Bookmark
FBI accused of planting backdoor in OpenBSD IPSEC stack
arstechnica.com/open-source/news/2010/12/fbi-accused-of-planting-backdoor-in-openbsd-ipsec-stack.ars, posted 2010 by peter in bsd fascism free privacy security toread usa
In an e-mail sent to BSD project leader Theo de Raadt, former NETSEC CTO Gregory Perry has claimed that NETSEC developers helped the FBI plant "a number of backdoors" in the OpenBSD cryptographic framework approximately a decade ago.
Perry says that his nondisclosure agreement with the FBI has expired, allowing him to finally bring the issue to the attention of OpenBSD developers. Perry also suggests that knowledge of the FBI's backdoors played a role in DARPA's decision to withdraw millions of dollars of grant funding from OpenBSD in 2003.
...
The e-mail became public when de Raadt forwarded it to the OpenBSD mailing list on Tuesday, with the intention of encouraging concerned parties to conduct code audits. To avoid entanglement in the alleged conspiracy, de Raadt says that he won't be pursuing the matter himself. Several developers have begun the process of auditing the OpenBSD IPSEC stack in order to determine if Perry's claims are true.
Bookmark
FBI pressuring Google, Facebook to allow ‘back doors’ for wiretapping | Raw Story
www.rawstory.com/rs/2010/11/fbi-pressuring-google-facebook-wiretapping/, posted 2010 by peter in communication fascism networking politics privacy security usa
FBI Director Robert Mueller traveled to Silicon Valley this week to convince major Internet players to build "back doors" into their software that will allow law enforcement to wiretap data on their networks, says a news report.
It's part of an effort to expand the FBI's wiretapping powers to include the latest communications technologies, including social networking sites, voice-over-Internet (VoIP) telephone services and BlackBerries.
But privacy and civil rights advocates are raising the alarm about the proposal, saying that the proposed wiretapping tools could just as easily be used by hackers to steal personal information, or by oppressive governments to track political dissidents.
Bookmark
Generation Why? by Zadie Smith | The New York Review of Books
www.nybooks.com/articles/archives/2010/nov/25/generation-why/, posted 2010 by peter in advertising cinema essay media people privacy review social
Shouldn’t we struggle against Facebook? Everything in it is reduced to the size of its founder. Blue, because it turns out Zuckerberg is red-green color-blind. “Blue is the richest color for me—I can see all of blue.” Poking, because that’s what shy boys do to girls they are scared to talk to. Preoccupied with personal trivia, because Mark Zuckerberg thinks the exchange of personal trivia is what “friendship” is.
...
I can’t imagine life without files but I can just about imagine a time when Facebook will seem as comically obsolete as LiveJournal. In this sense, _The Social Network_ is not a cruel portrait of any particular real-world person called “Mark Zuckerberg.” It’s a cruel portrait of us: 500 million sentient people entrapped in the recent careless thoughts of a Harvard sophomore.
Bookmark
EU proposes online right 'to be forgotten' - Telegraph
www.telegraph.co.uk/technology/internet/8112702/EU-proposes-online-right-to-be-forgotten.html, posted 2010 by peter in eu google politics privacy toread
Users could sue websites for invading their privacy and would have a right to be “forgotten” online, under new proposals from the European Union. It has drafted potential legislation that would include new, unprecedented privacy rights for citizens sharing personal data.
Aimed in particular at the users of social networks such as Facebook and major sites such as Google,
the move marks another step in the ongoing battle between information commissioners and major websites. Google in particular has been criticised recently by privacy groups around the world for collecting Wi-Fi data while it was mapping roads for its Street View service.
Bookmark
Judging the cyber war terrorist threat : The New Yorker
www.newyorker.com/reporting/2010/11/01/101101fa_fact_hersh?currentPage=all, posted 2010 by peter in china essay politics privacy security toread usa war
A great deal of money is at stake. Cyber security is a major growth industry, and warnings from Clarke, McConnell, and others have helped to create what has become a military-cyber complex.
...
American intelligence and security officials for the most part agree that the Chinese military, or, for that matter, an independent hacker, is theoretically capable of creating a degree of chaos inside America. But I was told by military, technical, and intelligence experts that these fears have been exaggerated, and are based on a fundamental confusion between cyber espionage and cyber war. Cyber espionage is the science of covertly capturing e-mail traffic, text messages, other electronic communications, and corporate data for the purpose of gathering national-security or commercial intelligence. Cyber war involves the penetration of foreign networks for the purpose of disrupting or dismantling those networks, and making them inoperable.
Bookmark
Pirate Bay Appeal Day 5: Screenshots Prove Nothing | TorrentFreak
torrentfreak.com/pirate-bay-appeal-day-5-screenshots-prove-nothing-101005/, posted 2010 by peter in copyright dinosaurism p2p politics privacy propaganda sweden
Furthermore, it quickly became apparent that [IFPI lawyer Magnus Mårtensson's] evidence consisted only of screenshots. When asked if he had any network equipment logging exactly what was going on ‘behind the scenes’ of any of his sample downloads, he replied that he didn’t.
When asked if he verified in any way during the download process that he had any contact with The Pirate Bay’s tracker, again the answer was negative.
Defendant Gottfrid Svartholm questioned Mårtensson on his evidence gathering techniques. The following questions are particularly interesting as they show that the prosecution has no evidence that the Pirate Bay trackers were actually used.
Bookmark
Only 1.7% of sites blocked by Scandinavia's "child-porn" filters are actually child porn
www.boingboing.net/2010/09/30/only-17-of-sites-blo.html, posted 2010 by peter in fascism networking politics privacy propaganda security sweden
Germany's working group against censorship, AK Zensur, has analysed a few recent Scandinavian blacklists, allegedly meant to block sites containing child abuse material. Our less-than-surprising findings:
* From 167 listed sites, only 3 contained such material. * Two of them were listed on different blacklists since 2008, obviously without the authorities trying to take the sites offline. * All three were taken down by the hosting providers within hours or even minutes after receiving an AK takedown request by email.
So what were the reasons again that made access blocking an essential weapon in fighting child abuse?
Bookmark
Web Photo Geotags Can Reveal More Than You Wish - NYTimes.com
www.nytimes.com/2010/08/12/technology/personaltech/12basics.html?_r=4, posted 2010 by peter in photography positioning privacy
Security experts and privacy advocates have recently begun warning about the potential dangers of geotags, which are embedded in photos and videos taken with GPS-equipped smartphones and digital cameras. Because the location data is not visible to the casual viewer, the concern is that many people may not realize it is there; and they could be compromising their privacy, if not their safety, when they post geotagged media online.
Bookmark
Schneier on Security: A Revised Taxonomy of Social Networking Data
www.schneier.com/blog/archives/2010/08/a_taxonomy_of_s_1.html, posted 2010 by peter in privacy security social toread
Lately I've been reading about user security and privacy -- control, really -- on social networking sites. The issues are hard and the solutions harder, but I'm seeing a lot of confusion in even forming the questions. Social networking sites deal with several different types of user data, and it's essential to separate them.
Below is my taxonomy of social networking data, which I first presented at the Internet Governance Forum meeting last November, and again -- revised -- at an OECD workshop on the role of Internet intermediaries in June.
Bookmark
A hidden world, growing beyond control | washingtonpost.com
projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyond-control/, posted 2010 by peter in privacy security toread usa
The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.
|< First < Previous 64–73 (151) Next > Last >|