Skip to main content

Home/ CNDLS Design Seminar/ Contents contributed and discussions participated by Hadley Stein

Contents contributed and discussions participated by Hadley Stein

Hadley Stein

From Facebook to WikiLeaks: Addressing privacy and security | EHR Watch - 0 views

  • One can argue whether the privacy provisions were weakened or not. In the case of the WikiLeaks, Twila Brase, president of the Citizens' Council for Health Freedom, got to the heart of the matter when she said, "What WikiLeaks shows you is how security information is all about the integrity of individuals." The bottom line is that someone in the State Dept. leaked the documents. No iron-clad privacy provision in the world can protect against a person leaking information - whether it's paper based or computerized. Brase went on to say, "Once you get information on any kind of electronic format, it is very easy to take it, to access it, to share it, to download it."
  • The silver lining in the WikiLeaks scandal is that it puts a laser focus on privacy and security issues, which are things we need to keep working on to make it right.
  •  
    An interesting view of WikiLeaks through the perspective of health care and privacy information. Argues that security information relies on integrity of individuals.
Hadley Stein

Twitter data privacy in dispute in WikiLeaks case - Technology & science - Security - m... - 1 views

  • The dispute cuts to the core of the question of whether WikiLeaks allies are part of a criminal conspiracy or a political discussion
  • The U.S. is investigating whether WikiLeaks should be held responsible for leaking classified information, even though it was not the original leaker.
  • "The First Amendment guarantees their right to speak up and freely associate with even unpopular people and cause," attorneys wrote.
  •  
    How exactly would the U.S. government hold WikiLeaks responsible (i.e. Would they identify a person within the organization, the entire organization etc.) Who determines whether WikiLeaks "are part of a criminal conspiracy or a political discussion"?
Hadley Stein

WikiLeaks to release over half a million 9/11 intercepts - 1 views

    • Hadley Stein
       
      Are there circumstances where the Wikileaks are specific enough that the source ultimately comes out? If so, does this dissuade people from potentially revealing information?
  • While we are obligated by to protect our sources, it is clear that the information comes from an organization which has been intercepting and archiving US national telecommunications since prior to 9/11.
Hadley Stein

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...12 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
  • technology exists to circumvent internet censorship
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • 1 billion people are online in some way
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
1 - 4 of 4
Showing 20 items per page