Skip to main content

Home/ Groups/ CNDLS Design Seminar
Randall Bass

five minutes to speak | The Tor Blog - 4 views

  •  
    Interesting brief talk about Internet security and the role of proxy technologies, esp under repressive regimes. Though check out the comments too. Clearly there are downsides and social hazards to proxy technologies too.
Shida Zhang

BBC News - Anonymous leaks Bank of America e-mails - 2 views

  • In late 2010, Wikileaks founder Julian Assange said he planned to release documents in early 2011, which could bring down a well known bank.
  • Previously, he had claimed to be in possession of a hard drive containing internal documents from a senior Bank of America official. The Wikileaks release has yet to appear, and it is unclear if those files are the same ones obtained by Anonymous. One of the documents appears to show an employee of Bilboa Insurance asking a colleague to delete certain loan identifying numbers from their computer system.
  • the e-mails form the first part of a series of planned leaks that will prove Bank of America engaged in improper mortgage foreclosure practices.
  • ...2 more annotations...
  • Subsequently, sites mirroring the content have sprung up and the documents have also been released through peer-to-peer networks.
  • Anonymous members have engaged in a campaign of action against websites and companies that assisted the United States government in its attempt to isolate Wikileaks.
Tyler Sax

WikiLeaks - About - 2 views

shared by Tyler Sax on 16 Mar 11 - No Cached
  • Our goal is to bring important news and information to the public. We provide an innovative, secure and anonymous way for sources to leak information to our journalists (our electronic drop box).
    • Jaclyn Udell
       
      Do WikiLeaks have a bias/ulterior motive in leaking this information? How can we be certain that the electronic drop box is anonymous and ensures the safety of those submitting the information?
    • Jaclyn Udell
       
      I heard an interview on NPR one time and the people were talking about how authors should reveal their bias in their publications. Since WikiLeaks keeps submitters anonymous how do they expose the bias in their publications?
    • Tom Zorc
       
      While there is a bias in promoting certain data or info over others... a tool commonly used across many media sources, it seems to me that Wikileaks has been determined to release everything credible that comes across their desks, no matter what. (Correct me if I'm wrong.) Not much bias there. Bias on the side of the submitters though, I don't think that's Wikileak's responsibility to uncover... nor a possibility?
  • One of our most important activities is to publish original source material alongside our news stories so readers and historians alike can see evidence of the truth.
    • Jaclyn Udell
       
      Who in the company WikiLeaks is responsible for the repercussions of the information that is exposed? In America we have the right to express ourselves through words, but how does this impose upon other social norms in places where freedom of speech is limited?
    • Tyler Sax
       
      The question about responsibility is a great one. Obviously Julian Assange is taking a lot of heat right now, but he can't be the only one... wikileaks is an organization of paople all around the globe, most of whom work anonymously. 
    • Tom Zorc
       
      Does the responsibility of the repercussions of the content not lie with its creator? The issue of secrecy is interesting here - their communications obviously would have been very different if they *knew* it would be public information. So is secrecy a necessary part of the institution of government? Would the US political engine be designed differently if Wikileaks were a factor from day one? How might it be affected from here on out?
Tyler Sax

Big Pharma caught spying on the WHO - Wikileaks - 2 views

  • Public health advocates reacted strongly to the leaked documents.
    • Tyler Sax
       
      This might be an interesting topic for more research. How have different groups reacted to the leaked documents?
Edward Maloney

CNDLS Design Seminar - 2 views

  •  
    The web is no longer just an integral part of our lives; the web significantly defines the way we engage with the world. To be a wholly educated leader, a successful and effective member of an organization or business, and or an engaged citizen, it is now vital to understand web technologies beyond the level of a consumer. Instead of seeing the web as something that "happens behind the computer screen," the liberally educated person must understand how the web works and shapes our lives. This means understanding how data travels, what happens to your personal information on the web, how the definition of privacy is changing, how the web serves as a publishing and authoring platform, how media is shared and remixed, and how an online economy is changing the way we learn. In Spring 2011 we will launch a Design Seminar to begin mapping out integrated academic approaches to the Web, modeling the ways that multiple disciplines and perspectives are necessary to really comprehend the technological and cultural landscape.
Tom Zorc

Plaintext over Tor is still plaintext | The Tor Blog - 1 views

  • I write to remind our users, and people in search of privacy enhancing technology, that good software is just one part of the solution.
  • We hear from the Wikileaks folks that the premise behind these news articles is actually false -- they didn't bootstrap Wikileaks by monitoring the Tor network.
chaeyouncho91

