SlideShare a Scribd company logo
1 of 30
Understanding & Combating Global
Censorship with WordPress
John P. Gamboa
jpgamboa.com
@jgamboa
WordCamp Los Angeles 2015
@jgamboa
• Enterprise Support Team, WP Engine
• Four plus years of web experience
abroad
• Lived in Singapore, Seoul and
Shanghai
• San Diego State - Journalism &
Geography
What you’ll learn from me
• Why and how WordPress
and non-WordPress sites
get blocked
• Which plugins are blocked
and how they affect
performance
• What to do when your site
is blocked
• How to work around the
censored Web
Censorship Types
Government Religious
Censorship Types
MoralSelf-Censorship
What is Web Censorship
• Domain and IP-level
timeout, connection resets,
removed content
• Man-in-the-middle attacks,
State sponsored DDOS
• Government ISP
directives
• Trolls and hackers for
hire
• Judicial retaliation
How is WordPress Affected?
• WordPress is now nearly a quarter of the entire Internet
• More non-English Downloads than English Downloads
• “Internet Sovereignty,” Segmentation and The Right to be
Forgotten
• Democratization of the web
Web & WordPress Censorship
Turkey
• Reports of WordPress.com in May
linked to single blog post
• Censorship related to take-down
requests and anti-government
speech
• EngelliWeb.com - list of domains
blocked in Turkey
Russia
• 2012 Government Decree/2015 “Illegal
Memes”
• Trolls for hire - New York Times “The
Agency”
• SORM - Surveillance & Monitoring
• RUBlacklist.net - list of blocked sites
India
• Fluctuating censorship protocols based on 2000 & 2009 IT
Act
• Public discourse & discussion of the web
• Targeted WordPress sites, often due to radicalization
fears
Vietnam
• Communist state
• Targets dissident WordPress users
• Social media sites sometimes blocked
• Savviest users
Middle East
• SmartFilter - American tech
used for censorship
• Saudi Arabia, Qatar,
Oman, UAE
• Lots of individual blogs
• Facebook, Twitter, etc in
Iran
China
• Most pervasive form of
Internet censorship
• Great Firewall of China
promotes harmony
• Causes the most trouble
with WordPress
• Many top Alexa sites
blocked
• Facebook, Twitter,
WordPress.com, Blogger,
YouTube, Flickr, Dropbox
— All blocked
• World’s largest Internet
population
China, cont.
• 96% all traffic within Mainland
• Avoid the Three “T’s” & Uighur
Rights
• Limited VPN usage
• River Crabs, 50 Centers & Big
Mamas 河蟹,五毛 & 大妈
China, cont.
• 96% all traffic within Mainland
• Avoid the Three “T’s” & Uighur
Rights
• Limited VPN usage
• River Crabs, 50 Centers & Big
Mamas 河蟹,五毛 & 大妈
Blocked Plugins & Functionality
• API/External WordPress
calls
• Politically-sensitive
discussions
• Blocked IPs and domains on
shared hosts
• Jetpack, WordPress.com,
Gravatar
• Google (Plus, Fonts, Photos)
• Be Mindful: BBPress, Yoast
SEO, Social Media
Developing Around Censorship
• Know your blocked plugins
• Limiting reliance on outside
sources
• Reconsider SSL
• Government hosting
“registration” -
CloudFlare/Baidu
• Avoid sensitive discussion
• You are responsible for
your users
• Hong Kong hosting
If you get blocked
• Confirm
- BlockedinIran.com
- Greatfire.org
- RUBlacklist.net
- EngelliWeb.com
• Ask your host for help
- Noisy neighbors
- Domain blocks
- Change servers/hosts
What Can The Community Do?
• Continue to Support Non-English WordPress
• Follow and Understand OpenNet Initiative
• Polyglots: Contribute to Core and Plugin Translations
• Talk About it
• Publish, Publish, Publish
Q & A
John P. Gamboa
@jgamboa
jpgamboa.com
http://wclax.reviews

More Related Content

Similar to Understanding & Combating Global Censorship with WordPress

Understanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPressUnderstanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPressJohn Gamboa
 
Understanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPressUnderstanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPressJohn Gamboa
 
Tales From The Closed Web: Working with WordPress Censorship in China
Tales From The Closed Web: Working with WordPress Censorship in ChinaTales From The Closed Web: Working with WordPress Censorship in China
Tales From The Closed Web: Working with WordPress Censorship in ChinaJohn Gamboa
 
Social Media Marketing Tools and Strategies for Master Gardener coordinators
Social Media Marketing Tools and Strategies for Master Gardener coordinatorsSocial Media Marketing Tools and Strategies for Master Gardener coordinators
Social Media Marketing Tools and Strategies for Master Gardener coordinatorsKim Kruse
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presencePhil Bradley
 
Breaking WordPress
Breaking WordPressBreaking WordPress
Breaking WordPressDavid Yarde
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social changeBill Chea
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social changeMoses Ngeth
 
