Skip to main content

Home/ Future of the Web/ Group items tagged blogging

Rss Feed Group items tagged

Paul Merrell

Microsoft debuts early test version of Oxite open source blogging engine | Open Source ... - 0 views

  • WordPress has more competition to be. Microsoft’s Codeplex team has developed an open source blogging engine that can support simple blogs and large web sites such as its own MIX Online.
  • “Oxite was developed carefully and painstakingly to be a great blogging platform, or a starting point for your own web site project with CMS needs,” according to Microsoft.com.
  • Oxite offers support for multiple blogs per site.  ”Oxite includes the ability to create and edit an arbitrary set of pages on your site. Want an ‘about’ page? You got it. Need a special page about your dogs, with sub-pages for each of those special animals? Yep, no worries,” Microsoft continues. “The ability to add pages as a child of another page is all built in. The web-based editing and creation interface lets you put whatever HTML you want onto your pages, and the built-in authentication system means that only you will be able to edit them.
  •  
    The ability to create child pages of a parent page is something I haven't seen before in a blogging app. There are a ton of CMS that offer such features, but blogs have been an exception.
Paul Merrell

Mozilla Acquires Pocket | The Mozilla Blog - 0 views

  • e are excited to announce that the Mozilla Corporation has completed the acquisition of Read It Later, Inc. the developers of Pocket. Mozilla is growing, experimenting more, and doubling down on our mission to keep the internet healthy, as a global public resource that’s open and accessible to all. As our first strategic acquisition, Pocket contributes to our strategy by growing our mobile presence and providing people everywhere with powerful tools to discover and access high quality web content, on their terms, independent of platform or content silo. Pocket will join Mozilla’s product portfolio as a new product line alongside the Firefox web browsers with a focus on promoting the discovery and accessibility of high quality web content. (Here’s a link to their blog post on the acquisition).  Pocket’s core team and technology will also accelerate Mozilla’s broader Context Graph initiative.
  • “We believe that the discovery and accessibility of high quality web content is key to keeping the internet healthy by fighting against the rising tide of centralization and walled gardens. Pocket provides people with the tools they need to engage with and share content on their own terms, independent of hardware platform or content silo, for a safer, more empowered and independent online experience.” – Chris Beard, Mozilla CEO Pocket brings to Mozilla a successful human-powered content recommendation system with 10 million unique monthly active users on iOS, Android and the Web, and with more than 3 billion pieces of content saved to date. In working closely with Pocket over the last year around the integration within Firefox, we developed a shared vision and belief in the opportunity to do more together that has led to Pocket joining Mozilla today. “We’ve really enjoyed partnering with Mozilla over the past year. We look forward to working more closely together to support the ongoing growth of Pocket and to create great new products that people love in support of our shared mission.” – Nate Weiner, Pocket CEO As a result of this strategic acquisition, Pocket will become a wholly owned subsidiary of Mozilla Corporation and will become part of the Mozilla open source project.
Gary Edwards

Mozilla Standards Blog » Blog Archive » Fear and Loathing on the Standards Tr... - 0 views

  •  
    everything we do here at Mozilla is, for the most part, a contribution to the Web platform. I blogged previously about the low esteem I reserve for arguments that favor proprietary platforms (which typically pit rapid proprietary innovation against dawdling Web Platform standardization cycles), but even in that upbeat blog post, I acknowledge that the standards process leaves much room for improvement.
Gonzalo San Gil, PhD.

Does Commissioner Oettinger Want to Discard Net Neutrality? | La Quadrature du Net - 0 views

  •  
    "Paris, 18 November 2014 - Günther Oettinger, Digital Commissioner made his first post on his blog in which he clearly introduces garanteeing internet access in rural zones as justification to give in to the demands of the Telcos to consolidate or increase their unwarranted earnings. Although the author has tried to avoid mentioning Net Neutrality, this blog post reveals his intended strategy regarding this principle" [# ! As #essential... ! ... as any of the ‪#‎HumanRights‬ # ! .... randomly picked up.]
  •  
    "Paris, 18 November 2014 - Günther Oettinger, Digital Commissioner made his first post on his blog in which he clearly introduces garanteeing internet access in rural zones as justification to give in to the demands of the Telcos to consolidate or increase their unwarranted earnings. Although the author has tried to avoid mentioning Net Neutrality, this blog post reveals his intended strategy regarding this principle"
Gonzalo San Gil, PhD.

