Anzeige


Transparenz: Um diesen Blog kostenlos anbieten zu können, nutzen wir Affiliate-Links. Klickst du darauf und kaufst etwas, bekommen wir eine kleine Vergütung. Der Preis bleibt für dich gleich. Win-Win!

Russia now has its own Internet

The internet is free and the knowledge of the world belongs to everyone? This is by no means the case, because not only clear dictatorships like North Korea regulate what information is available to citizens in your country on the Internet. Russia now also has a new law to monitor and control the Internet more closely. The whole thing has been called “Law on the Sovereign Internet” since November 1, 2019

Although the term “sovereign” may not sound as drastic as our NetzDG (Network Enforcement Act), the sovereignty is not only meant to mean independence, but according to the writers of the law also protection against dangerous content. So one may ask how “dangerous content” will be defined in the future, and whether this is not more a question of censorship.

Russia now has its own Internet through a new law

Topic Overview

Anzeige

Russia now has its own Internet

The internet is free and the knowledge of the world belongs to everyone? This is by no means the case, because not only clear dictatorships like North Korea regulate what information is available to citizens in your country on the Internet. Russia now also has a new law to monitor and control the Internet more closely. The whole thing has been called “Law on the Sovereign Internet” since November 1, 2019

Although the term “sovereign” may not sound as drastic as our NetzDG (Network Enforcement Act), the sovereignty is not only meant to mean independence, but according to the writers of the law also protection against dangerous content. So one may ask how “dangerous content” will be defined in the future, and whether this is not more a question of censorship.

Russia now has its own Internet through a new law

Topic Overview

Anzeige

Internet surveillance begins with the blocking of sites

The freedom that the Russians had to miss in parts in the offline world has now been extended to the online world with the new law. And so all Internet providers will have to use filter technologies in the future to completely block websites, but also to give the state the opportunity to monitor data.

In this way, it is also quite conceivable that specific websites, for example, are locked out before elections in order to make information from abroad no longer accessible to citizens. The past has even shown that this approach is real with the mobile Internet. When thousands of Muscovites took to the streets in July 2019 to protest for free elections, ATMs in the city centers suddenly stopped working and mobile internet was turned off at 3G and LTE frequencies. The providers later justified the functional failure with an overload of the network, but later it turned out that a shutdown actually took place to prevent the exchange of information.

The blocking of websites will probably only be the beginning, which is legitimized by the “Law on the Sovereign Internet”. Because that would mean “only” censorship. Rather, it is possible to completely monitor, manipulate and prevent the Internet and the transmitted information.

This would be a step closer to the surveillance state as it is already a reality in North Korea and China. Currently, a VPN network can still be blocked by simply moving its location virtually to another country and at the same time encrypting the transmitted and received data. However, it should only be a matter of time before all IP addresses used by VPN providers are blocked or their services are no longer allowed to be offered in Russia.

The fact that censorship and information control on the Internet are not new, and even in actually free democracies are common practice should not be a secret. And so in Germany at the latest with the NetzDG (Network Enforcement Act) censorship is already taking place in social networks and on streaming platforms such as YouTube. And it is not uncommon for the algorithm used to shoot past the target and to operate it overblocking.

The Internet is both a curse and a blessing, and in addition to great opportunities and opportunities, there are also many dangers in some areas. Nevertheless, we believe that the knowledge of the world belongs to humanity. This is the only way for peoples to develop and connect freely. However, this will probably remain a dream that will develop in the opposite direction, as the tension in the world tends to worsen rather than relax in many regions. And the easiest way to manipulate people is to let them know what they should know.

We will definitely continue to watch closely, and also report on how the situation is developing.

Blogverzeichnis Bloggerei.de

Internet surveillance begins with the blocking of sites

The freedom that the Russians had to miss in parts in the offline world has now been extended to the online world with the new law. And so all Internet providers will have to use filter technologies in the future to completely block websites, but also to give the state the opportunity to monitor data.

In this way, it is also quite conceivable that specific websites, for example, are locked out before elections in order to make information from abroad no longer accessible to citizens. The past has even shown that this approach is real with the mobile Internet. When thousands of Muscovites took to the streets in July 2019 to protest for free elections, ATMs in the city centers suddenly stopped working and mobile internet was turned off at 3G and LTE frequencies. The providers later justified the functional failure with an overload of the network, but later it turned out that a shutdown actually took place to prevent the exchange of information.

The blocking of websites will probably only be the beginning, which is legitimized by the “Law on the Sovereign Internet”. Because that would mean “only” censorship. Rather, it is possible to completely monitor, manipulate and prevent the Internet and the transmitted information.

This would be a step closer to the surveillance state as it is already a reality in North Korea and China. Currently, a VPN network can still be blocked by simply moving its location virtually to another country and at the same time encrypting the transmitted and received data. However, it should only be a matter of time before all IP addresses used by VPN providers are blocked or their services are no longer allowed to be offered in Russia.

The fact that censorship and information control on the Internet are not new, and even in actually free democracies are common practice should not be a secret. And so in Germany at the latest with the NetzDG (Network Enforcement Act) censorship is already taking place in social networks and on streaming platforms such as YouTube. And it is not uncommon for the algorithm used to shoot past the target and to operate it overblocking.

The Internet is both a curse and a blessing, and in addition to great opportunities and opportunities, there are also many dangers in some areas. Nevertheless, we believe that the knowledge of the world belongs to humanity. This is the only way for peoples to develop and connect freely. However, this will probably remain a dream that will develop in the opposite direction, as the tension in the world tends to worsen rather than relax in many regions. And the easiest way to manipulate people is to let them know what they should know.

