Quotulatiousness

October 13, 2013

Stross – Microsoft Word delenda est

Filed under: Media, Technology — Tags: , , — Nicholas @ 10:32

As a writer, Charles Stross hates, hates, hates, hates, hates Microsoft Word and wants it to DIE:

Microsoft Word is a tyrant of the imagination, a petty, unimaginative, inconsistent dictator that is ill-suited to any creative writer’s use. Worse: it is a near-monopolist, dominating the word processing field. Its pervasive near-monopoly status has brainwashed software developers to such an extent that few can imagine a word processing tool that exists as anything other than as a shallow imitation of the Redmond Behemoth. But what exactly is wrong with it?

I’ve been using word processors and text editors for nearly 30 years. There was an era before Microsoft Word’s dominance when a variety of radically different paradigms for text preparation and formatting competed in an open marketplace of ideas. One early and particularly effective combination was the idea of a text file, containing embedded commands or macros, that could be edited with a programmer’s text editor (such as ed or teco or, later, vi or emacs) and subsequently fed to a variety of tools: offline spelling checkers, grammar checkers, and formatters like scribe, troff, and latex that produced a binary page image that could be downloaded to a printer.

These tools were fast, powerful, elegant, and extremely demanding of the user. As the first 8-bit personal computers appeared (largely consisting of the Apple II and the rival CP/M ecosystem), programmers tried to develop a hybrid tool called a word processor: a screen-oriented editor that hid the complex and hostile printer control commands from the author, replacing them with visible highlight characters on screen and revealing them only when the user told the program to “reveal codes”. Programs like WordStar led the way, until WordPerfect took the market in the early 1980s by adding the ability to edit two or more files at the same time in a split screen view.

October 11, 2013

Creating an “air gap” for computer security

Filed under: Liberty, Technology — Tags: , , , , — Nicholas @ 12:13

Bruce Schneier explains why you’d want to do this … and how much of a pain it can be to set up and work with:

Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor, preferring certain cryptography over others, and using public-domain encryption wherever possible.

I also recommended using an air gap, which physically isolates a computer or local network of computers from the Internet. (The name comes from the literal gap of air between the computer and the Internet; the word predates wireless networks.)

But this is more complicated than it sounds, and requires explanation.

Since we know that computers connected to the Internet are vulnerable to outside hacking, an air gap should protect against those attacks. There are a lot of systems that use — or should use — air gaps: classified military networks, nuclear power plant controls, medical equipment, avionics, and so on.

Osama Bin Laden used one. I hope human rights organizations in repressive countries are doing the same.

Air gaps might be conceptually simple, but they’re hard to maintain in practice. The truth is that nobody wants a computer that never receives files from the Internet and never sends files out into the Internet. What they want is a computer that’s not directly connected to the Internet, albeit with some secure way of moving files on and off.

He also provides a list of ten rules (or recommendations, I guess) you should follow if you want to set up an air-gapped machine of your own.

October 7, 2013

CSEC’s sudden media prominence … in Brazil

Filed under: Americas, Cancon, Technology — Tags: , , , , , — Nicholas @ 10:50

If you haven’t heard of CSEC before, you’re certainly not alone. The signals intelligence service known as Communications Security Establishment Canada has been eager not to be in the public eye, but allegations are being made that CSEC has been spying on the Brazilian government’s mining and energy ministry:

The impact for Canada of these revelations could be equally grave: they come at a time when Brazil has become a top destination for Canadian exports, when a stream of delegations from the oil and gas industries are making pilgrimages to Rio de Janeiro to try to get a piece of the booming offshore oil industry, and when the Canadian government is eager to burnish ties with Brasilia. Foreign Affairs Minister John Baird visited Brazil in August, and spoke repeatedly about the country as a critical partner for Canadian business.

[…]

While CSEC’s role in conducting economic espionage has been alluded to before, how it does this job has not. The significance of the documents obtained by Globo in Brazil is that they speak to how “metadata” analysis by CSEC can be used to exploit a rival country’s computer systems.

The CSEC-labeled slides about the “Olympia” program describe the “Brazilian Ministry of Mines and Energy” as a “new target to develop” despite “limited access/target knowledge.”

The presentation goes on to map out how an individual’s smartphone — “target’s handset” — can be discerned by analysis, including by cross-referencing the smartphone’s Sim card with the network telephone number assigned to it and also to the handset’s unique number (IMEI).

The “top secret” presentation also refers to attacks on email servers.

“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” one slide says, without explaining who the speaker is.

