SplinterCon events operate under the Chatham House Rule—meaning no recordings, no direct attributions, and no cameras. This keeps conversations open and participants safe. But we don’t want key ideas and discussions to be lost. That’s why we put together reports summarising the most important takeaways, case studies, and tools discussed at each event.

These reports are built from presentations, discussions, and community contributions. They reflect the state of research, lived experiences, and resistance strategies against splinternets worldwide.

SplinterCon, 24-25

This report presents key findings from the first year of SplinterCon, outlining the emergence of national splinternets, methodologies for measuring internet fragmentation, and tools developed to resist censorship. It provides an overview of evolving state control over digital spaces and the growing need for open, decentralised solutions.

SplinterCon, Brussels’24

Built from presentations and discussions at SplinterCon Brussels, this report examines real-world implementations of government-controlled internet ecosystems. Through case studies from Iran, Russia, and Cuba, it unpacks censorship tactics, surveillance infrastructure, and the mechanisms behind national intranets. The report also highlights resistance strategies, alternative networking tools, and the lived experience of navigating a splintered internet.

SplinterCon, Montreal’23

The first SplinterCon report provides an analytical overview of network fragmentation, digital sovereignty, and state-imposed internet controls. It brings together technical research, country-specific case studies, and firsthand user experiences to map the landscape of contemporary splinternets. Alongside these narratives, the report outlines emerging solutions for bypassing digital isolation and preserving global connectivity.