¿Siguen siendo realmente los blogs y bloggers los grandes influyentes que fue... - 0 views

  •  
    [Los blogs no son como eran y sobre todo lo que las empresas buscan en ellos ya no es lo mismo que buscaban antes]
  •  
    [Los blogs no son como eran y sobre todo lo que las empresas buscan en ellos ya no es lo mismo que buscaban antes tags marketingsocial mediabloggerinfluencer]
Paul Merrell

Google to encrypt Cloud Storage data by default | ITworld - 0 views

  • Google said Thursday it will by default encrypt data warehoused in its Cloud Storage service. The server-side encryption is now active for all new data written to Cloud Storage, and older data will be encrypted in the coming months, wrote Dave Barth, a Google product manager, in a blog post.
  • The data and metadata around an object stored in Cloud Storage is encrypted with a unique key using 128-bit Advanced Encryption Standard algorithm, and the "per-object key itself is encrypted with a unique key associated with the object owner," Barth wrote. "These keys are additionally encrypted by one of a regularly rotated set of master keys," he wrote. "Of course, if you prefer to manage your own keys then you can still encrypt data yourself prior to writing it to Cloud Storage."
  • A Google spokeswoman said via email the company does not provide encryption keys to any government and provides user data only in accordance with the law.
  •  
    Google paints a deceptive picture of security in a new default encryption service for customer data stored on Google Cloud Storage. See Google blog article linked from the bookmarked page. ITWorld goes part way in unmasking the deception but could have been far more blunt. The claimed fact that Google does not turn encryption keys over to the NSA, et ilk, is irrelevant if Google still decrypts the customer data upon NSA/FBI demand, which it very apparently does. But the Google blog article doesn't mention that and paints a picture seemingly intended to deceive customers into not encrypting their own data before parking it on Google Cloud Storage, thus aiding the NSA/FBI, et cet., in their surveillance efforts.  Deceptive advertising is a serious legal no-no. Hopefully, Google Cloud Storage users will be perceptive enough not to be misled by Google's advertising. But it's a sign that Google managers may be getting worried about losing customers to companies operating in nations that have far stronger protection for digital privacy than the U.S.
Gonzalo San Gil, PhD.

FBI Warns That WordPress Faces Terrorist Attack Risk - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! " Terrorists Attacks" that threaten The W@rld with... # ! DEFACED BLOGS... Oh My! it's a 'real danger'. # ! :D # ! Please stop seeding fear and mistrust # ! of every@ne towards everybody... # ! ... as stop discrediting every social empowerment, # ! as already did with, for example, with P2P networks... (Seriously: Where Is The Link Between Copyright Infringement And Terrorism/Organized Crime | by Mike Masnick | Fri, Jan 29th 2010 7:39pm https://www.techdirt.com/articles/20100129/0630057974.shtml) ( # ! And The #Press, so prideful to spreading all this #nonsense... # ! :/ )
  •  
    [The Federal Bureau of Investigation issued an alert on April 7 about the potential danger of Islamic State (ISIS) terrorists abusing vulnerabilities in the open-source WordPress blog and content management system software.]
Gonzalo San Gil, PhD.