October 5, 2013

The future of post-IPO Twitter from the user perspective

Filed under: Business, Technology — Tags: , , — Nicholas @ 08:40

In Maclean’s, Jesse Brown looks at the ominous signs of change for Twitter’s users in a post-IPO world:

As a private company, Twitter prioritized the user’s experience. I would go so far to say that providing an excellent user experience was the whole point of Twitter’s existence.

I didn’t get Twitter, at first. It seemed like just a stripped-down, feature-limited version of Facebook’s News Feed. Of course, that was the whole idea. By constraining users to 140 characters of text and a few buttons for sharing, “favoriting” or replying, and by eliminating the concept of mutually accepted friendship as a requirement for network growth, Twitter provided a simple, lightweight, super-charged information machine. The initial absence of pictures and video helped it move lightly across the slower phones of the time, and the arbitrary, spartan limitation on tweet length was a stroke of brilliance, forcing brevity upon its users to prevent blabbermouths and spammers from clogging up everybody’s feeds.

[…]

They will soon be under intense pressure to bring that number up, and in preparation, Twitter is moving away from sponsored tweets and sponsored trends, investing heavily in slick, complicated new ad products like Twitter Amplify, which embeds video clips into tweets with unskippable pre-roll ads. I can’t imagine any Twitter user saying “what this service really needs is some TV commercials!”

And whereas once Twitter played nicely with other apps, welcoming other companies (like Canada’s HootSuite) to build new apps that plug into Twitter and build on its network, they’ve since been frustrating developers with increasingly restrictive changes to its API, the interface it provides to outsiders. Last year, for example, Twitter put a cap on the number of users a third-party app could support. Now, if your Twitter-based service gets too popular, you’ll have to ask Twitter for permission to grow.

Reckoning military strength is more complex than counting tanks, ships, or noses

Filed under: Britain, Military, Technology — Tags: , , , , — Nicholas @ 07:44

Sir Humphrey is back from his honeymoon and posts about the unfailing media habit of nostalgically looking back at the military of the Cold War era and contrasting it with the much smaller military of today:

When one looks back over the last 150 years, the possession of large military forces by the UK has been somewhat of an aberration. If you ignore WW1 & WW2, then the only period in which large forces were sustained was from 1945 until the end of the Cold War. This could only be done by relying firstly on large numbers of conscripts, then having to provide very low pay after the end of National Service. It is telling that once military wages began to catch up with, then overtake civilian roles, manpower quickly became increasingly unaffordable. Similarly it is easy to forget that this period is one of the very few in UK history where there was a clearly defined opponent, where UK forces had a clear role to play (e.g. maintain BAOR, defend the home base, conduct ASW) as well as support wider non NATO commitments. It is much easier to justify the retention of larger armed forces when you have a specific role in mind for them, and not just being held at readiness as a contingency.

In the UK we are perhaps guilty of looking back on the Cold War period as halcyon era where we had large armed forces, while forgetting that they existed to do very specific roles, and also encourage other nations to pull their weight too. The post Cold War era wasn’t some wonderful period where UK forces roamed the globe in glorious isolation emulating Palmerston’s views, but a period when the UK had to contribute to an international coalition and work with our partners against a common enemy. This is important to remember, for the argument that 30 years ago we had X frigates, Y jets and Z tanks compared to today’s paltry number is actually misleading. In reality much of this equipment was fully committed to NATO forces, and wasn’t easily available to support wider UK national interests beyond the NATO area. So yes, the UK had capabilities, but they were borne to meet a specific external threat, and not a general role.

Similarly, if one looks at availability, it becomes clear that in real terms UK capability for purely national tasks now isn’t far off what it was at the end of the Cold War. Speaking to a Naval friend who joined in the late 1980s, he pointed out that of the 47 escorts when they joined, nearly a third were usually tied up in refit. Add to this the tasking and working up of escorts for things like NATO commitments, and support to the South Atlantic, and suddenly that’s the best part of another 15 escorts committed. At best there would be a margin of some 10-15 hulls available for national discretionary deployments — not much more than is available today.

Yes, yes, but what about tiny Obscuristan with their 500 tanks? Britain is much bigger than Obscuristan, shouldn’t the British army have more tanks than them? And Fantasia has more ships in their navy than the Royal Navy does!

