should read the privacy policy you can find it here (source ) ALWAYS read the PP
The parts I find interesting :
 
Quote:Storage Access Logging

We use Amazon S3 to store assets such as website files and Psiphon server discovery lists. We sometimes enable logging of downloads of these files. Analyzing these logs helps us to answer questions like "how many users are starting but not completing the download of the server discovery list?", "how is the downloaded data split between website assets and server discovery?", and "is an attacker making a denial-of-service attempt against our websites?"
S3 bucket access logs contain IP addresses, user agents, and timestamps. These logs are stored in S3 itself, so Amazon has access to these logs. (However, Amazon already serves the files, so they can already access this information.) Psiphon developers will download the logs, aggregate and analyze the data, and then delete the logs. Raw data will be kept only long enough to aggregate it and will not be shared with third parties.
Psiphon Servers
We collect the following data to find out how well Psiphon is working, what sites are popular, and what propagation strategies are effective. This information is shared with our partners so that they can see, for example, how often their sites are visited through Psiphon and from which countries.
  • Number of email requests for client download link
  • Number of upgrades
  • How often each protocol is used, and error codes after failure
  • How often new servers are discovered
  • Session count and session duration
  • Total bytes transferred and bytes transferred for some specific domains
  • Client platform (simplified operating system list; e.g, not a detailed browser user agent)
User IP addresses are not collected by Psiphon servers in the normal course of operation. Psiphon does not require user accounts, so, by default, there is no collection of email addresses, usernames, or passwords.
Event logs include timestamps, region codes (country and city), and non-identifying attributes including sponsor ID (determined by which Psiphon client build is used), client version, and protocol type. Page views are aggregated by time and/or session before being logged.
All statistics shared with sponsors are further aggregated by date, sponsor, and region.

What user information does Psiphon collect?

From time to time Psiphon may have to record additional information in order to resolve a problem with our service. When this occurs, we will add an entry to the Privacy Bulletindescribing what was recorded, how long it was kept, and why


Messages In This Thread
RE: Bypassing Australian internet censorship - by Wallfire - 12-27-2018, 03:33 PM

Forum Jump:


Users browsing this thread: 1 Guest(s)