Finance Magnates got the opportunity to get the thoughts of Brian Pasfield, CTO at Fringe Finance on the future of Ethereum's move to PoS, DeFi's split into permitted and non-permitted, and shares his vision of where this could lead DeFi in the future.
Q. The transition to PoS is the dawn of the bifurcation of DeFi into 'permitted' and 'non-permitted' DeFi. What are the possible consequences of it?
Authorities have commenced attacks on the DeFi ecosystem by introducing censorship. The core value proposition of DeFi is censorship resistance. So, any implementation of DeFi that enables censorship is not DeFi. Permissioned DeFi = on-chain CeFi, which eliminates all that is valuable about DeFi. Not even composability as a benefit remains, as it poses existential risks for protocols composed with sanctioned/permissionless protocols. And, much of DeFi has centralized components, which, therefore, attack vectors for authorities to coerce censorship.
Q. What are the prospects of DeFi then?
Keep Reading
DeFis only path is to pursue avenues that assure its censorship resistance. This means removing the reliance on a number of things that are variously characteristic of DeFi today, including doxxed teams, centralized pegged stablecoins and any notion of PoS given PoS introduces a greater attack surface for authorities to enact bribery attacks that can compromise the network.
Q: So Why is DeFi so valuable?
Many participants in the DeFi ecosystem do not recognize DeFis core value proposition of censorship resistance. Many view DeFi as just an additional way to deliver financial services and a way to achieve rapid financial gains. But, DeFi is distinct because of its core value proposition. This proposition is valuable to those who have a security mindset - and those who do not want to be stolen from. A security mindset refers to the notion of personal sovereignty and that the aims of authorities and some supra-national organizations are all too often not in the people's interests. A good introduction to understanding this can be found in The Prince by Niccol Machiavelli.
Q. The censorship calls from the authorities will increase. Does this mean that DeFi projects will soon face new difficulties in obtaining licenses? Will they close more often due to censorship?
Any reference to licenses and DeFi in the same sentence indicates a misunderstanding of what makes DeFi useful. The core value proposition of DeFi is censorship resistance. A truly censorship-resistant DeFi protocol can not be regulated, as it is not susceptible to state coercion. Any nominally DeFi protocol that does require a license is an example of on-chain CeFi. Given DeFis core value proposition, by definition, DeFi will not and cannot be regulated by authorities. It is the centralized aspects of current DeFi that are censorable.
Q. Give examples of DeFi projects with centralized aspects. What are their risks?
Examples of DeFi projects with centralized aspects are USD-pegged stablecoins. Ultimately, they rely on meat-space entities that can be and have been coerced by authorities to enact censorship. DeFi will move away from its current love affair with USD-pegged stablecoins because of the attack surface they represent in terms of coercion and censorship by authorities.
Q: Many people strongly hold that PoW is a danger and that a move to PoS is necessary. However is there a risk of PoSs attack vectors being exploited by vested interests?
Yes, there is a significant risk. PoS bribery attacks will be attempted. DeFi on PoS will then be TradFI but on a censored blockchain. For humans to unshackle themselves from coercion and censorship and to move to a state of greater freedom, a security mindset is needed. Proper DeFi, with its core value proposition of censorship resistance, is necessary. There are people in the DeFi ecosystem who understand the core value proposition of censorship resistance, and DeFi will find a way. Look for these people and follow their projects.
Q: The industry uses PoS for several reasons: to lower fees and use less energy, and it is also claimed to increase security. Is this true and are there any security issues caused by the adoption of PoS?
Lets analyze new security issues added by the adoption of PoS. Fees are a function of demand for block space. The market dictates the price. The participants demand the security afforded by the current blockchain and are willing to pay the fees. If participants did not demand it, the price would be lower. And we now have L2s which increase throughput and correspondingly reduce fees.
The remaining reason for Eth PoS is energy usage. PoW and PoS have different properties; hence, there are trade-offs moving from PoW to PoS. Particularly, PoS represents a greater attack surface for censorship via bribery attacks, which, if successful, could be fatal for the network. If more people were aware of this, they would ask, is the energy usage matter really as its been described by untrustworthy supra-nationalists? And if so, is reducing DeFis energy usage at the price of removing DeFis core value proposition of censorship resistance worth it?
