Wastholm.com

In an e-mail sent to BSD project leader Theo de Raadt, former NETSEC CTO Gregory Perry has claimed that NETSEC developers helped the FBI plant "a number of backdoors" in the OpenBSD cryptographic framework approximately a decade ago.

Perry says that his nondisclosure agreement with the FBI has expired, allowing him to finally bring the issue to the attention of OpenBSD developers. Perry also suggests that knowledge of the FBI's backdoors played a role in DARPA's decision to withdraw millions of dollars of grant funding from OpenBSD in 2003.

...

The e-mail became public when de Raadt forwarded it to the OpenBSD mailing list on Tuesday, with the intention of encouraging concerned parties to conduct code audits. To avoid entanglement in the alleged conspiracy, de Raadt says that he won't be pursuing the matter himself. Several developers have begun the process of auditing the OpenBSD IPSEC stack in order to determine if Perry's claims are true.

FBI Director Robert Mueller traveled to Silicon Valley this week to convince major Internet players to build "back doors" into their software that will allow law enforcement to wiretap data on their networks, says a news report.

It's part of an effort to expand the FBI's wiretapping powers to include the latest communications technologies, including social networking sites, voice-over-Internet (VoIP) telephone services and BlackBerries.

But privacy and civil rights advocates are raising the alarm about the proposal, saying that the proposed wiretapping tools could just as easily be used by hackers to steal personal information, or by oppressive governments to track political dissidents.

Shouldn’t we struggle against Facebook? Everything in it is reduced to the size of its founder. Blue, because it turns out Zuckerberg is red-green color-blind. “Blue is the richest color for me—I can see all of blue.” Poking, because that’s what shy boys do to girls they are scared to talk to. Preoccupied with personal trivia, because Mark Zuckerberg thinks the exchange of personal trivia is what “friendship” is.

...

I can’t imagine life without files but I can just about imagine a time when Facebook will seem as comically obsolete as LiveJournal. In this sense, _The Social Network_ is not a cruel portrait of any particular real-world person called “Mark Zuckerberg.” It’s a cruel portrait of us: 500 million sentient people entrapped in the recent careless thoughts of a Harvard sophomore.

Users could sue websites for invading their privacy and would have a right to be “forgotten” online, under new proposals from the European Union. It has drafted potential legislation that would include new, unprecedented privacy rights for citizens sharing personal data.

Aimed in particular at the users of social networks such as Facebook and major sites such as Google,

the move marks another step in the ongoing battle between information commissioners and major websites. Google in particular has been criticised recently by privacy groups around the world for collecting Wi-Fi data while it was mapping roads for its Street View service.

A great deal of money is at stake. Cyber security is a major growth industry, and warnings from Clarke, McConnell, and others have helped to create what has become a military-cyber complex.

...

American intelligence and security officials for the most part agree that the Chinese military, or, for that matter, an independent hacker, is theoretically capable of creating a degree of chaos inside America. But I was told by military, technical, and intelligence experts that these fears have been exaggerated, and are based on a fundamental confusion between cyber espionage and cyber war. Cyber espionage is the science of covertly capturing e-mail traffic, text messages, other electronic communications, and corporate data for the purpose of gathering national-security or commercial intelligence. Cyber war involves the penetration of foreign networks for the purpose of disrupting or dismantling those networks, and making them inoperable.

Furthermore, it quickly became apparent that [IFPI lawyer Magnus Mårtensson's] evidence consisted only of screenshots. When asked if he had any network equipment logging exactly what was going on ‘behind the scenes’ of any of his sample downloads, he replied that he didn’t.

When asked if he verified in any way during the download process that he had any contact with The Pirate Bay’s tracker, again the answer was negative.

Defendant Gottfrid Svartholm questioned Mårtensson on his evidence gathering techniques. The following questions are particularly interesting as they show that the prosecution has no evidence that the Pirate Bay trackers were actually used.

Germany's working group against censorship, AK Zensur, has analysed a few recent Scandinavian blacklists, allegedly meant to block sites containing child abuse material. Our less-than-surprising findings:

* From 167 listed sites, only 3 contained such material. * Two of them were listed on different blacklists since 2008, obviously without the authorities trying to take the sites offline. * All three were taken down by the hosting providers within hours or even minutes after receiving an AK takedown request by email.

So what were the reasons again that made access blocking an essential weapon in fighting child abuse?

Security experts and privacy advocates have recently begun warning about the potential dangers of geotags, which are embedded in photos and videos taken with GPS-equipped smartphones and digital cameras. Because the location data is not visible to the casual viewer, the concern is that many people may not realize it is there; and they could be compromising their privacy, if not their safety, when they post geotagged media online.

Lately I've been reading about user security and privacy -- control, really -- on social networking sites. The issues are hard and the solutions harder, but I'm seeing a lot of confusion in even forming the questions. Social networking sites deal with several different types of user data, and it's essential to separate them.

Below is my taxonomy of social networking data, which I first presented at the Internet Governance Forum meeting last November, and again -- revised -- at an OECD workshop on the role of Internet intermediaries in June.

The top-secret world the government created in response to the terrorist attacks of Sept. 11, 2001, has become so large, so unwieldy and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it or exactly how many agencies do the same work.

|< First   < Previous   64–73 (151)   Next >   Last >|