Where does the Digital Landscape take us? Nov 11, 2009
Where does the Digital Landscape take us? Nov 11, 2009Where does the Digital Landscape take us? Nov 11, 2009
Where does the Digital Landscape take us? Nov 11, 2009Bjorn Elmberg
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todaySimeon Bala
 
Marketing with technology for contractors
Marketing with technology for contractorsMarketing with technology for contractors
Marketing with technology for contractorsNehlsen Communications
 
Ambassador You: Integrating Social Media into Business Communications
Ambassador You: Integrating Social Media into Business CommunicationsAmbassador You: Integrating Social Media into Business Communications
Ambassador You: Integrating Social Media into Business CommunicationsJaggers Communications
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations Damir Delija
 
Corporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsCorporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsInflow
 
Blogging, the wordpress way
Blogging, the wordpress wayBlogging, the wordpress way
Blogging, the wordpress wayM A Hossain Tonu
 
Introduction to Online Reputation Management (ORM)
Introduction to Online Reputation Management (ORM)Introduction to Online Reputation Management (ORM)
Introduction to Online Reputation Management (ORM)Anvil Media, Inc.
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)kmcintire84
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark WebCase IQ
 

Similar to Understanding & Combating Global Censorship with WordPress (20)

Understanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPressUnderstanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPress
 
Understanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPressUnderstanding & Combating Global Censorship with WordPress
Understanding & Combating Global Censorship with WordPress
 
Tales From The Closed Web: Working with WordPress Censorship in China
Tales From The Closed Web: Working with WordPress Censorship in ChinaTales From The Closed Web: Working with WordPress Censorship in China
Tales From The Closed Web: Working with WordPress Censorship in China
 
Social Media Marketing Tools and Strategies for Master Gardener coordinators
Social Media Marketing Tools and Strategies for Master Gardener coordinatorsSocial Media Marketing Tools and Strategies for Master Gardener coordinators
Social Media Marketing Tools and Strategies for Master Gardener coordinators
 
Creating a social media presence
Creating a social media presenceCreating a social media presence
Creating a social media presence
 
Breaking WordPress
Breaking WordPressBreaking WordPress
Breaking WordPress
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
 
Safety social media for positive social change
Safety social media for positive social changeSafety social media for positive social change
Safety social media for positive social change
 
Where does the Digital Landscape take us? Nov 11, 2009
Where does the Digital Landscape take us? Nov 11, 2009Where does the Digital Landscape take us? Nov 11, 2009
Where does the Digital Landscape take us? Nov 11, 2009
 
Evaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media todayEvaluating the use of search engines and social Media today
Evaluating the use of search engines and social Media today
 
Marketing with technology for contractors
Marketing with technology for contractorsMarketing with technology for contractors
Marketing with technology for contractors
 
Ambassador You: Integrating Social Media into Business Communications
Ambassador You: Integrating Social Media into Business CommunicationsAmbassador You: Integrating Social Media into Business Communications
Ambassador You: Integrating Social Media into Business Communications
 
Deep Web and Digital Investigations
Deep Web and Digital Investigations Deep Web and Digital Investigations
Deep Web and Digital Investigations
 
Corporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find JobsCorporate Counsel: How To Use Social Media To Find Jobs
Corporate Counsel: How To Use Social Media To Find Jobs
 
Blogging, the wordpress way
Blogging, the wordpress wayBlogging, the wordpress way
Blogging, the wordpress way
 
Introduction to Online Reputation Management (ORM)
Introduction to Online Reputation Management (ORM)Introduction to Online Reputation Management (ORM)
Introduction to Online Reputation Management (ORM)
 
Social media
Social mediaSocial media
Social media
 
Social media
Social mediaSocial media
Social media
 
Sopa (stop online piracy act)
Sopa (stop online piracy act)Sopa (stop online piracy act)
Sopa (stop online piracy act)
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 

Recently uploaded

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 

Recently uploaded (20)

