Skip to main content

Home/ CNDLS Design Seminar/ Group items tagged blogs

Rss Feed Group items tagged

Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • technology exists to circumvent internet censorship
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • 1 billion people are online in some way
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
Randall Bass

five minutes to speak | The Tor Blog - 4 views

  •  
    Interesting brief talk about Internet security and the role of proxy technologies, esp under repressive regimes. Though check out the comments too. Clearly there are downsides and social hazards to proxy technologies too.
Tom Zorc

Plaintext over Tor is still plaintext | The Tor Blog - 1 views

  • I write to remind our users, and people in search of privacy enhancing technology, that good software is just one part of the solution.
  • We hear from the Wikileaks folks that the premise behind these news articles is actually false -- they didn't bootstrap Wikileaks by monitoring the Tor network.
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 0 views

  • Reading the New Yorker’s piece on WikiLeaks, it’s hard to decide whether I’m reading about freedom fighters, skilled propagandists, or as is often the case, both.
  • The Tor Project blog responds, pointing out that Tor doesn't magically encrypt text, it simply allows for the anonymous transfer of files. So if you use unsecure connections and send data in plain text, it's just as safe as writing down the information on a piece of paper, folding it into an airplane, and throwing it across the street.
Edward Maloney

Find out what\'s in a word, or five, with the Google Books Ngram Viewer - 0 views

  •  
    From Google's Blog
Nicholas Adams

Julian Assange police investigator a friend of sex assault accuser - 0 views

  •  
    Officer and Miss A met through political party and corresponded over internet months before WikiLeaks chief was accused. The pair corresponded on the internet 16 months before the allegations were made against Assange. Miss A commented on a Facebook update on the police officer's page as recently as 10 February including anti-Assange comments, and is a frequent visitor to the officer's blog. Questions have arisen as to whether Assange may even be expedited to Sweden given this information, and as to why the officer did not declare a conflict of interest if such allegations against Assange are true. Many have cited political motivations in the fight to have Assange incarcerated, raising even more questions.
Hadley Stein

From Facebook to WikiLeaks: Addressing privacy and security | EHR Watch - 0 views

  • One can argue whether the privacy provisions were weakened or not. In the case of the WikiLeaks, Twila Brase, president of the Citizens' Council for Health Freedom, got to the heart of the matter when she said, "What WikiLeaks shows you is how security information is all about the integrity of individuals." The bottom line is that someone in the State Dept. leaked the documents. No iron-clad privacy provision in the world can protect against a person leaking information - whether it's paper based or computerized. Brase went on to say, "Once you get information on any kind of electronic format, it is very easy to take it, to access it, to share it, to download it."
  • The silver lining in the WikiLeaks scandal is that it puts a laser focus on privacy and security issues, which are things we need to keep working on to make it right.
  •  
    An interesting view of WikiLeaks through the perspective of health care and privacy information. Argues that security information relies on integrity of individuals.
Adam Rosenfeld

Will the Rise of Wikileaks Competitors Make Whistleblowing Resistant to Censorship? | E... - 1 views

  • When payment providers, service providers and even visualization software services cut off services, Wikileaks struggled to keep their site online, going down for periods of time and reducing the content they carry. But while the availability of Wikileaks content was restricted, the demand from readers and media organizations to access that information stayed strong. Now a new generation of Wikileaks-inspired websites is populating the Internet — decentralizing the concept of whistleblowing and making it harder to shut down speech merely by cutting off services to one site.
  •  
    Short but very interesting article that touches on the phenomenon of multiple other websites similar to wikileaks springing up when wikileaks is attacked. Wikileaks has created a demand for such information and when the website is attacked by payment and service providers, other websites have stepped up to fill the void. Also, lots of interesting links built into this piece.
Duncan Gillespie

Wikileaks: Saudi King Proposed Micro-Chip Implants for Gitmo Detainees - ABC News - 0 views

  • Saudi Arabia's King Abdullah proposed that the Obama administration implant electronic micro-chips into the bodies of Guantanamo Bay detainees to track their movements when they are released, a leaked State Department cable shows.
  • Brennan responded politely, explaining that "horses don't have good lawyers" and the idea would likely face stiff opposition from civil libertarians in the U.S.
  • A recent Pentagon analysis found that around 20 percent of former Guantanamo detainees have returned to the fight against the U.S. and continues to climb.
Nicole Wallace

The Impact of Wikileaks and the Federal Pay Freeze: Today's Q's for O's WH - 11/29/2010... - 1 views

  •   And I wouldn't rule anything out. 
    • Nicole Wallace
       
      It's is interesting here that even with the release of the documents the government is still trying to keep the public in the dark. Gibbs speaks in very general statements.
1 - 10 of 10
Showing 20 items per page