Open DNS blocked for hours, but why?

Metaratings
26 Sep 2014
00:00

It started as a typical bad day for True Internet. Many people took to social media to complain about True's service on Thursday, September 25. Oh, well, just another day in Thailand, I thought to myself. But no, not quite.

The slowdown and lack of speed was apparently blamed on the Hong Kong - Vietnam cable break according to those who had bothered to contact True’s customer service. Even Jonathan Head, the BBC Bangkok correspondent, waded into on one of my threads on Twitter to dismiss my idea of a spying conspiracy.

“There is a problem with undersea cable affecting all True customers visiting overseas sites till 6 October,” he tweeted.

Then he added the caveat, “It's what True are telling is - of course being True it may not be true.” Wow, the BBC and I actually agreeing on something? Miracles do happen.

For its part, True apparently said that some gear at state-owned CAT IIG was down.

Which was fine. We all had our laughs about a post-Snowden world and tinfoil hats. Then things sped up again and complaints went away. Or so we thought.

Apparently, after the so-called fiber break had been fixed (it had not) and the routers at CAT had been fixed (were they even broken to begin with?) the net result was that Open DNS was blocked on True Internet, at least for most of the afternoon.

One upset user tweeted on the benefits of using Open DNS: “I'll really get to the site I intend to get too and don't think opendns care particularly where that is.”

By all means go ahead and censor the Internet and put in mass surveillance. But please do not insult our intelligence by blaming the installation of a censorship node on a week-old cable break.

I would like to think that this is a the result of a paranoia of anything with the word Open in it. If it cannot be controlled, banning it or shutting it down seems to be the order of the day in Thailand.

But when all is said and done, what is the point of blocking Open DNS? Would any spy agency really use DNS spoofing and go to the trouble of creating a phishing site?

Oh, wait, that's exactly what UK spy agency GCHQ did with QUANTUMINSERT and their fake LinkedIn page when they spied on Belgacom’s senior executives.

Related content

Comments
No Comments Yet! Be the first to share what you think!