Skip to main content

Home/ Indie Nation/ Group items tagged internet

Rss Feed Group items tagged

John Lemke

The Internet Isn't Broken; So Why Is The ITU Trying To 'Fix' It? | Techdirt - 0 views

  • Of course, internet access has already been spreading to the far corners of the planet without any "help" from the ITU. Over two billion people are already online, representing about a third of the planet. And, yes, spreading that access further is a good goal, but the ITU is not the player to do it. The reason that the internet has been so successful and has already spread as far as it has, as fast as it has, is that it hasn't been controlled by a bureaucratic government body in which only other governments could vote. Instead, it was built as an open interoperable system that anyone could help build out. It was built in a bottom up manner, mainly by engineers, not bureaucrats. Changing that now makes very little sense.
  • And that's the thing. The internet works just fine. The only reason to "fix" it, is to "break" it in exactly the way the ITU wants, which is to favor a few players who have done nothing innovative to actually deserve it.
John Lemke

Introducing DNSCrypt (Preview Release) - 0 views

  • DNSCrypt has the potential to be the most impactful advancement in Internet security since SSL, significantly improving every single Internet user's online security and privacy.
  •  
    DNSCrypt has the potential to be the most impactful advancement in Internet security since SSL, significantly improving every single Internet user's online security and privacy.
John Lemke

Brazil looks to protect privacy and net neutrality with internet bill of rights | The V... - 0 views

  • "The internet you want is only possible in an environment of respect for human rights," Rousseff said in a statement on her website, "especially privacy and freedom of expression."
  •  
    ""The internet you want is only possible in an environment of respect for human rights," Rousseff said in a statement on her website, "especially privacy and freedom of expression.""
John Lemke

White House releases trusted Internet ID plan - security, government, Google, Gary Lock... - 0 views

  •  
    The U.S. government will coordinate private-sector efforts to create trusted identification systems for the Internet, with the goal of giving consumers and businesses multiple options for authenticating identity online, according to a plan released by President Barack Obama's administration. The National Institute of Standards and Technology (NIST) will work with private companies to drive development and adoption of trusted ID technologies, White House officials said. The National Strategy for Trusted Identities in Cyberspace (NSTIC), released by the Department of Commerce on Friday, aims to protect the privacy and security of Internet users by encouraging a broad online authentication market in the U.S. "The fact is that the old password and username combination we often use to verify people is no longer good enough," Commerce Secretary Gary Locke said at an NSTIC release event hosted by the U.S. Chamber of Commerce. "It leaves too many consumers, government agencies and businesses vulnerable to ID and data theft."
John Lemke

Yahoo webcam images from millions of users intercepted by GCHQ | World news | theguardi... - 0 views

  • Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing, secret documents reveal.
  • between 2008 and 2010
  • Optic Nerve, the documents provided by NSA whistleblower Edward Snowden show, began as a prototype in 2008 and was still active in 2012, according to an internal GCHQ wiki page accessed that year.The system, eerily reminiscent of the telescreens evoked in George Orwell's 1984, was used for experiments in automated facial recognition, to monitor GCHQ's existing targets, and to discover new targets of interest. Such searches could be used to try to find terror suspects or criminals making use of multiple, anonymous user IDs
  • ...1 more annotation...
  • Optic Nerve was based on collecting information from GCHQ's huge network of internet cable taps, which was then processed and fed into systems provided by the NSA. Webcam information was fed into NSA's XKeyscore search tool, and NSA research was used to build the tool which identified Yahoo's webcam traffic.
John Lemke

Cambodia Wants Mandatory Surveillance Cameras In Internet Cafes | Techdirt - 0 views

  • All telecommunications operators, sales outlets and distributors are obliged to register their business at local authorities. Meanwhile, all locations serving telephone services and Internet shall be equipped with closed circuit television camera and shall store footage data of users for at least 03 months. Telephone service corporation owners along public roads shall record National Identity Cards of any subscriber.
John Lemke

