Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged Know

Rss Feed Group items tagged

Nicholas Adams

Iraq war logs: secret files show how US ignored torture - 0 views

  •  
    This article brings up a good question regarding whether the United States military has been honest in their reports of "enemy" casualties. Another important question is posed at the end of the article with a pentagon statement: "Condemning this fresh leak, however, the Pentagon said: "This security breach could very well get our troops and those they are fighting with killed. Our enemies will mine this information looking for insights into how we operate, cultivate sources and react in combat situations, even the capability of our equipment." Where do we draw the line between the citizens' right to know and the safety of government operations? Is it acceptable to allow secrecy to protect citizens or do the citizens have a right to know all that the government does? These are interesting questions given that the government is to be responsible to the citizenry, however, what if included in that responsibility is keeping certain information classified?
Tyler Sax

How Nuclear Reactors Work, And How They Fail | Popular Science - 0 views

  •  
    This article is completely irrelevant to what we're talking about...Yet at the same time, I find something relevant about it. It's an article written by Pop Sci about the basics of how nuclear reactors work, in light of the current situation in Japan. The key line (in the subtitle) is: "Here's what you need to know to understand the news, as it happens" As soon as I read this I, of course, though of our approach to the seminar. Not everyone can be an expert in web technologies (or in nuclear engineering) but there is definite value in understanding the web (or nuclear reactors) at a deeper level than the average news-reader/consumer/global citizen. This article is proof of that.   
  •  
    I completely agree!
Nicholas Adams

The shameful abuse of Bradley Manning - 0 views

  •  
    The WikiLeaks suspect's mistreatment amounts to torture. Either President Obama knows this or he should make it his business. The president refused to comment on PJ Crowley's (State department Spokesperson) statement that the treatment of Manning is "ridiculous, counterproductive and stupid". Prolonged isolation, sleep deprivation, nudity - the punishments currently being levied upon Manning - come right out of the manual of the CIA for "enhanced interrogation". Such practices are applied in Guantánamo and Abu Ghraib. It's what the CIA calls "no-touch torture", and its purpose is to demoralise someone to the point of offering a desired confession regardless of whether it is true or false.
Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • technology exists to circumvent internet censorship
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • 1 billion people are online in some way
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
1 - 4 of 4
Showing 20 items per page