Edición social de "Todo va a cambiar" » El Blog de Enrique Dans - 0 views

  •  
    [... Hoy publico en la red una iniciativa en la que llevo bastante tiempo trabajando y que me hace especial ilusión: la edición social de mi libro, "Todo va a cambiar". ¿Qué es exactamente una edición social? Básicamente, una idea a la que llevaba bastante tiempo dandole vueltas: quería poner el libro en texto completo en la red, pero no quería limitarme simplemente a eso, sino además, explorar un poco más un formato que pudiese aprovechar las ventajas que la red puede ofrecer frente al papel. Lo que hice fue, por tanto, trabajar sobre el texto del libro pensando en dotarlo de una "dimensión red", intentando añadirle un nivel de profundidad adicional mediante una gran cantidad de enlaces (definiciones de términos en Wikipedia, referencias, entradas de mi propio blog en las que desarrollo más algunos temas, artículos o comentarios en otros sitios, etc.), y también mediante ilustraciones y vídeos que pudieran hacer más amena la lectura, plantear metáforas o evocaciones sobre los temas comentados, o contribuir al sentido o al entendimiento de lo escrito. La verdad es que es un trabajo intenso, pero que tiene mucho sentido para alguien que, como yo, utiliza el formato blog para expresarse de manera habitual: de hecho, recuerdo cómo, durante el proceso de escritura del libro, lamentaba en muchas ocasiones no poder añadir esos enlaces o referencias por no tener sentido en un formato papel. Seguro que no funciona para todos los tipos de libros ni para todas las temáticas, pero en el caso de "Todo va a cambiar", parecía tener mucha lógica. La próxima vez, si todo va bien, trataré de hacerlo durante el proceso inicial de escritura. ...]
Gary Edwards

Reblog - The easiest way to snip and quote from your favorite blogs | Zemanta Ltd. - 0 views

  •  
    The easiest way to snip and quote from your favorite blogs. Try the demo. It's amazing. reblog is similar to Diigo Blog publishing, but without the bookmark feature. The publishing though is great. reblog provides a wysiwyg HTML editor, but the real thrill is the publishing where reblog parses the quote and adds tags, links, graphics, etc. Unfortunately, they don't capture the URL or page title for you. But Diigo could learn alot from this service.
Gonzalo San Gil, PhD.

Advocacy 2.0 Guide: Tools for Digital Advocacy - Global Voices Advocacy - 0 views

  •  
    [The Advocacy 2.0 Guide (Tools for Digital Advocacy) describes some of the best techniques and tools that digital activists - and others who wish to learn from this subject - can use as part of their online advocacy campaigns. While our previous guide (Blog for a Cause!) focused on the effective use of blogs as an advocacy tool, this guide will explore creative uses of other web 2.0 applications. ...]
Paul Merrell

The Internet of Things Will Turn Large-Scale Hacks into Real World Disasters | Motherboard - 0 views

  • Disaster stories involving the Internet of Things are all the rage. They feature cars (both driven and driverless), the power grid, dams, and tunnel ventilation systems. A particularly vivid and realistic one, near-future fiction published last month in New York Magazine, described a cyberattack on New York that involved hacking of cars, the water system, hospitals, elevators, and the power grid. In these stories, thousands of people die. Chaos ensues. While some of these scenarios overhype the mass destruction, the individual risks are all real. And traditional computer and network security isn’t prepared to deal with them.Classic information security is a triad: confidentiality, integrity, and availability. You’ll see it called “CIA,” which admittedly is confusing in the context of national security. But basically, the three things I can do with your data are steal it (confidentiality), modify it (integrity), or prevent you from getting it (availability).
  • So far, internet threats have largely been about confidentiality. These can be expensive; one survey estimated that data breaches cost an average of $3.8 million each. They can be embarrassing, as in the theft of celebrity photos from Apple’s iCloud in 2014 or the Ashley Madison breach in 2015. They can be damaging, as when the government of North Korea stole tens of thousands of internal documents from Sony or when hackers stole data about 83 million customer accounts from JPMorgan Chase, both in 2014. They can even affect national security, as in the case of the Office of Personnel Management data breach by—presumptively—China in 2015. On the Internet of Things, integrity and availability threats are much worse than confidentiality threats. It’s one thing if your smart door lock can be eavesdropped upon to know who is home. It’s another thing entirely if it can be hacked to allow a burglar to open the door—or prevent you from opening your door. A hacker who can deny you control of your car, or take over control, is much more dangerous than one who can eavesdrop on your conversations or track your car’s location. With the advent of the Internet of Things and cyber-physical systems in general, we've given the internet hands and feet: the ability to directly affect the physical world. What used to be attacks against data and information have become attacks against flesh, steel, and concrete. Today’s threats include hackers crashing airplanes by hacking into computer networks, and remotely disabling cars, either when they’re turned off and parked or while they’re speeding down the highway. We’re worried about manipulated counts from electronic voting machines, frozen water pipes through hacked thermostats, and remote murder through hacked medical devices. The possibilities are pretty literally endless. The Internet of Things will allow for attacks we can’t even imagine.
  •  
    Bruce Scneier on the insecurity of the Internet of Things, and possible consequences.
Alexandra IcecreamApps