The solution to this is (proper) DeFi will find a way to remain uncensorable in the long term. This may or may not be on the Eth blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the worlds first cryptocurrency.In particular, bundles of transaction data, called blocks, are added to the ledger in a chronological fashion, forming a chain. These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called nodes. These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchains ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the worlds first cryptocurrency.In particular, bundles of transaction data, called blocks, are added to the ledger in a chronological fashion, forming a chain. These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called nodes. These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchains ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term - and likely will not be, given the current PoS adherents ideological positions distort their ability to make decisions with the required objectivity.
Q: What's your vision of the future of DeFi?
B: DeFi is just starting. It is so new. Many DeFi projects have not fully embraced Its core value proposition of uncensorability. Were now seeing authorities taking action not only to sensor DeFi, but to confiscate assets and take legal action. There is effectively no reason for censored DeFi to exist. DeFi needs to divest itself of its current vulnerabilities to censorship so that it continues to deliver on its core value proposition.
DeFi is one part of the decentralized economy. It's a part of the future decentralized world. A whole new body of legal precedence would evolve in this decentralized space that completely bypasses the distortions of state-based legislation systems. In the areas where it competes with meat-space legacy institutions, the decentralized world will be more efficient and deliver greater prosperity to communities.
Brian Pasfield is the CTO at Fringe Finance with almost 10 years of expertise in blockchain, cryptocurrency, fintech and DeFi. He has delivered technically-complex projects that have leveraged his engineering background and keen understanding of industry trends and philosophies. Furthermore, Brian has worked with industry blockchain bodies to lobby for legislation and government policy changes.
Finance Magnates got the opportunity to get the thoughts of Brian Pasfield, CTO at Fringe Finance on the future of Ethereum's move to PoS, DeFi's split into permitted and non-permitted, and shares his vision of where this could lead DeFi in the future.
Q. The transition to PoS is the dawn of the bifurcation of DeFi into 'permitted' and 'non-permitted' DeFi. What are the possible consequences of it?
Authorities have commenced attacks on the DeFi ecosystem by introducing censorship. The core value proposition of DeFi is censorship resistance. So, any implementation of DeFi that enables censorship is not DeFi. Permissioned DeFi = on-chain CeFi, which eliminates all that is valuable about DeFi. Not even composability as a benefit remains, as it poses existential risks for protocols composed with sanctioned/permissionless protocols. And, much of DeFi has centralized components, which, therefore, attack vectors for authorities to coerce censorship.
Q. What are the prospects of DeFi then?
Keep Reading
DeFis only path is to pursue avenues that assure its censorship resistance. This means removing the reliance on a number of things that are variously characteristic of DeFi today, including doxxed teams, centralized pegged stablecoins and any notion of PoS given PoS introduces a greater attack surface for authorities to enact bribery attacks that can compromise the network.
Q: So Why is DeFi so valuable?
Many participants in the DeFi ecosystem do not recognize DeFis core value proposition of censorship resistance. Many view DeFi as just an additional way to deliver financial services and a way to achieve rapid financial gains. But, DeFi is distinct because of its core value proposition. This proposition is valuable to those who have a security mindset - and those who do not want to be stolen from. A security mindset refers to the notion of personal sovereignty and that the aims of authorities and some supra-national organizations are all too often not in the people's interests. A good introduction to understanding this can be found in The Prince by Niccol Machiavelli.
Q. The censorship calls from the authorities will increase. Does this mean that DeFi projects will soon face new difficulties in obtaining licenses? Will they close more often due to censorship?
Any reference to licenses and DeFi in the same sentence indicates a misunderstanding of what makes DeFi useful. The core value proposition of DeFi is censorship resistance. A truly censorship-resistant DeFi protocol can not be regulated, as it is not susceptible to state coercion. Any nominally DeFi protocol that does require a license is an example of on-chain CeFi. Given DeFis core value proposition, by definition, DeFi will not and cannot be regulated by authorities. It is the centralized aspects of current DeFi that are censorable.