It is also important to realise when looking at these sorts of papers that nations have very different defence requirements. It is one thing to say we have less soldiers than say, South Korea, but we forget that we do not have a nuclear armed neighbour on our border with a leader who is not always a completely rational actor. It is entirely logical that some nations will have more military personnel than the UK — they have direct ground threats, or their need for manpower for other jobs means it is politically helpful to keep a large army to hand. For instance many states still conscript their troops, meaning on paper their army is vastly larger than the British Army, but this is only achieved through a ready pool of manpower who can be paid a pittance and employed on duties which are often as much about support local agriculture by working on farms, or support public order as it is about being a military force.

There are also many nations out there who on paper have large stockpiles of equipment (particularly in the Middle East) and this can easily be turned into a headline about how a tiny nation has more tanks than the UK. The reality though is that these purchases are little more than an insurance policy designed to coax the nations into feeling an obligation to support the purchaser in a real crisis. If one views defence sales to the Middle East as a means of these nations buying support through economic largesse then that’s probably not far off the mark. Many of these equipment buys are in fact often stored in the desert and left to rust without ever being used. The author has heard many tales of armouries full of weapons never removed from packing crates, or trained on and often forgotten about. On paper this is a capability, and in reality it is little more than a box of life expired spare parts. One difference between the UK and many other nations is that the UK is willing to genuinely use and ‘sweat’ its assets to get the most from its equipment purchases. Just because some nations have impressive arsenals does not equate to a genuine ability to use them to best effect.

QotD: Immortality, if you want it

Filed under: Humour, Science, Technology — Tags: , — Nicholas @ 00:01

Those of us who are non-believing heathens might prefer porting our minds to robot bodies before the natural expiration date on our organic selves. It’s hard to wrap your head around the idea that a digital representation of your mind, no matter how accurate, is still “you” in some sense. But I think that fear will go away as soon as we see the first robot that thinks and acts exactly like Uncle Bob did before he made the jump. If Uncle Bob the robot acts human enough, we’ll come to see him as the same entity that once inhabited an organic shell. When technology is sufficiently advanced, we’ll get past the magical thinking about spirits and souls and the specialness of having organic parts.

To me, the most interesting possibility for the future involves porting human minds to software that includes entirely simulated realities. Such a program — a digital mind if you will — could live in an entirely artificial reality and experience what seems to be a genuine human life for the rest of eternity, or at least as long as the software keeps running. The freaky part is that if such a thing will someday be possible — and I think it will — then it follows that the time after it happens will be infinitely long whereas the history of time before it happens is finite. So it follows that there is an infinitely greater chance you are already the simulation and not a human who is reading this paragraph and contemplating it. Weird.

If you didn’t already have enough reasons to eat right, exercise, and keep your mind sharp, consider what you might be bringing to your own immortality. I was hoping to get there before the dementia sets in. But I just reread what I wrote and apparently I’m already too late.

Scott Adams, “Choose Your Immortality: Someday you’ll be a robot with a locket holding your last human cells”, Time, 2013-09-18

October 2, 2013

Bruce Schneier’s TEDx talk “The Battle for Power on the Internet”

Filed under: Media, Technology — Tags: , , , , — Nicholas @ 08:56

Published on 25 Sep 2013

Bruce Schneier gives us a glimpse of the future of the internet, and shares some of the context we should keep in mind, and the insights we need to understand, as we prepare for it. Learn more about Bruce Schneier at https://www.schneier.com and TEDxCambridge at http://www.tedxcambridge.com.

About TEDx, x = independently organized event
In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized.* (*Subject to certain rules and regulations)

October 1, 2013

PRSM – the not-at-all-a-joke NSA sharing network

Filed under: Government, Technology, USA — Tags: , , , , — Nicholas @ 12:59

Techdirt‘s Mike Masnick on the no-we’re-actually-serious “joke” PRSM network:

Soon after the very earliest reporting on Ed Snowden’s leaked documents about PRISM, the folks from Datacoup put together the very amusing GETPRSM website, which looks very much like the announcement of a new social network, but (the joke is) it’s really the NSA scooping up all our data and making the connections. It’s pretty funny. Except, of course, when you find out that it’s real. And, yes, that seems to be the latest revelation out of Ed Snowden’s leaks. The NY Times has an article by James Risen and Laura Poitras (what a combo reporting team there!) detailing how the NSA has basically built its own “shadow” social network in which it tries to create a “social graph” of pretty much everyone that everyone knows, foreign or American, and it all happens (of course) without a warrant. And, note, this is relatively new:

    The agency was authorized to conduct “large-scale graph analysis on very large sets of communications metadata without having to check foreignness” of every e-mail address, phone number or other identifier, the document said. Because of concerns about infringing on the privacy of American citizens, the computer analysis of such data had previously been permitted only for foreigners.