Icecream Apps Answers Frequently Asked Questions: 2016 - Icecream Tech Digest - 0 views

  •  
    It’s been almost two years since we did such a post on our blog so we decided it’s right about time to answer the most frequently asked questions that we get from our users through our contact form, social media, … Continue reading →
  •  
    It’s been almost two years since we did such a post on our blog so we decided it’s right about time to answer the most frequently asked questions that we get from our users through our contact form, social media, … Continue reading →
Paul Merrell

Senate narrowly rejects new FBI surveillance | TheHill - 0 views

  • The Senate narrowly rejected expanding the FBI's surveillance powers Wednesday in the wake of the worst mass shooting in U.S. history.  Senators voted 58-38 on a procedural hurdle, with 60 votes needed to move forward. Majority Leader Mitch McConnellMitch McConnellOvernight Finance: Wall Street awaits Brexit result | Clinton touts biz support | New threat to Puerto Rico bill? | Dodd, Frank hit back The Trail 2016: Berning embers McConnell quashes Senate effort on guns MORE, who initially voted "yes," switched his vote, which allows him to potentially bring the measure back up. 
  • The Senate GOP proposal—being offered as an amendment to the Commerce, Justice and Science appropriations bill—would allow the FBI to use "national security letters" to obtain people's internet browsing history and other information without a warrant during a terrorism or federal intelligence probe.  It would also permanently extend a Patriot Act provision — currently set to expire in 2019 — meant to monitor "lone wolf" extremists.  Senate Republicans said they would likely be able to get enough votes if McConnell schedules a redo.
  • Asked if he anticipates supporters will be able to get 60 votes, Sen. John CornynJohn CornynSenate to vote on two gun bills Senate Dems rip GOP on immigration ruling Post Orlando, hawks make a power play MORE (R-Texas) separately told reporters "that's certainly my expectation." McConnell urged support for the proposal earlier Wednesday, saying it would give the FBI to "connect the dots" in terrorist investigations.  "We can focus on defeating [the Islamic State in Iraq and Syria] or we can focus on partisan politics. Some of our colleagues many think this is all some game," he said. "I believe this is a serious moment that calls for serious solutions."  But Democrats—and some Republicans—raised concerns that the changes didn't go far enough to ensure Americans' privacy.  Sen. Ron WydenRon WydenPost Orlando, hawks make a power play Democrats seize spotlight with sit-in on guns Democrats stage sit-in on House floor to push for gun vote MORE (D-Ore.) blasted his colleagues for "hypocrisy" after a gunman killed 49 people and injured dozens more during the mass shooting in Orlando, Fla. "Due process ought to apply as it relates to guns, but due process wouldn't apply as it relates to the internet activity of millions of Americans," he said ahead of Wednesday's vote. "Supporters of this amendment...have suggested that Americans need to choose between protecting our security and protecting our constitutional right to privacy." 
  • ...1 more annotation...
  • The American Civil Liberties Union (ACLU) also came out in opposition the Senate GOP proposal on Tuesday, warning it would urge lawmakers to vote against it. 
  •  
    Too close for comfort and coming around the bernd again. 
Gonzalo San Gil, PhD.

Export - Support - WordPress.com (Backup) - 0 views

  •  
    "Export Your Content to Another Blog or Platform It's your content; you can do whatever you like with it. Go to Tools -> Export in your WordPress.com dashboard to download an XML file of your blog's content. This format, which we call WordPress eXtended RSS or WXR, will contain your posts, pages, comments, categories, and tags."
  •  
    "Export Your Content to Another Blog or Platform It's your content; you can do whatever you like with it. Go to Tools -> Export in your WordPress.com dashboard to download an XML file of your blog's content. This format, which we call WordPress eXtended RSS or WXR, will contain your posts, pages, comments, categories, and tags."
Paul Merrell

Popular Security Software Came Under Relentless NSA and GCHQ Attacks - The Intercept - 0 views