Q. Give examples of DeFi projects with centralized aspects. What are their risks?
Examples of DeFi projects with centralized aspects are USD-pegged stablecoins. Ultimately, they rely on meat-space entities that can be and have been coerced by authorities to enact censorship. DeFi will move away from its current love affair with USD-pegged stablecoins because of the attack surface they represent in terms of coercion and censorship by authorities.
Q: Many people strongly hold that PoW is a danger and that a move to PoS is necessary. However is there a risk of PoSs attack vectors being exploited by vested interests?
Yes, there is a significant risk. PoS bribery attacks will be attempted. DeFi on PoS will then be TradFI but on a censored blockchain. For humans to unshackle themselves from coercion and censorship and to move to a state of greater freedom, a security mindset is needed. Proper DeFi, with its core value proposition of censorship resistance, is necessary. There are people in the DeFi ecosystem who understand the core value proposition of censorship resistance, and DeFi will find a way. Look for these people and follow their projects.
Q: The industry uses PoS for several reasons: to lower fees and use less energy, and it is also claimed to increase security. Is this true and are there any security issues caused by the adoption of PoS?
Lets analyze new security issues added by the adoption of PoS. Fees are a function of demand for block space. The market dictates the price. The participants demand the security afforded by the current blockchain and are willing to pay the fees. If participants did not demand it, the price would be lower. And we now have L2s which increase throughput and correspondingly reduce fees.
The remaining reason for Eth PoS is energy usage. PoW and PoS have different properties; hence, there are trade-offs moving from PoW to PoS. Particularly, PoS represents a greater attack surface for censorship via bribery attacks, which, if successful, could be fatal for the network. If more people were aware of this, they would ask, is the energy usage matter really as its been described by untrustworthy supra-nationalists? And if so, is reducing DeFis energy usage at the price of removing DeFis core value proposition of censorship resistance worth it?
The solution to this is (proper) DeFi will find a way to remain uncensorable in the long term. This may or may not be on the Eth blockchain Blockchain Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the worlds first cryptocurrency.In particular, bundles of transaction data, called blocks, are added to the ledger in a chronological fashion, forming a chain. These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called nodes. These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchains ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Blockchain comprises a digital network of blocks with a comprehensive ledger of transactions made in a cryptocurrency such as Bitcoin or other altcoins.One of the signature features of blockchain is that it is maintained across more than one computer. The ledger can be public or private (permissioned.) In this sense, blockchain is immune to the manipulation of data making it not only open but verifiable. Because a blockchain is stored across a network of computers, it is very difficult to tamper with. The Evolution of BlockchainBlockchain was originally invented by an individual or group of people under the name of Satoshi Nakamoto in 2008. The purpose of blockchain was originally to serve as the public transaction ledger of Bitcoin, the worlds first cryptocurrency.In particular, bundles of transaction data, called blocks, are added to the ledger in a chronological fashion, forming a chain. These blocks include things like date, time, dollar amount, and (in some cases) the public addresses of the sender and the receiver.The computers responsible for upholding a blockchain network are called nodes. These nodes carry out the duties necessary to confirm the transactions and add them to the ledger. In exchange for their work, the nodes receive rewards in the form of crypto tokens.By storing data via a peer-to-peer network (P2P), blockchain controls for a wide range of risks that are traditionally inherent with data being held centrally.Of note, P2P blockchain networks lack centralized points of vulnerability. Consequently, hackers cannot exploit these networks via normalized means nor does the network possess a central failure point.In order to hack or alter a blockchains ledger, more than half of the nodes must be compromised. Looking ahead, blockchain technology is an area of extensive research across multiple industries, including financial services and payments, among others. Read this Term - and likely will not be, given the current PoS adherents ideological positions distort their ability to make decisions with the required objectivity.
Q: What's your vision of the future of DeFi?
B: DeFi is just starting. It is so new. Many DeFi projects have not fully embraced Its core value proposition of uncensorability. Were now seeing authorities taking action not only to sensor DeFi, but to confiscate assets and take legal action. There is effectively no reason for censored DeFi to exist. DeFi needs to divest itself of its current vulnerabilities to censorship so that it continues to deliver on its core value proposition.
DeFi is one part of the decentralized economy. It's a part of the future decentralized world. A whole new body of legal precedence would evolve in this decentralized space that completely bypasses the distortions of state-based legislation systems. In the areas where it competes with meat-space legacy institutions, the decentralized world will be more efficient and deliver greater prosperity to communities.