    The agency can augment the communications data with material from public, commercial and other sources, including bank codes, insurance information, Facebook profiles, passenger manifests, voter registration rolls and GPS location information, as well as property records and unspecified tax data, according to the documents. They do not indicate any restrictions on the use of such “enrichment” data, and several former senior Obama administration officials said the agency drew on it for both Americans and foreigners.

There were apparently two policy changes that allowed this to happen, and both occurred in the past three years. First, in November of 2010, the NSA was allowed to start looking at phone call and email logs of Americans to try to help figure out associations for “foreign intelligence purposes.” Note that phrase. We’ll come back to it. For years, the NSA had been barred from viewing any content on US persons, and the NSA, President Obama and others have continued to insist to this day that there are minimization procedures that prevent spying on Americans. Except, this latest revelation shows that, yet again, this isn’t actually true.

September 29, 2013

Unplugging your laptop to give your battery a longer working life

Filed under: Technology — Tags: — Nicholas @ 11:53

In Wired, Roberto Baldwin says you shouldn’t leave your laptop plugged in all the time:

In order to squeeze as much life out of your lithium-polymer battery, once your laptop hits 100 percent, unplug it. In fact, you should unplug it before that.

Cadex Electronics CEO Isidor Buchmann told WIRED that ideally everyone would charge their batteries to 80 percent then let them drain to about 40 percent. This will prolong the life of your battery — in some cases by as much as four times. The reason is that each cell in a lithium-polymer battery is charged to a voltage level. The higher the charge percentage, the higher the voltage level. The more voltage a cell has to store, the more stress it’s put under. That stress leads to fewer discharge cycles. For example, Battery University states that a battery charged to 100 percent will have only 300-500 discharge cycles, while a battery charged to 70 percent will get 1,200-2,000 discharge cycles.

Buchmann would know. His company Cadex sponsers Battery University. The site is the go-to destination for anyone interested in battery technology. And it’s not just constant power that shortens your battery’s life. While batteries degrade naturally, heat also accelerates the degradation. Extreme heat can cause the cells to expand and bubble. Kyle Wiens of iFixit told WIRED: “Too much heat to the battery over time, and the battery isn’t going to last as long.”

You can battle this degradation by keeping the lid open and your laptop out of your actual lap while using it.

September 28, 2013

Google is “fighting stupid with stupid”

Filed under: Business, Law, Technology — Tags: , , , — Nicholas @ 11:54

In Maclean’s, Jesse Brown looks at the rather dangerous interpretation of how email works in a recent court decision:

Newsflash: Google scans your email! Whether you have a Gmail account or just send email to people who do, Gmail’s bots automatically read your messages, mostly for the purpose of creating targeted advertising. And if you were reading this in 2005, that might seem shocking.

Today, I think most Internet users understand how free webmail works and are okay with it. But a U.S. federal judge has ruled otherwise. Yesterday, U.S. District Judge Lucy H. Koh ruled that Google’s terms of service and privacy policies do not explicitly spell out that Google will “intercept” users’ email (here’s the ruling).

The word “intercept” is crucial here, because it may put Google in the crosshairs of State and Federal anti-wiretapping laws. After Judge Koh’s ruling, a class-action lawsuit against Google can proceed, whose plaintiffs seek remedies for themselves and for class groups including “all U.S. citizen non-Gmail users who have sent a message to a Gmail user and received a reply…”. Like they say in Vegas, go big or go home.

[…]

An algorithm that scans my messages for keywords like “vacation” in order to offer me cheap flights is not by any stretch of the imagination a wiretap.

But Google has taken a different tack in their defence. If, they’ve argued, what Gmail does qualifies as interception, than so does all email, since automated processing is needed just to send the stuff, whether or not advertising algorithms or anti-spam filters are in use. This logic can be extended, I suppose, to all data that passes through the Internet.

You might call it fighting stupid with stupid, but I think it’s a bold bluff: rule us illegal, Google warns the court, and be prepared to deem the Internet itself a wiretap violation.

September 21, 2013

Why wind and solar power can’t meet our needs

Filed under: Economics, Environment, Technology — Tags: , , , — Nicholas @ 10:32

Robert Bryce explains why — no matter how much we might want it to be so — alternate forms of energy like wind and solar power cannot cover our demands:

That 32 percent increase in global carbon dioxide emissions reflects the central tension in any discussion about cutting the use of coal, oil and natural gas: Developing countries — in particular, fast-growing economies such as Vietnam, China and India — simply cannot continue to grow if they limit the use of hydrocarbons. Those countries’ refusal to enact carbon taxes or other restrictions illustrates what Roger Pielke Jr., a professor of environmental studies at the University of Colorado, calls the “iron law of climate policy”: Whenever policies “focused on economic growth confront policies focused on emissions reduction, it is economic growth that will win out every time.”