  • The National Security Agency and its British counterpart, Government Communications Headquarters, have worked to subvert anti-virus and other security software in order to track users and infiltrate networks, according to documents from NSA whistleblower Edward Snowden. The spy agencies have reverse engineered software products, sometimes under questionable legal authority, and monitored web and email traffic in order to discreetly thwart anti-virus software and obtain intelligence from companies about security software and users of such software. One security software maker repeatedly singled out in the documents is Moscow-based Kaspersky Lab, which has a holding registered in the U.K., claims more than 270,000 corporate clients, and says it protects more than 400 million people with its products. British spies aimed to thwart Kaspersky software in part through a technique known as software reverse engineering, or SRE, according to a top-secret warrant renewal request. The NSA has also studied Kaspersky Lab’s software for weaknesses, obtaining sensitive customer information by monitoring communications between the software and Kaspersky servers, according to a draft top-secret report. The U.S. spy agency also appears to have examined emails inbound to security software companies flagging new viruses and vulnerabilities.
  • The efforts to compromise security software were of particular importance because such software is relied upon to defend against an array of digital threats and is typically more trusted by the operating system than other applications, running with elevated privileges that allow more vectors for surveillance and attack. Spy agencies seem to be engaged in a digital game of cat and mouse with anti-virus software companies; the U.S. and U.K. have aggressively probed for weaknesses in software deployed by the companies, which have themselves exposed sophisticated state-sponsored malware.
  • The requested warrant, provided under Section 5 of the U.K.’s 1994 Intelligence Services Act, must be renewed by a government minister every six months. The document published today is a renewal request for a warrant valid from July 7, 2008 until January 7, 2009. The request seeks authorization for GCHQ activities that “involve modifying commercially available software to enable interception, decryption and other related tasks, or ‘reverse engineering’ software.”
  • ...9 more annotations...
  • The NSA, like GCHQ, has studied Kaspersky Lab’s software for weaknesses. In 2008, an NSA research team discovered that Kaspersky software was transmitting sensitive user information back to the company’s servers, which could easily be intercepted and employed to track users, according to a draft of a top-secret report. The information was embedded in “User-Agent” strings included in the headers of Hypertext Transfer Protocol, or HTTP, requests. Such headers are typically sent at the beginning of a web request to identify the type of software and computer issuing the request.
  • According to the draft report, NSA researchers found that the strings could be used to uniquely identify the computing devices belonging to Kaspersky customers. They determined that “Kaspersky User-Agent strings contain encoded versions of the Kaspersky serial numbers and that part of the User-Agent string can be used as a machine identifier.” They also noted that the “User-Agent” strings may contain “information about services contracted for or configurations.” Such data could be used to passively track a computer to determine if a target is running Kaspersky software and thus potentially susceptible to a particular attack without risking detection.
  • Another way the NSA targets foreign anti-virus companies appears to be to monitor their email traffic for reports of new vulnerabilities and malware. A 2010 presentation on “Project CAMBERDADA” shows the content of an email flagging a malware file, which was sent to various anti-virus companies by François Picard of the Montréal-based consulting and web hosting company NewRoma. The presentation of the email suggests that the NSA is reading such messages to discover new flaws in anti-virus software. Picard, contacted by The Intercept, was unaware his email had fallen into the hands of the NSA. He said that he regularly sends out notification of new viruses and malware to anti-virus companies, and that he likely sent the email in question to at least two dozen such outfits. He also said he never sends such notifications to government agencies. “It is strange the NSA would show an email like mine in a presentation,” he added.
  • The NSA presentation goes on to state that its signals intelligence yields about 10 new “potentially malicious files per day for malware triage.” This is a tiny fraction of the hostile software that is processed. Kaspersky says it detects 325,000 new malicious files every day, and an internal GCHQ document indicates that its own system “collect[s] around 100,000,000 malware events per day.” After obtaining the files, the NSA analysts “[c]heck Kaspersky AV to see if they continue to let any of these virus files through their Anti-Virus product.” The NSA’s Tailored Access Operations unit “can repurpose the malware,” presumably before the anti-virus software has been updated to defend against the threat.
  • The Project CAMBERDADA presentation lists 23 additional AV companies from all over the world under “More Targets!” Those companies include Check Point software, a pioneering maker of corporate firewalls based Israel, whose government is a U.S. ally. Notably omitted are the American anti-virus brands McAfee and Symantec and the British company Sophos.
  • As government spies have sought to evade anti-virus software, the anti-virus firms themselves have exposed malware created by government spies. Among them, Kaspersky appears to be the sharpest thorn in the side of government hackers. In the past few years, the company has proven to be a prolific hunter of state-sponsored malware, playing a role in the discovery and/or analysis of various pieces of malware reportedly linked to government hackers, including the superviruses Flame, which Kaspersky flagged in 2012; Gauss, also detected in 2012; Stuxnet, discovered by another company in 2010; and Regin, revealed by Symantec. In February, the Russian firm announced its biggest find yet: the “Equation Group,” an organization that has deployed espionage tools widely believed to have been created by the NSA and hidden on hard drives from leading brands, according to Kaspersky. In a report, the company called it “the most advanced threat actor we have seen” and “probably one of the most sophisticated cyber attack groups in the world.”
  • Hacks deployed by the Equation Group operated undetected for as long as 14 to 19 years, burrowing into the hard drive firmware of sensitive computer systems around the world, according to Kaspersky. Governments, militaries, technology companies, nuclear research centers, media outlets and financial institutions in 30 countries were among those reportedly infected. Kaspersky estimates that the Equation Group could have implants in tens of thousands of computers, but documents published last year by The Intercept suggest the NSA was scaling up their implant capabilities to potentially infect millions of computers with malware. Kaspersky’s adversarial relationship with Western intelligence services is sometimes framed in more sinister terms; the firm has been accused of working too closely with the Russian intelligence service FSB. That accusation is partly due to the company’s apparent success in uncovering NSA malware, and partly due to the fact that its founder, Eugene Kaspersky, was educated by a KGB-backed school in the 1980s before working for the Russian military.
  • Kaspersky has repeatedly denied the insinuations and accusations. In a recent blog post, responding to a Bloomberg article, he complained that his company was being subjected to “sensationalist … conspiracy theories,” sarcastically noting that “for some reason they forgot our reports” on an array of malware that trace back to Russian developers. He continued, “It’s very hard for a company with Russian roots to become successful in the U.S., European and other markets. Nobody trusts us — by default.”
  • Documents published with this article: Kaspersky User-Agent Strings — NSA Project CAMBERDADA — NSA NDIST — GCHQ’s Developing Cyber Defence Mission GCHQ Application for Renewal of Warrant GPW/1160 Software Reverse Engineering — GCHQ Reverse Engineering — GCHQ Wiki Malware Analysis & Reverse Engineering — ACNO Skill Levels — GCHQ
Gary Edwards

