In the last 15 months, several of the biggest anonymous websites on the Tor network have been identified and seized by police. In most cases, no one is quite sure how it happened.
The details of such a campaign have yet to be revealed. With enough funding, Tor could have developers focusing their work entirely on hidden services, a change in developer priorities that many Tor users have been hoping for in recent years.
Silicon Valley’s giant companies have been quiet lately on the question of whether the government should protect an open Internet, which they’ve previously argued is vital to innovation. Don’t count on them staking out a stronger position even though President Obama has stepped into the fray, and Washington looks to be gearing up for an epic battle over the rules that govern the Internet.
...
... In another era, the White House’s position might have elicited squeals of joy from the technology giants, which have long maintained that the future of innovation online depends on such strict net neutrality rules. But Google, which was once the industry’s most ardent supporter of net neutrality, and Facebook, which could mobilize millions of supporters through its service, both declined to comment on Mr. Obama’s position. Instead, they joined a supportive statement put out by the Internet Association, a trade group that represents a coalition of technology companies, including Amazon, eBay, Yahoo, Twitter and PayPal.
It seems to me that the FCC has authority to reclassify Internet service providers as common carriers. I don't understand why Obama is proposing legislation.
Recently, Verizon was caught tampering with its customer's web requests to inject a tracking super-cookie. Another network-tampering threat to user safety has come to light from other providers: email encryption downgrade attacks. In recent months, researchers have reported ISPs in the US and Thailand intercepting their customers' data to strip a security flag—called STARTTLS—from email traffic. The STARTTLS flag is an essential security and privacy protection used by an email server to request encryption when talking to another server or client.1
By stripping out this flag, these ISPs prevent the email servers from successfully encrypting their conversation, and by default the servers will proceed to send email unencrypted. Some firewalls, including Cisco's PIX/ASA firewall do this in order to monitor for spam originating from within their network and prevent it from being sent. Unfortunately, this causes collateral damage: the sending server will proceed to transmit plaintext email over the public Internet, where it is subject to eavesdropping and interception.
Great moments in customers relations!
"A car is just a big purse on wheels." -- Johanna Reynolds