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 

Understanding & Combating Global Censorship with WordPress

  • 1. Understanding & Combating Global Censorship with WordPress John P. Gamboa jpgamboa.com @jgamboa WordCamp Los Angeles 2015
  • 2. @jgamboa • Enterprise Support Team, WP Engine • Four plus years of web experience abroad • Lived in Singapore, Seoul and Shanghai • San Diego State - Journalism & Geography
  • 3. What you’ll learn from me • Why and how WordPress and non-WordPress sites get blocked • Which plugins are blocked and how they affect performance • What to do when your site is blocked • How to work around the censored Web
  • 6. What is Web Censorship • Domain and IP-level timeout, connection resets, removed content • Man-in-the-middle attacks, State sponsored DDOS • Government ISP directives • Trolls and hackers for hire • Judicial retaliation
  • 7. How is WordPress Affected? • WordPress is now nearly a quarter of the entire Internet • More non-English Downloads than English Downloads • “Internet Sovereignty,” Segmentation and The Right to be Forgotten • Democratization of the web
  • 8. Web & WordPress Censorship
  • 9. Turkey • Reports of WordPress.com in May linked to single blog post • Censorship related to take-down requests and anti-government speech • EngelliWeb.com - list of domains blocked in Turkey
  • 10. Russia • 2012 Government Decree/2015 “Illegal Memes” • Trolls for hire - New York Times “The Agency” • SORM - Surveillance & Monitoring • RUBlacklist.net - list of blocked sites
  • 11. India • Fluctuating censorship protocols based on 2000 & 2009 IT Act • Public discourse & discussion of the web • Targeted WordPress sites, often due to radicalization fears
  • 12. Vietnam • Communist state • Targets dissident WordPress users • Social media sites sometimes blocked • Savviest users
  • 13. Middle East • SmartFilter - American tech used for censorship • Saudi Arabia, Qatar, Oman, UAE • Lots of individual blogs • Facebook, Twitter, etc in Iran
  • 14.
  • 15.
  • 16. China • Most pervasive form of Internet censorship • Great Firewall of China promotes harmony • Causes the most trouble with WordPress • Many top Alexa sites blocked • Facebook, Twitter, WordPress.com, Blogger, YouTube, Flickr, Dropbox — All blocked • World’s largest Internet population
  • 17. China, cont. • 96% all traffic within Mainland • Avoid the Three “T’s” & Uighur Rights • Limited VPN usage • River Crabs, 50 Centers & Big Mamas 河蟹,五毛 & 大妈
  • 18.
  • 19.
  • 20.
  • 21. China, cont. • 96% all traffic within Mainland • Avoid the Three “T’s” & Uighur Rights • Limited VPN usage • River Crabs, 50 Centers & Big Mamas 河蟹,五毛 & 大妈
  • 22.
  • 23.
  • 24. Blocked Plugins & Functionality • API/External WordPress calls • Politically-sensitive discussions • Blocked IPs and domains on shared hosts • Jetpack, WordPress.com, Gravatar • Google (Plus, Fonts, Photos) • Be Mindful: BBPress, Yoast SEO, Social Media
  • 25. Developing Around Censorship • Know your blocked plugins • Limiting reliance on outside sources • Reconsider SSL • Government hosting “registration” - CloudFlare/Baidu • Avoid sensitive discussion • You are responsible for your users • Hong Kong hosting
  • 26.
  • 27.
  • 28. If you get blocked • Confirm - BlockedinIran.com - Greatfire.org - RUBlacklist.net - EngelliWeb.com • Ask your host for help - Noisy neighbors - Domain blocks - Change servers/hosts
  • 29. What Can The Community Do? • Continue to Support Non-English WordPress • Follow and Understand OpenNet Initiative • Polyglots: Contribute to Core and Plugin Translations • Talk About it • Publish, Publish, Publish
  • 30. Q & A John P. Gamboa @jgamboa jpgamboa.com http://wclax.reviews

Editor's Notes

  1. Hey Everyone. I’m John P. Gamboa. I’m a Enterprise Support Specialist at WP Engine’s HQ in Austin, TX, USA Prior to being in TX I spent four years living and working overseas. One year in S. Korea and nearly three years in Shanghai, China I got my start in WordPress doing a few small beer-oriented websites for Shanghai’s burgeoning craft beer scene. And yes, there’s craft beer in China.
  2. Government: Most obvious and well-known type of censorship. This is information that a government doesn’t want you to know or so. Or information they can’t control. Religious censorship is a form of censorship where freedom of expression is controlled or limited using religious authority or on the basis of the teachings of the religion. This has been seen in all corners of the world. Moral censorship is the suppression of materials that the public considers obscene or offensive. Think snuff films and child pornography. This is most culturally-accepted type of censorship. Chief Justice Potter of the US Supreme Court once famously said about obscenity, IE, moral censorship “I know it when I see it.” This is the most dubious form of censorship, that has the most risks for free expression Self-censorship: This is the most commonly seen in our web 2.0 era. This is one of the most damaging for the posterity of the web, and its been seen in many different places. For example, buzzfeed deleting thousands of posts online.
  3. Government: Most obvious and well-known type of censorship. This is information that a government doesn’t want you to know or so. Or information they can’t control. Religious censorship is a form of censorship where freedom of expression is controlled or limited using religious authority or on the basis of the teachings of the religion. This has been seen in all corners of the world. Moral censorship is the suppression of materials that the public considers obscene or offensive. Think snuff films and child pornography. This is most culturally-accepted type of censorship. Chief Justice Potter of the US Supreme Court once famously said about obscenity, IE, moral censorship “I know it when I see it.” This is the most dubious form of censorship, that has the most risks for free expression Self-censorship: This is the most commonly seen in our web 2.0 era. This is one of the most damaging for the posterity of the web, and its been seen in many different places. For example, buzzfeed deleting thousands of posts online.
  4. There are lots of countries, including my own native United States, that make numerous organization’s lists of enemies of the Web. However, for the sake of our discussion, we’re going to talk mostly about emerging or growing markets and how their censorship affect WordPress and its viability of a growing Web