What the Google's Android G1 Launch Means for Web Development | iWeb Blog » - 0 views

  •  
    While every blog and media has been covering native mobile applications, there's one thing: Android's web browser is based on WebKit, the same engine used in the iPhone, Safari 3 (avalaible both on Windows and Mac), the Google Chrome web browser, Adobe AIR, plus other mobile phones such as Nokia's N60 and E series. For me, the Google Phone hails the supremacy of WebKit, and means that Web Developers should from now on add it to their skills. WebKit has many advantages as both a browser engine and, a converged desktop-mobile device- web server application development platform.
Paul Merrell

Could Adobe be open-sourcing Flash? - Computerworld Blogs - 0 views

  • ow, however, with Strobe, its just announced Flash framework, Adobe looks like it may be getting more open-source friendly as well. Strobe, which will show up in the 3rd quarter of 2009, is an open framework for creating SWF (ShockWave Flash) server-side players. With Strobe, content creators and Web developers will be able to easily create sites that host their own video.
  • To make sure that the Flash family beats out the likes of Microsoft's Silverlight and its Linux little-brother Novell's Moonlight, Adobe is also considering open-sourcing its flagship Flash player. As part of the Open Screen Project, Adobe has already opened up much of Flash.
  • To make sure that the Flash family beats out the likes of Microsoft's Silverlight and its Linux little-brother Novell's Moonlight, Adobe is also considering open-sourcing its flagship Flash player. As pa
Ernest Rando

Google Analytics Reports are back concerning the results of using Twitter and blogging ... - 0 views

  •  
    The Google reports of the effects twitter and blogging has had on KS Design, My company
Gonzalo San Gil, PhD.