Over the past 10 years, despite great public concern, carbon dioxide emissions have soared because some 2.6 billion people still live in dire energy poverty. More than 1.3 billion have no access to electricity at all.

Now to the second number: 1. That’s the power density of wind in watts per square meter. Power density is a measure of the energy flow that can be harnessed from a given area, volume or mass. Six different analyses of wind (one of them is my own) have all arrived at that same measurement.

Wind energy’s paltry power density means that enormous tracts of land must be set aside to make it viable. And that has spawned a backlash from rural and suburban landowners who don’t want 500-foot wind turbines near their homes. To cite just one recent example, in late July, some 2,000 protesters marched against the installation of more than 1,000 wind turbines in Ireland’s Midlands Region.

Consider how much land it would take for wind energy to replace the power the U.S. now gets from coal. In 2011, the U.S. had more than 300 billion watts of coal-fired capacity. Replacing that with wind would require placing turbines over about 116,000 square miles, an area about the size of Italy. And because of the noise wind turbines make — a problem that has been experienced from Australia to Ontario — no one could live there.

[…]

In 2012, the contribution from all of those sources amounted to about 4.8 million barrels of oil equivalent per day, or roughly one-half of a Saudi Arabia. Put another way, we get about 50 times as much energy from all other sources — coal, oil, natural gas, nuclear and hydropower — as we do from wind, solar, geothermal and biomass.

September 20, 2013

A few setting changes for more annoying iOS 7 features

Filed under: Technology — Tags: , — Nicholas @ 06:59

I haven’t yet upgraded my iPhone to the latest OS — I don’t want to be one of the doughty pioneers who discovers new bugs on my own phone — but many others have already made the plunge. While I’m sure some of the new features are great, there are bound to be some changes which are less-than-stellar. In the Telegraph, Richard Gray has a few things you might want to change:

Contacts names on text messages

On the locked screen, messages flash up with the contacts name and a fragment of their message. However, in the new iOS, the message no long displays their full name by default.

Instead it will only show their first name. While this may feel friendlier, for anyone with more than one David or John in their contacts book, it will be confusing.

To restore formality back to your world, access Settings, select Mail, Contacts, Calendars.

Then under the Contacts section, select Short Name and then select the option you prefer — First & Last Name, First Initial & Last Name or just if you are the public school sort, pick Last Name Only.

Control Centre while using an App

The new look control centre is designed to be easy to access — simply swipe up from the bottom of the screen and the frosted-glass effect pane will appear.

Great. Unless of course you are using an app or playing a game that requires just such an action, like the hugely popular Temple Run — then up pops the control centre exactly when you don’t want it.

Fortunately it is possible to turn this off so the control centre will not open when you are using apps.

Access Settings and then select Control Centre. Turn off Access with Apps and no longer will the Control Centre intrude upon your App using experience.

H/T to Nicholas Packwood for the link.

September 19, 2013

After smartphones, genius machines?

Filed under: Books, Business, Media, Technology — Tags: , , , — Nicholas @ 07:41

In the Daily Beast, Robert Herritt reviews the latest book by Tyler Cowen, Average Is Over: Powering America Beyond the Age of the Great Stagnation.

Cowen’s main background assumption is that in the not-too-distant future various kinds of “genius machines” will be everywhere. In the workplace, business negotiations and client introductions “will be recorded, processed, and analyzed [and] … [e]ach party to the communications might receive a real-time report on when the other people are likely lying …” At the supermarket, “[y]our shopping cart will use GPS to track your moves through the store, including which aisles you visit most often.” As for our personal lives, “[a] woman might consult a pocket device in the ladies’ room during a date that tells her how much she really likes the guy. The machine could register her pulse, breathing, tone of voice … or whichever biological features prove to have predictive power.”

Even a few years ago, this forecast would have sounded silly, but that was before many of us trusted Match.com algorithms to suggest potential spouses and smartphones came with fingerprint scanners. Cowen’s not talking about flying cars (that futurist mainstay that always seems both just out of reach and comically unnecessary), but rather slightly more sophisticated versions of the technologies that many of us already use.

