Categories
Aside Quotations

2014.1.3

jakke said: This seems like he’s hoping referees will be sufficiently unfamiliar with the subject matter, no?

It’s a published piece; it landed in International Data Protection Law. And the people he acknowledges in the published piece are some of the experts who were – at the time, pre-Snowden – calling Swire’s article out for BS. I was at an event where his paper was critiqued as largely devoid of real, empirical, details which if included would have undermined many of the premises of the paper. But the paper was published (largely unchanged) regardless.

But peer-review…still not broken, am I right?

Categories
Aside Quotations

2014.1.3

To players of WoW (such as my sons), WOW is a fun game. They often wear headsets to talk with teammates while playing, and keep a chat window scrolling as well. To law enforcement, WoW (or any other similar game) can seem instead to be a global terrorist communications network. Players can talk and send chat messages, internationally, outside of the traditional telephone network and outside of the scope of CALEA. The architecture is based on what works for the game, and not what facilitates lawful access.

Peter Swire, “From real-time intercepts to stored records: why encryption drives the government to seek access to the cloud

Of course, this statement is largely bunk given that the large companies (like Blizzard, the producers of World of Warcraft) tend to have lawful access guides. And Blizzard’s, in particular, is incredibly detailed (and humorous) and been around since at least 2009. It’s statements like the one quoted, above, that make Swire’s entire paper dubious: given the empirical deficiency of his paper (especially in light of Snowden) he should be required to either write an update to the paper and identity everything that was false in it, or just recant the old paper in its majority.

Categories
Aside Humour

Laptop Stickers

The new laptop stickers have arrived. (Explanation of logo)

Categories
Aside Links

How the Bitcoin protocol actually works

If you’re interested in Bitcoin then this is an absolutely wonderful article. The author has done an exceptional job in explaining how Bitcoin operates by walking you through the steps – and problems – of building a contemporary cryptocurrency. It’s not a short read, but it’s well worth the time.

Categories
Aside Links

The Oddities of CBC’s Snowden Redactions | Technology, Thoughts & Trinkets

The CBC redacted the Snowden documents concerning NSA surveillance during the G8/G20. While I can agree that some of the redactions were appropriate the majority that were made seem excessive.

Categories
Aside Humour

Facebook’s Next Acquisition

emptyage:

Facebook will give you five billion dollars for that flute

(via Daily Cartoon: Tuesday, November 19th : The New Yorker)

A nice comment on the business of purchasing services to acquire younger and younger users.

Categories
Aside Humour

Nothing to See Here!

David Parkins, The Globe and Mail

Categories
Aside

e-Commerce Platform Fees

A sad part of my life is currently being spent comparing e-commerce platforms that have fair fees for processing digital downloads. It’s becoming apparent that, despite being a problem needing solving for more than a decade, solutions remain mediocre on average 😦

Categories
Aside

Dissertation Submitted

Finished at last.

Categories
Aside Humour

CSEC Surveillance Post 990

Oh hai Internetz.