How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputatio... - 0 views

  • “The Art of Deception: Training for Online Covert Operations.”
  • Among the core self-identified purposes of JTRIG are two tactics: (1) to inject all sorts of false material onto the internet in order to destroy the reputation of its targets; and (2) to use social sciences and other techniques to manipulate online discourse and activism to generate outcomes it considers desirable. To see how extremist these programs are, just consider the tactics they boast of using to achieve those ends: “false flag operations” (posting material to the internet and falsely attributing it to someone else), fake victim blog posts (pretending to be a victim of the individual whose reputation they want to destroy), and posting “negative information” on various forums. 
  • Critically, the “targets” for this deceit and reputation-destruction extend far beyond the customary roster of normal spycraft: hostile nations and their leaders, military agencies, and intelligence services. In fact, the discussion of many of these techniques occurs in the context of using them in lieu of “traditional law enforcement” against people suspected (but not charged or convicted) of ordinary crimes or, more broadly still, “hacktivism”, meaning those who use online protest activity for political ends. The title page of one of these documents reflects the agency’s own awareness that it is “pushing the boundaries” by using “cyber offensive” techniques against people who have nothing to do with terrorism or national security threats, and indeed, centrally involves law enforcement agents who investigate ordinary crimes:
    • John Lemke
       
      Wow, how is not changing pictures and creating false victims not identity theft and conspiracy?  
  • ...4 more annotations...
  • it is not difficult to see how dangerous it is to have secret government agencies being able to target any individuals they want – who have never been charged with, let alone convicted of, any crimes – with these sorts of online, deception-based tactics of reputation destruction and disruption.
    • John Lemke
       
      Not only are you now guilty until proven innocent but, if you are guilty enough, we shall create a situation so that you are.
  • Government plans to monitor and influence internet communications, and covertly infiltrate online communities in order to sow dissension and disseminate false information, have long been the source of speculation. Harvard Law Professor Cass Sunstein, a close Obama adviser and the White House’s former head of the Office of Information and Regulatory Affairs, wrote a controversial paper in 2008 proposing that the US government employ teams of covert agents and pseudo-”independent” advocates to “cognitively infiltrate” online groups and websites, as well as other activist groups. Sunstein also proposed sending covert agents into “chat rooms, online social networks, or even real-space groups” which spread what he views as false and damaging “conspiracy theories” about the government. Ironically, the very same Sunstein was recently named by Obama to serve as a member of the NSA review panel created by the White House, one that – while disputing key NSA claims – proceeded to propose many cosmetic reforms to the agency’s powers (most of which were ignored by the President who appointed them).
    • John Lemke
       
      So one of the guys who advocates this and approves of it, gets to be on the NSA review committee?  Isn't that like Ted Kennedy on the Ethics Review Committee or the Warren Commission?
  • Whatever else is true, no government should be able to engage in these tactics: what justification is there for having government agencies target people – who have been charged with no crime – for reputation-destruction, infiltrate online political communities, and develop techniques for manipulating online discourse? But to allow those actions with no public knowledge or accountability is particularly unjustifiable.
John Lemke

Brazil passes an Internet 'Bill of Rights' - San Jose Mercury News - 0 views

  • It also makes Internet service providers not liable for content published by their users and requires them to comply with court orders to remove offensive material.
  • "Our legislation can influence the worldwide debate aimed at finding a way to guarantee real rights in a virtual world,"
John Lemke

FCC chairman revises fast-lane option in net neutrality - 0 views

  • Wheeler's latest revision doesn't entirely ban Internet fast lanes and will leave room for some deals, including public-interest cases like a health care company sending electrocardiography results.But unlike his initial proposal last month, Wheeler is seeking to specifically ban certain types of fast lanes, including prioritization given by ISPs to their subsidiaries that make and stream content, according to an FCC official who wasn't authorized talk about the revisions publicly before the vote. The FCC would retain powers to review any prioritization deals that may pose public harm.
  •  
    "Wheeler's latest revision doesn't entirely ban Internet fast lanes and will leave room for some deals, including public-interest cases like a health care company sending electrocardiography results. But unlike his initial proposal last month, Wheeler is seeking to specifically ban certain types of fast lanes, including prioritization given by ISPs to their subsidiaries that make and stream content, according to an FCC official who wasn't authorized talk about the revisions publicly before the vote. The FCC would retain powers to review any prioritization deals that may pose public harm."
John Lemke

Comcast Declares War on Tor? - Deep Dot Web - 0 views

  • Comcast agents have contacted customers using Tor and instructed them to stop using the browser or risk termination of service. A Comcast agent named Jeremy allegedly called Tor an “illegal service.” The Comcast agent told its customer that such activity is against usage policies.
  • Users who try to use anonymity, or cover themselves up on the internet, are usually doing things that aren’t so-to-speak legal. We have the right to terminate,   fine, or suspend your account at anytime due to you violating the rules. Do you have any other questions? Thank you for contacting Comcast, have a great day.
  • Comcast previously corroborated with the FBI by providing information on alleged Silk Road mastermind Ross Ulbricht’s internet usage. Ulbricht’s legal defense without a warrant. Ulbricht was most certainly never given a warning by Comcast or given time to contact a lawyer before he was arrested in a San Francisco library last October. Comcast already monitors its customers internet usage to prevent them from downloading pirated media in violation of copyright laws. Under the “Six Strikes” plan, Comcast customers who are caught by Comcast pirating copy-written material are emailed by Comcast and told to cease the activity. Comcast will continue monitoring them, and if they violate the “Six Strikes” plan five more times, their internet service will be terminated.
John Lemke