American Power: WikiLeaks 'Collateral Murder' is Left's Latest Attempt to Criminalize U... - 1 views

  •  
    A severe criticism of the Wikileaks for releasing a video on collateral murder of iraqi civilians - undermines the very validity of wikileaks and criticizes the editor for attacking the US intelligence. Shows how much government pressure and control wikileaks is under.
Nicholas Adams

Julian Assange tells students that the web is the greatest spying machine ever - 1 views

  •  
    The WikiLeaks founder says he believes the internet is not a technology that favors freedom of speech but rather spying. Assange disagrees with reports that Facebook and Twitter play a role in the unrest in the Middle East. He offers his reasoning why revolts cannot be started via Facebook, Twitter, or other social networking sites: they can all be used to round-up principal participants, so that they may be beaten, interrogated or incarcerated. Perhaps most disturbingly, he blames leaked diplomatic cables for the unrest currently in the Middle-East being that the United States had decided that in a necessary event, they would militarily back the Tunisian military over the political regime and would mobilize against neighboring countries if need be. There were further cables that also led to US disapproval of Mubarak in Egypt.
Adam Rosenfeld

Will the Rise of Wikileaks Competitors Make Whistleblowing Resistant to Censorship? | E... - 1 views

  • When payment providers, service providers and even visualization software services cut off services, Wikileaks struggled to keep their site online, going down for periods of time and reducing the content they carry. But while the availability of Wikileaks content was restricted, the demand from readers and media organizations to access that information stayed strong. Now a new generation of Wikileaks-inspired websites is populating the Internet — decentralizing the concept of whistleblowing and making it harder to shut down speech merely by cutting off services to one site.
  •  
    Short but very interesting article that touches on the phenomenon of multiple other websites similar to wikileaks springing up when wikileaks is attacked. Wikileaks has created a demand for such information and when the website is attacked by payment and service providers, other websites have stepped up to fill the void. Also, lots of interesting links built into this piece.
Shida Zhang

Hacker group releases BofA employee correspondence | Reuters - 1 views

  • Consumer groups have accused major U.S. lenders of foreclosing on many homes without having proper documentation in place.
  • The group's email release also includes correspondence between Anonymous and the former employee, in which the former employee described the bank as a "cult" and said the company is now intent on destroying his career.
  • They saw to that when they showed everyone my picture and labelled me as a terrorist."
Ihsaan Patel

WikiLeaks Worse for SEC Than Bank of America - TheStreet - 1 views

  • "Why hasn't the SEC done something about this?"
    • Ihsaan Patel
       
      Interesting perspective on the potential wikileaks bank of america leak. The author predicts that the leak will hurt the government more than any other organization. Wikileaks seems to have declare war against both the government and corporations, how can it survive attakcs by both?
Hadley Stein

WikiLeaks to release over half a million 9/11 intercepts - 1 views

    • Hadley Stein
       
      Are there circumstances where the Wikileaks are specific enough that the source ultimately comes out? If so, does this dissuade people from potentially revealing information?
  • While we are obligated by to protect our sources, it is clear that the information comes from an organization which has been intercepting and archiving US national telecommunications since prior to 9/11.
Randall Bass

EDITORIAL - The Abuse of Private Manning - Editorial - NYTimes.com - 1 views

  • And every morning he is required to stand outside his cell, naked, until he passes inspection and is given his clothes back.
  • Forced nudity is a classic humiliation technique. During the early years of the Bush administration's war on terror, C.I.A. interrogators regularly stripped prisoners to break down barriers of resistance, increase compliance and extract information.
  • Philip Crowley, a State Department spokesman, committed the classic mistake of a Washington mouthpiece by telling the truth about Private Manning to a small group (including a blogger): that the military's treatment of Private Manning was ''ridiculous and counterproductive and stupid.'' He resigned on Sunday.
  • ...2 more annotations...
  • Far more troubling is why President Obama, who has forcefully denounced prisoner abuse, is condoning this treatment.
    • Randall Bass
       
      shows the abusive techniques of his captors
  •  
    "President Obama, who has forcefully denounced prisoner abuse, is condoning the abusive treatment to Manning. 
Tom Zorc

WikiLeaks and Tor: Moral use of an amoral system? | Invisible Inkling - 1 views

  • Before launching the site, Assange needed to show potential contributors that it was viable. One of the WikiLeaks activists owned a server that was being used as a node for the Tor network. Millions of secret transmissions passed through it. The activist noticed that hackers from China were using the network to gather foreign governments’ information, and began to record this traffic. Only a small fraction has ever been posted on WikiLeaks, but the initial tranche served as the site’s foundation, and Assange was able to say, “We have received over one million documents from thirteen countries.”
    • Tom Zorc
       