The bad news, he tells us, is that the rise of the machines will only worsen the wage polarization we are seeing today. Cowen predicts a situation where 10 percent to 15 percent of Americans are “extremely wealthy” with “fantastically comfortable and stimulating lives.” Most of the rest will see stagnant or falling wages but will benefit from plenty of “cheap fun and also cheap education.” For those wondering, this vanishing middle ground is where the book gets its catch-phrase title.

What will determine whether you end up a high earner or a low-wage left-behind will be, in large part, your answer to some variation on the following questions: “Are you good at working with intelligent machines or not? Are your skills a complement to the skills of the computer, or is the computer doing better without you?”

September 15, 2013

Bruce Schneier on what you can do to stay out of the NSA’s view

Filed under: Liberty, Technology — Tags: , , , , , — Nicholas @ 10:44

Other than going completely off the grid, you don’t have the ability to stay completely hidden, but there are some things you can do to decrease your visibility to the NSA:

With all this in mind, I have five pieces of advice:

  1. Hide in the network. Implement hidden services. Use Tor to anonymize yourself. Yes, the NSA targets Tor users, but it’s work for them. The less obvious you are, the safer you are.
  2. Encrypt your communications. Use TLS. Use IPsec. Again, while it’s true that the NSA targets encrypted connections — and it may have explicit exploits against these protocols — you’re much better protected than if you communicate in the clear.
  3. Assume that while your computer can be compromised, it would take work and risk on the part of the NSA — so it probably isn’t. If you have something really important, use an air gap. Since I started working with the Snowden documents, I bought a new computer that has never been connected to the Internet. If I want to transfer a file, I encrypt the file on the secure computer and walk it over to my Internet computer, using a USB stick. To decrypt something, I reverse the process. This might not be bulletproof, but it’s pretty good.
  4. Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. It’s prudent to assume that foreign products also have foreign-installed backdoors. Closed-source software is easier for the NSA to backdoor than open-source software. Systems relying on master secrets are vulnerable to the NSA, through either legal or more clandestine means.
  5. Try to use public-domain encryption that has to be compatible with other implementations. For example, it’s harder for the NSA to backdoor TLS than BitLocker, because any vendor’s TLS has to be compatible with every other vendor’s TLS, while BitLocker only has to be compatible with itself, giving the NSA a lot more freedom to make changes. And because BitLocker is proprietary, it’s far less likely those changes will be discovered. Prefer symmetric cryptography over public-key cryptography. Prefer conventional discrete-log-based systems over elliptic-curve systems; the latter have constants that the NSA influences when they can.

Since I started working with Snowden’s documents, I have been using GPG, Silent Circle, Tails, OTR, TrueCrypt, BleachBit, and a few other things I’m not going to write about. There’s an undocumented encryption feature in my Password Safe program from the command line; I’ve been using that as well.

I understand that most of this is impossible for the typical Internet user. Even I don’t use all these tools for most everything I am working on. And I’m still primarily on Windows, unfortunately. Linux would be safer.

The NSA has turned the fabric of the Internet into a vast surveillance platform, but they are not magical. They’re limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.

Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That’s how you can remain secure even in the face of the NSA.

Reining-in the NSA … while it’s still even theoretically possible

Filed under: Government, Liberty, Technology, USA — Tags: , , — Nicholas @ 10:25

In TechDirt, Glyn Moody on the fleeting opportunity to rein-in the NSA:

In the wake of the continuing leaks about the NSA’s activities, most commentators are understandably still trying to get to grips with the enormity of what has been happening. But John Naughton, professor of the public understanding of technology at the UK’s Open University, tackles a very different question on his blog: what is likely to happen in the future, if things carry on as they are?

Naughton notes that the NSA’s mission statement includes the following phrase: “to gain a decision advantage for the Nation and our allies under all circumstances.” “Under all circumstances” means that as the Internet grows — and as we know, it is currently growing rapidly — so the NSA will naturally ask for resources to allow it to do tomorrow what it is doing today: monitoring more or less everything that happens online. Naughton then asks where that might lead if the political climate in the US remains sufficiently favorable to the NSA that it does, indeed, get those resources:

    The obvious conclusion therefore, is that unless some constraints on its growth materialise, the NSA will continue to expand. It currently has 35,000 employees. How many will it have in ten years’ time? Who can say: 50,000, maybe? Maybe even more? So we’re confronted with the likelihood of the growth of a bureaucratic monster.

    How will such a body be subjected to democratic oversight and control? Let me rephrase that: can such a monster be subjected to democratic control?

« Newer PostsOlder Posts »

Powered by WordPress