Anti-Piracy Firm 'Caught' Pirating News Articles | TorrentFreak - 0 views

  •  
    " Ernesto on January 7, 2015 C: 0 Opinion The Canadian based anti-piracy firm Canipre is known for hounding file-sharers with lawsuits and copyright infringement notices. Ironically, however, the company may want to start cleaning up its own house first as a blog affiliated with the company has been frequently "pirating" news articles"
  •  
    " Ernesto on January 7, 2015 C: 0 Opinion The Canadian based anti-piracy firm Canipre is known for hounding file-sharers with lawsuits and copyright infringement notices. Ironically, however, the company may want to start cleaning up its own house first as a blog affiliated with the company has been frequently "pirating" news articles"
  •  
    " Ernesto on January 7, 2015 C: 0 Opinion The Canadian based anti-piracy firm Canipre is known for hounding file-sharers with lawsuits and copyright infringement notices. Ironically, however, the company may want to start cleaning up its own house first as a blog affiliated with the company has been frequently "pirating" news articles"
Gonzalo San Gil, PhD.

No, Department of Justice, 80 Percent of Tor Traffic Is Not Child Porn | WIRED [# ! Via... - 0 views

  • The debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography.
  • he debate over online anonymity, and all the whistleblowers, trolls, anarchists, journalists and political dissidents it enables, is messy enough. It doesn’t need the US government making up bogus statistics about how much that anonymity facilitates child pornography. At the State of the Net conference in Washington on Tuesday, US assistant attorney general Leslie Caldwell discussed what she described as the dangers of encryption and cryptographic anonymity tools like Tor, and how those tools can hamper law enforcement. Her statements are the latest in a growing drumbeat of federal criticism of tech companies and software projects that provide privacy and anonymity at the expense of surveillance. And as an example of the grave risks presented by that privacy, she cited a study she said claimed an overwhelming majority of Tor’s anonymous traffic relates to pedophilia. “Tor obviously was created with good intentions, but it’s a huge problem for law enforcement,” Caldwell said in comments reported by Motherboard and confirmed to me by others who attended the conference. “We understand 80 percent of traffic on the Tor network involves child pornography.” That statistic is horrifying. It’s also baloney.
  • In a series of tweets that followed Caldwell’s statement, a Department of Justice flack said Caldwell was citing a University of Portsmouth study WIRED covered in December. He included a link to our story. But I made clear at the time that the study claimed 80 percent of traffic to Tor hidden services related to child pornography, not 80 percent of all Tor traffic. That is a huge, and important, distinction. The vast majority of Tor’s users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what’s often referred to as the “dark web,” use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software’s creators at the non-profit Tor Project. The University of Portsmouth study dealt exclusively with visits to hidden services. In contrast to Caldwell’s 80 percent claim, the Tor Project’s director Roger Dingledine pointed out last month that the study’s pedophilia findings refer to something closer to a single percent of Tor’s overall traffic.
  • ...1 more annotation...
  • So to whoever at the Department of Justice is preparing these talking points for public consumption: Thanks for citing my story. Next time, please try reading it.
  •  
    [# Via Paul Merrell's Diigo...] "That is a huge, and important, distinction. The vast majority of Tor's users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what's often referred to as the "dark web," use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software's creators at the non-profit Tor Project."
  •  
    [# Via Paul Merrell's Diigo...] "That is a huge, and important, distinction. The vast majority of Tor's users run the free anonymity software while visiting conventional websites, using it to route their traffic through encrypted hops around the globe to avoid censorship and surveillance. But Tor also allows websites to run Tor, something known as a Tor hidden service. This collection of hidden sites, which comprise what's often referred to as the "dark web," use Tor to obscure the physical location of the servers that run them. Visits to those dark web sites account for only 1.5 percent of all Tor traffic, according to the software's creators at the non-profit Tor Project."
1 - 20 of 430 Next › Last »
Showing 20 items per page