      So China's hacking the Tor network to obtain the docs that Assange is going to release anyways...? 
Tyler Sax

Blogs | The Tor Blog - 1 views

    • Hadley Stein
       
      This is kind of confusing. Why is it that this more technological discussion on the internet is uncommon. If it is important that we understand these concepts to understand technology, privacy etc., why isn't it always accessible? Do those you understand these concepts purposely make it inaccessible to those who do not?
  • The question he didn't even know to ask is, "What are safe and secure computing and online practices?"
  • how to think about adversaries online, what is ssl, what it means, what are phishing, viruses, botnets, and state-sponsored malware. By the end of the 4th hour, he understood how tor is different than a simple vpn or proxy server, and when to use tor and when it isn't needed. 3.5h of that discussion was basic operational, computer, and online security and safe practices.
  • ...13 more annotations...
    • Hadley Stein
       
      Is it a problem when even people who you would except (or at least hope) understand how the internet works do not? This really highlights the lack of education surrounding th internet.
  • Look at the infrastructures of google, facebook, yahoo, and microsoft to see the challenges that lie ahead for these tools.
    • Hadley Stein
       
      I had never really thought about the infrastructure, specifically the money, required to develop the internet.
  • who uses and how they use it matters
  • What one should or should not do is policy and law, what one can actually do or not do is technology.
    • Tyler Sax
       
      Good quote
  • 1 billion people are online in some way
  • what a proxy is
  • technology exists to circumvent internet censorship
  • Technology is agnostic, who uses and how they use it matters.
  • Circumvention, anonymity, and privacy tools used in a free world can be a minor annoyance,
  • i.e. wikileaks used wikis, ssl, email, and yes, tor, but in the end, it's an annoyance. We don't have people in the streets rioting trying to overthrow our govt. Wikipedia uses the same technology in wikis, ssl, and email. Everyone loves Wikipedia and considers it a net positive.
  • technology exists to circumvent internet censorship
  • In the 1930s, the feds and police warned of mass chaos if the interstate highway system was built in the US. The ability for criminals to quickly transit between cities was of grave concern.
    • Tyler Sax
       
      I like this analogy about internet security
  •  
    What is the line between moral and immoral? Who determines what is moral or "net positive"?
Edward Maloney

Google Labs Books Ngram Viewer - 1 views

  •  
    Google's Book Viewer being used by the Cultural Genome Project.
Edward Maloney

Scholars Elicit a 'Cultural Genome' From 5.2 Million Google-Digitized Books - 1 views

  •  
    Chronicle of Higher Education Article on the Cultural Genome Project
Shida Zhang

Debian mirrors - 1 views

shared by Shida Zhang on 15 Mar 11 - Cached
    • Shida Zhang
       
      What are the specific reasons that some Debian packages couldn't be distributed in the States? Any specific examples for those packages?
    • Duncan Gillespie
       
      I'm not positive, but I believe that certain packages were not allowed to be distributed in the US because some of the software used in the Debian packages mimicked commercially available software. It may be similiar to how wikipedia got in trouble in its infancy because people would copy articles from encyclopedias like Britannica and make the information available for free. Like wikipedia, Debian is community driven (open-source).
  • Debian is distributed all around the world using mirrors in order to provide users with better access to our archive and to reduce the load on our servers.
  • Prior to Debian 3.1, there was also a Non-US packages archive (debian-non-US/) which included Debian packages that could not be distributed in the United States due to software patents or use of encryption.
Hadley Stein

Twitter data privacy in dispute in WikiLeaks case - Technology & science - Security - m... - 1 views

  • The dispute cuts to the core of the question of whether WikiLeaks allies are part of a criminal conspiracy or a political discussion
  • The U.S. is investigating whether WikiLeaks should be held responsible for leaking classified information, even though it was not the original leaker.
  • "The First Amendment guarantees their right to speak up and freely associate with even unpopular people and cause," attorneys wrote.
  •  
    How exactly would the U.S. government hold WikiLeaks responsible (i.e. Would they identify a person within the organization, the entire organization etc.) Who determines whether WikiLeaks "are part of a criminal conspiracy or a political discussion"?
Nicole Wallace

The Impact of Wikileaks and the Federal Pay Freeze: Today's Q's for O's WH - 11/29/2010... - 1 views

  •   And I wouldn't rule anything out. 
    • Nicole Wallace
       
      It's is interesting here that even with the release of the documents the government is still trying to keep the public in the dark. Gibbs speaks in very general statements.
1 - 20 Next › Last »
Showing 20 items per page