Brian Pasfield is the CTO at Fringe Finance with almost 10 years of expertise in blockchain, cryptocurrency, fintech and DeFi. He has delivered technically-complex projects that have leveraged his engineering background and keen understanding of industry trends and philosophies. Furthermore, Brian has worked with industry blockchain bodies to lobby for legislation and government policy changes.
Read more here:
Censorship in DeFi and the Transition to POS: Causes and Consequences - Finance Magnates
- Unnecessary Censorship in Skyrim Dawnguard by Normal Difficulty - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Is Censorship Ever Justified? - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Researchers fight censorship on China's Weibo - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- This Week in Unnecessary Censorship - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Censorship in Politics on the Rise - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Censorship Makes No Sense! - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Government Censorship Requests to Google Exploding - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Google Censorship Report - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Unnecessary Censorship in Video Games - Skyrim Part 5 - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Solar Censorship - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- euronews interview - Farhadi - self-censorship 'real danger' for Iranian filmmakers - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Youtube censorship. Let's make youtube the next Myspace - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Political Correctness SUCKS! Subliminal Censorship - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Iran Internet Censorship - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Unnecessary Censorship in Video Games - Mass Effect 3 Part 2 - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- In China, is censorship the mother of creativity? - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Unnecessary Censorship in Mass Effect 3 by Normal Difficulty - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- AOL censors blogs? - Video [Last Updated On: September 7th, 2012] [Originally Added On: September 7th, 2012]
- Tunisia: Govt Drops Internet Censorship [Last Updated On: September 8th, 2012] [Originally Added On: September 8th, 2012]
- Selectmen fear censorship at Saugus TV [Last Updated On: September 8th, 2012] [Originally Added On: September 8th, 2012]
- Chinese 'blind spot' for Western readers [Last Updated On: September 8th, 2012] [Originally Added On: September 8th, 2012]
- The New Yorker Got Temporarily Banned From Facebook for Posting Cartoon Boobs [Censorship] [Last Updated On: September 11th, 2012] [Originally Added On: September 11th, 2012]
- Back Story: Orwellian-speak [Last Updated On: September 13th, 2012] [Originally Added On: September 13th, 2012]
- EDIT: Facebook Censorship [Last Updated On: September 13th, 2012] [Originally Added On: September 13th, 2012]
- Nothing, however vile, justifies censorship [Last Updated On: September 16th, 2012] [Originally Added On: September 16th, 2012]
- 'US administration has put blame where it belongs' [Last Updated On: September 19th, 2012] [Originally Added On: September 19th, 2012]
- Iran Shuts Down Google, Will Completely Cut Citizens Off the Internet [Censorship] [Last Updated On: September 25th, 2012] [Originally Added On: September 25th, 2012]
- Belarus’s illusion of democracy [Last Updated On: September 25th, 2012] [Originally Added On: September 25th, 2012]
- Censorship In The Americas: Google Brazil Chief Just Released From Custody [Last Updated On: September 28th, 2012] [Originally Added On: September 28th, 2012]
- Global censorship of Internet on the rise [Last Updated On: September 29th, 2012] [Originally Added On: September 29th, 2012]
- Big Brother still watching: Internet censorship is up, report says [Last Updated On: September 30th, 2012] [Originally Added On: September 30th, 2012]
- Big Brother still watching: Internet censorship on the up, report says [Last Updated On: September 30th, 2012] [Originally Added On: September 30th, 2012]
- Internet censorship up, report says [Last Updated On: September 30th, 2012] [Originally Added On: September 30th, 2012]
- Internet Censorship on the Up, Report Says [Last Updated On: September 30th, 2012] [Originally Added On: September 30th, 2012]
- Big Brother still watching: Internet censorship up, report says [Last Updated On: September 30th, 2012] [Originally Added On: September 30th, 2012]
- National banned book week sheds light on censorship [Last Updated On: September 30th, 2012] [Originally Added On: September 30th, 2012]
- Iran unblocks access to Gmail [Last Updated On: October 1st, 2012] [Originally Added On: October 1st, 2012]
- Iran unblocks Gmail, plans local alternatives [Last Updated On: October 1st, 2012] [Originally Added On: October 1st, 2012]
