Categories
Quotations

2013.12.24

Once we decide it’s OK to let a mob loose on anyone who’s offended us, the only people who are safe are those who never say anything at all.

Michelle Goldberg, Sympathy for Justine Sacco – The Nation (via chartier)

Mobs don’t lead to justice. They to politics of shame, dismissal of the rule of law, and (more often than not) a willingness to ‘ban’ actions, associations, and speech that is disliked if not illegal. Those rights have to be protected, regardless of how repugnantly they are used, so that democratic societies can operate as thriving environments of human dignity and freedom instead of nations where normalcy quiets the human spirit.

Categories
Quotations

2013.12.24

Particularly relevant for Snowden’s whistleblower status is his efforts to reveal misconduct within official NSA channels. According to the interview, Snowden aired his misgivings as early as October 2012 with as many as 17 co-workers and superiors, challenging them with the sheer volume of domestic data being collected by the BOUNDLESSINFORMANT program. The challenges went nowhere. Six months later, he began contacting reporters. Contacted for comment, an NSA spokesman told the Post there was no record of the conversations.

Russell Brandom, “NSA leaker Edward Snowden: ‘I already won’

The irony that the NSA lacks a record of those conversations is incredibly rich.

Categories
Quotations

2013.12.19

…according to a former NSA employee, by 1995 the agency had installed sniffer software to collect various kinds of traffic at nine major Internet exchange points (IXPs). Terry Thompson, the NSA deputy director, also acknowledged in 2001 that the agency has taken to hiring technicians away from the private companies that run much of the World Wide Web, such as Cisco systems, and employing them to reverse engineer various communications technologies in order to locate vulnerabilities that the agency can exploit. This poached taken much be invaluable in sorting through the packetized and multiplexed flows of digital data.

Patrick Radden Keefe, Chatter: Dispatches from the Secret World of Global Eavesdropping
Categories
Quotations

2013.12.17

Some have suggested that the [Nova Scotia cyberbullying] law has to be so broad to capture all the harmful conduct and we should leave it to the courts and the cybercops to use their judgement in how it is applied. I’m sorry, but as soon as an employee of the government of Nova Scotia picks up the phone and tells a citizen to remove Charter protected speech from the internet, that crosses the line. That goes waaaaay over the line. Canadians have an absolute right to speak truth to power. Canadians have an obligation to call out politicians on hypocrisy and idiocy. An elected official like Lenore Zann, before publicly admonishing a minor, should educate herself about “copyrwite (sic) law”, fair dealing and the criminal code. (A bit of free advice: Bill C-12 isn’t the law yet and an image taken on a sound stage surrounded by a filming crew for the purpose of international broadcast on cable television likely does not qualify as an intimate image “in respect of which, at the time of the recording, there were circumstances that gave rise to a reasonable expectation of privacy”.)

David Fraser, “Nova Scotia politician alleges cyberbullying, calls the authorities on tweeting teen
Categories
Aside Links

How the Bitcoin protocol actually works

If you’re interested in Bitcoin then this is an absolutely wonderful article. The author has done an exceptional job in explaining how Bitcoin operates by walking you through the steps – and problems – of building a contemporary cryptocurrency. It’s not a short read, but it’s well worth the time.

Categories
Links

Meet Jack. Or, What The Government Could Do With All That Location Data

Meet Jack. Or, What The Government Could Do With All That Location Data

Categories
Quotations

2013.12.11

That is what the Snowden leaks have exposed — a massive government operation to archive and analyze all the world’s communications. Opposing the surveillance state, and demanding the right as free citizens to know what our government is doing, is not a left- or a right-wing issue; it is one of tyranny versus liberty; it’s about whether we want to live in a communist-style surveillance state, or enjoy the rights and privileges of a free society.

Jesse Kline, “The spy who read my email
Categories
Quotations

2013.12.10

The factions · Suspicion aside, and bearing in mind that in the IETF people are supposed to speak for themselves not on behalf of organizations, and also that opinions are highly fragmented, there are some roughly-identifiable opinion clusters, not organized or anything; but describing them may help people understand what’s going on.

The Privacy Partisans are aggressive about doing whatever’s possible by way of counter-attack, and doing it now. This notably includes engineers from Firefox and Chrome, who say that for HTTP/2.0, they’re just gonna run authenticated and encrypted all the time, whatever anyone says.

The Cynics are unconvinced about the usefulness of the counterattack measures on the table. They think that the technology isn’t good enough, or the secret-key infrastructure is corrupt, or that Google and Facebook and so on should be seen as attackers, or developers are just too lazy and incompetent to get the deployment right.

The Enterpriseys are people who think that surveillance is necessary because there are situations where law or policy require it. Examples include prisons, businesses that want to control their employees’ Net access, and devops folks who want to monitor for malware or do load-balancing.

The Unconvinced just don’t see the need for aggressive privacy protection; they think it’s foolish to apply it to public static brochure-ware, or that it’s unethical to impose encryption on people without asking them, or that it’s insane to try to encrypt the Internet of Things: Printers and toasters and so on.

Tim Bray, “Counter-Surveillance”

Tim does a good job in breaking down the ‘factions’ associated with the IETF and how/whether the organization will be technically addressing the NSA spying revelations. It’s hard to understate how important the IETF’s current involvement is in light of their decision – between 1999-2001 – to largely turn a blind eye to interception equipment and the spying of citizens’ communications.

Categories
Aside Links

The Oddities of CBC’s Snowden Redactions | Technology, Thoughts & Trinkets

The CBC redacted the Snowden documents concerning NSA surveillance during the G8/G20. While I can agree that some of the redactions were appropriate the majority that were made seem excessive.

Categories
Videos

IETF 88 Technical Plenary: Hardening The Internet