Data haven
datahavendata havens
A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data.wikipedia
49 Related Articles
HavenCo
Avi FreedmanSealand data center
Tor's onion space (hidden service), HavenCo (centralized), and Freenet (decentralized) are three models of modern-day virtual data havens.
HavenCo Limited was a data haven, data hosting services company, founded in 2000 to operate from Sealand, a self-declared sovereign principality that occupies a man-made former World War II defensive facility originally known as Roughs Tower located approximately six miles from the coast of Suffolk, southeast England.
Internet censorship
Internet freedomcensorshipInternet filtering
Reasons for establishing data havens include access to free political speech for users in countries where censorship of the Internet is practiced.
Pseudonymity and data havens (such as Freenet) protect free speech using technologies that guarantee material cannot be removed and prevents the identification of authors.

Cryptonomicon
KinakutaQwghlmGoto Dengo
The 1990s segments of Neal Stephenson's 1999 novel Cryptonomicon concern a small group of entrepreneurs attempting to create a data haven.
The second narrative is set in the late 1990s, with characters that are (in part) descendants of those of the earlier time period, who employ cryptologic, telecom, and computer technology to build an underground data haven in the fictional Sultanate of Kinakuta.

Islands in the Net
Science fiction novelist William Gibson used the term in his novels Count Zero and Mona Lisa Overdrive, as did Bruce Sterling in Islands in the Net.
The protagonist, swept up in events beyond her control, finds herself in places that are off the net, from a datahaven in Grenada, to a Singapore under terrorist attack, to the poorest and most disaster-struck part of Africa.


Neal Stephenson
Neil StephensonQuicksilver WikiStephen Bury
The 1990s segments of Neal Stephenson's 1999 novel Cryptonomicon concern a small group of entrepreneurs attempting to create a data haven.
This was followed by Cryptonomicon in 1999, a novel concerned with concepts ranging from computing and Alan Turing's research into codebreaking and cryptography during the Second World War at Bletchley Park, to a modern attempt to set up a data haven.




Principality of Sealand
Sealandhostage incidentSealand Arms
Sealand has been involved in several commercial operations, including the issuing of coins and postage stamps and the establishment of an offshore Internet hosting facility, or 'data haven'.







Crypto-anarchism
crypto-anarchistcryptoanarchistscrypto-anarchists
Corporate haven
IP–based BEPS tooltransformed their tax code in 2009–12Corporate tax haven lists
A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data.









Tax haven
tax havenstax haven listscountry
A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data.









Safety
refugeprotectionsafe
A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data.




Data
statistical datascientific datadatum
A data haven, like a corporate haven or tax haven, is a refuge for uninterrupted or unregulated data.
Law
legallawslegal theory
Data havens are locations with legal environments that are friendly to the concept of a computer network freely holding data and even protecting its content and associated information.









Computer network
networkcomputer networkingnetworking
Data havens are locations with legal environments that are friendly to the concept of a computer network freely holding data and even protecting its content and associated information.







Nation
nationsnationalnationhood
They tend to fit into three categories: a physical locality with weak information-system enforcement and extradition laws, a physical locality with intentionally strong protections of data, and virtual domains designed to secure data via technical means (such as encryption) regardless of any legal environment.
Extradition
extraditedextraditeextradition treaty
They tend to fit into three categories: a physical locality with weak information-system enforcement and extradition laws, a physical locality with intentionally strong protections of data, and virtual domains designed to secure data via technical means (such as encryption) regardless of any legal environment.




Virtual reality
virtualVRvirtual-reality
They tend to fit into three categories: a physical locality with weak information-system enforcement and extradition laws, a physical locality with intentionally strong protections of data, and virtual domains designed to secure data via technical means (such as encryption) regardless of any legal environment.









Encryption
encryptedencryptencrypting
They tend to fit into three categories: a physical locality with weak information-system enforcement and extradition laws, a physical locality with intentionally strong protections of data, and virtual domains designed to secure data via technical means (such as encryption) regardless of any legal environment.

Tor (anonymity network)
TorTor anonymity networkTor network
Tor's onion space (hidden service), HavenCo (centralized), and Freenet (decentralized) are three models of modern-day virtual data havens.





.onion
hidden service.exit.onion address
Tor's onion space (hidden service), HavenCo (centralized), and Freenet (decentralized) are three models of modern-day virtual data havens.

Freenet
Freenet ProjectEffect
Tor's onion space (hidden service), HavenCo (centralized), and Freenet (decentralized) are three models of modern-day virtual data havens.




Freedom of speech
free speechfreedom of expressionfree expression
Reasons for establishing data havens include access to free political speech for users in countries where censorship of the Internet is practiced.









Internet
onlinethe Internetweb
Reasons for establishing data havens include access to free political speech for users in countries where censorship of the Internet is practiced.







Whistleblower
whistleblowingwhistleblowerswhistle-blower



Software
Computer softwareSoftware & Programmingsoftware technology

Digital Millennium Copyright Act
DMCADigital Millennium Copyright Act (DMCA)Digital Millennium Copyright Act of 1998