David Byrne and Cory Doctorow Explain Music and the Internet | culture | Torontoist - 0 views

  • Byrne and Doctorow were there to talk about how the internet has affected the music business. While that was certainly a large part of the discussion, the conversation also touched on all the ways technology and music interact, from file sharing to sampling.
  • Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s—Public Enemy’s It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul’s Boutique—would have each cost roughly $12 million to make given today’s rules surrounding sample clearance.
  • “In the world of modern music, there are no songs with more than one or two samples, because no one wants to pay for that,” Doctorow said. “So, there’s a genre of music that, if it exists now, exists entirely outside the law. Anyone making music like Paul’s Boutique can’t make money from it, and is in legal jeopardy for having done it. Clearly that’s not what we want copyright to do.” When the conversation turned to downloads and digital music distribution, both men were surprisingly passionate on the topic of digital rights management, and how it’s fundamentally a bad idea.
  • ...1 more annotation...
  • Doctorow argued that the way humans have historically shared music is totally antithetical to the idea of copyright laws. He pointed out that music predates not only the concept of copyright, but language itself. People have always wanted to share music, and, in an odd way, the sharing of someone else’s music is embedded in the industry’s business model, no matter how badly some may want to remove it.
  •  
    "Doctorow pointed out that two of the best-selling and most critically acclaimed hip-hop records of the 1980s-Public Enemy's It Takes a Nation of Millions to Hold Us Back, and the Beastie Boys Paul's Boutique-would have each cost roughly $12 million to make given today's rules surrounding sample clearance."
John Lemke

Cutting the cord: Brazil's bold plan to combat the NSA | The Verge - 0 views

  • "The real danger [from] the publicity about [NSA surveillance] is that other countries will begin to put very serious encryption – we use the term 'Balkanization' in general – to essentially split the internet and that the internet's going to be much more country specific," Google executive chairman Eric Schmidt said at an event in New York this month. "That would be a very bad thing, it would really break the way the internet works, and I think that's what I worry about."
John Lemke

File-sharer will take RIAA case to Supreme Court | Ars Technica - 0 views

  • Jammie Thomas-Rasset
  • the first US file-sharer to take her RIAA-initiated lawsuit all the way to a trial and a verdict back in 2007. Five years, three trials, and one appeal later, she owes $222,000 to the recording industry for sharing songs on the Kazaa file-sharing network, but she doesn't plan to quit fighting.
  • Thomas-Rasset will follow Joel Tenenbaum, the second US resident to take his file-sharing case that far. Tenenbaum—who reached the Supreme Court first because he had only one jury trial instead of three—tried to convince the justices that they should take his case to stop the music label plan to create, in his lawyer's words, "an urban legend so frightening to children using the Internet, and so frightening for parents and teachers of students using the Internet, that they will somehow reverse the tide of the digital future." The Supremes showed no interest, denying Tenenbaum's petition back in May.
John Lemke

Petition Launched To Get The White House To Open Source Healthcare.gov Code | Techdirt - 0 views

  • Of course, there are a few issues with this. First of all, while things created by government employees is automatically public domain, works created by contractors is not. So while conceptually we can argue that the code should be open sourced, it's not required by law. Second, and more importantly, it's a lot harder to take proprietary code and then release it as open source, than it is to build code from the ground up to be open source (and it's even more difficult to make sure that code is actually useful for anything). Indeed, if the code had been open sourced from the beginning, perhaps they wouldn't make embarrassing mistakes like violating other open source licenses.
  • By this point, open sourcing the code isn't going to fix things, but if more attention is put on the issue of closed vs. open code in government projects, hopefully it means that government officials will recognize that it should be open source from the beginning for the next big government web project.
  • After the disastrous technological launch of the healthcare.gov website, built by political cronies rather than companies who understand the internet, there has been plenty of discussion as to why the code wasn't open sourced. At that link, there's a good discussion from On the Media, with Paul Ford, discussing what a big mistake it was that the government decided not to open source the code and be much more transparent about the process. It discusses the usual attacks on open source and why they almost certainly don't apply to this situation.
1 - 20 of 42 Next › Last »
Showing 20 items per page