We will definitely continue to watch closely, and also report on how the situation is developing.

Blogverzeichnis Bloggerei.de

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.
Transparenz: Um diesen Blog kostenlos anbieten zu können, nutzen wir Affiliate-Links. Klickst du darauf und kaufst etwas, bekommen wir eine kleine Vergütung. Der Preis bleibt für dich gleich. Win-Win!

Search by category:

Search for:

About the Author:

Michael W. SuhrDipl. Betriebswirt | Webdesign- und Beratung | Office Training
After 20 years in logistics, I turned my hobby, which has accompanied me since the mid-1980s, into a profession, and have been working as a freelancer in web design, web consulting and Microsoft Office since the beginning of 2015. On the side, I write articles for more digital competence in my blog as far as time allows.
Transparenz: Um diesen Blog kostenlos anbieten zu können, nutzen wir Affiliate-Links. Klickst du darauf und kaufst etwas, bekommen wir eine kleine Vergütung. Der Preis bleibt für dich gleich. Win-Win!

Search by category:

Popular Posts:

2312, 2025

Ad-free home network: Install Pi-hole on Windows

December 23rd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

Say goodbye to ads on smart TVs and in apps: Pi-hole software turns your Windows laptop into a network filter. This article explains step-by-step how to install it via Docker and configure the necessary DNS settings in your FRITZ!Box.

2212, 2025

How to tune your FRITZ!Box into a professional call server

December 22nd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

A professional telephone system can be built using a FRITZ!Box and a laptop. This article shows step by step how to use the free software "Phoner" to schedule announcements and record calls – including important legal information (§ 201 StGB).

2112, 2025

Why to-do lists are a waste of time

December 21st, 2025|Categories: Shorts & Tutorials, Career, Homeoffice|Tags: , |

Do you feel unproductive at the end of the day, even though you've worked hard? Your to-do list is to blame. It tempts you to focus on easy tasks and ignores your limited time. This article explains why lists are "self-deception" and why professionals use a calendar instead.

1812, 2025

Smartphone Wi-Fi security: Public hotspots vs. home network

December 18th, 2025|Categories: Shorts & Tutorials, Data Protection, Hardware, Homeoffice, Software|Tags: , , |

Is smartphone Wi-Fi a security risk? This article analyzes in detail threats such as evil twin attacks and explains protective measures for when you're on the go. We also clarify why home Wi-Fi is usually secure and how you can effectively separate your smart home from sensitive data using a guest network.

2411, 2025

Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!

November 24th, 2025|Categories: Shorts & Tutorials, Artificial intelligence, Microsoft Excel, Microsoft Office, Software|Tags: , |

Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.

1611, 2025

Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen

November 16th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice|Tags: , |

Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.

Offers 2024: Word & Excel Templates

Popular Posts:

2312, 2025

Ad-free home network: Install Pi-hole on Windows

December 23rd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

Say goodbye to ads on smart TVs and in apps: Pi-hole software turns your Windows laptop into a network filter. This article explains step-by-step how to install it via Docker and configure the necessary DNS settings in your FRITZ!Box.

2212, 2025

How to tune your FRITZ!Box into a professional call server

December 22nd, 2025|Categories: Shorts & Tutorials, Homeoffice, Windows 10/11/12|Tags: , |

A professional telephone system can be built using a FRITZ!Box and a laptop. This article shows step by step how to use the free software "Phoner" to schedule announcements and record calls – including important legal information (§ 201 StGB).

2112, 2025

Why to-do lists are a waste of time

December 21st, 2025|Categories: Shorts & Tutorials, Career, Homeoffice|Tags: , |

Do you feel unproductive at the end of the day, even though you've worked hard? Your to-do list is to blame. It tempts you to focus on easy tasks and ignores your limited time. This article explains why lists are "self-deception" and why professionals use a calendar instead.

1812, 2025

Smartphone Wi-Fi security: Public hotspots vs. home network

December 18th, 2025|Categories: Shorts & Tutorials, Data Protection, Hardware, Homeoffice, Software|Tags: , , |

Is smartphone Wi-Fi a security risk? This article analyzes in detail threats such as evil twin attacks and explains protective measures for when you're on the go. We also clarify why home Wi-Fi is usually secure and how you can effectively separate your smart home from sensitive data using a guest network.

2411, 2025

Warum dein Excel-Kurs Zeitverschwendung ist – was du wirklich lernen solltest!

November 24th, 2025|Categories: Shorts & Tutorials, Artificial intelligence, Microsoft Excel, Microsoft Office, Software|Tags: , |

Hand aufs Herz: Wann hast du zuletzt eine komplexe Excel-Formel ohne Googeln getippt? Eben. KI schreibt heute den Code für dich. Erfahre, warum klassische Excel-Trainings veraltet sind und welche 3 modernen Skills deinen Marktwert im Büro jetzt massiv steigern.

1611, 2025

Cybersicherheit: Die 3 größten Fehler, die 90% aller Mitarbeiter machen

November 16th, 2025|Categories: Shorts & Tutorials, Data Protection, Homeoffice|Tags: , |

Hacker brauchen keine Codes, sie brauchen nur einen unaufmerksamen Mitarbeiter. Von Passwort-Recycling bis zum gefährlichen Klick: Wir zeigen die drei häufigsten Fehler im Büroalltag und geben praktische Tipps, wie Sie zur menschlichen Firewall werden.

Offers 2024: Word & Excel Templates

2023-06-03T10:04:27+02:00By |Categories: Shorts & Tutorials, Google, Uncategorized|Tags: , |
Ads

Popular Posts:

Search by category:

Autumn Specials:

Anzeige
Go to Top