- Kurt Vonnegut, Harper Lee, and Other Literary Greats on Censorship [Last Updated On: October 2nd, 2012] [Originally Added On: October 2nd, 2012]
- Read-out being held to raise awareness for banned book week [Last Updated On: October 2nd, 2012] [Originally Added On: October 2nd, 2012]
- Bike Matadors and Censorship Towels Spring From Ad Firm’s Creative Offshoot [Last Updated On: October 3rd, 2012] [Originally Added On: October 3rd, 2012]
- Letter: White House guilty of censorship by stealth in seeking YouTube removal [Last Updated On: October 3rd, 2012] [Originally Added On: October 3rd, 2012]
- YouTube goes legit in Turkey, bringing more sales and more censorship [Last Updated On: October 3rd, 2012] [Originally Added On: October 3rd, 2012]
- Cantor revisits 1937 degeneracy, censorship [Last Updated On: October 4th, 2012] [Originally Added On: October 4th, 2012]
- Kent Free Library brings attention to censorship with participation in Banned Books Week [Last Updated On: October 4th, 2012] [Originally Added On: October 4th, 2012]
- Media watchdog accuses Iran of intimidating journalists [Last Updated On: October 4th, 2012] [Originally Added On: October 4th, 2012]
- ‘Media censorship is back…’ [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Philippine president defends cybercrime law [Last Updated On: October 5th, 2012] [Originally Added On: October 5th, 2012]
- Iran censors currency rates as rial suffers [Last Updated On: October 10th, 2012] [Originally Added On: October 10th, 2012]
- Censorship Bill pushed aside by Parliament [Last Updated On: October 10th, 2012] [Originally Added On: October 10th, 2012]
- Internet censorship: Let it rot in walled gardens [Last Updated On: October 12th, 2012] [Originally Added On: October 12th, 2012]
- The Surprising Truth About Internet Censorship In The Middle East [Last Updated On: October 13th, 2012] [Originally Added On: October 13th, 2012]
- As 9/11 Pretrial Begins, ACLU Calls Out "Orwellian" Censorship of CIA Torture [Last Updated On: October 16th, 2012] [Originally Added On: October 16th, 2012]
- Theatre censorship set to be a thing of the past [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- China scrambles to censor novelist Mo Yan's Nobel Prize [Last Updated On: October 17th, 2012] [Originally Added On: October 17th, 2012]
- Internet anti-censorship tools are being overwhelmed by demand [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Censorship would hinder the Internet revolution [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Pre-Election Reading: Wen Stephenson on Climate Self-Censorship [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Director takes Chinese censorship, business battles public [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- ‘Censorship would still be around were it not for divorce’ – Owen Bonnici [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Qatari draft media law criticized by rights group [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Avila Fine Arts Lovers "Forbidden Books Part 1 and 2" - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Anonymous - OpBigBrother: Worldwide Protests 12/08/2012 engl - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Journalists Resist: 'Where is the freedom of speech?' - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- G20 invisible plot Censorship International conference Dangerous information - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- 'Qatar media censorship law ill advised' - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Facebook Censorship of Navy Seals - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- NWO`s war against the press continues as Greek journalists go on strike, alleging state censorship - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Yung Glynn [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Social Media Censorship - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- The Royal Guardsmen - Snoopy's Christmas (Rare Australian Radio Edit) - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Introduction video about my Asperger's Syndrome - Video [Last Updated On: October 31st, 2012] [Originally Added On: October 31st, 2012]
- Forget SOPA, Russia Activates Web Censorship Blacklist Law [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]
- Censorship fears loom as Russian law allowing 'Internet blacklisting' takes effect [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]
- Exhibit Looks At Comic Book Censorship [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]
- Their View: China censorship shows leaders still have much to hide [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]
- Let's Play Lucius - Part 7 - Satanic Rituals and Shocking Baths - Video [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]
- Mike Malloy on censorship of US history in schools (10/26/12) - Video [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]
- Btooom! - Episode 5 Review - Video [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]
- PSA OUTAKE 2 - Video [Last Updated On: November 2nd, 2012] [Originally Added On: November 2nd, 2012]