The BBG was formed in 1999 and runs on a $721 million annual budget. It reports directly to Secretary of State John Kerry and operates like a holding company for a host of Cold War-era CIA spinoffs and old school “psychological warfare” projects: Radio Free Europe, Radio Free Asia, Radio Martí, Voice of America, Radio Liberation from Bolshevism (since renamed “Radio Liberty”) and a dozen other government-funded radio stations and media outlets pumping out pro-American propaganda across the globe.
... ... Between 2012 and 2014, Radio Free Asia’s Open Technology Fund poured more than $10 million into Internet privacy projects big and small: open-source encrypted communication apps, next-generation secure email initiatives, anti-censorship mesh networking platforms, encryption security audits, secure cloud hosting, a network of “high-capacity” Tor exit nodes and even an anonymous Tor-based tool for leakers and whistleblowers that competed with Wikileaks.
Though many of the apps and tech backed by Radio Free Asia’s OTF are unknown to the general public, they are highly respected and extremely popular among the anti-surveillance Internet activist crowd. OTF-funded apps have been recommended Edward Snowden, covered favorably by ProPublica and The New York Times’ technology reporters and repeatedly promoted by the Electronic Frontier Foundation. Everyone seems to agree that OTF-funded privacy apps offer some of the best protection from government surveillance you can get. In fact, just about all the featured open-source apps on EFF’s recent “Secure Messaging Scorecard” were funded by OTF.
Control is moving back to the center, where powerful companies and governments are creating choke points. They are using those choke points to destroy our privacy, limit our freedom of expression, and lock down culture and commerce. Too often, we give them our permission—trading liberty for convenience—but a lot of this is being done without our knowledge, much less permission.
... The tools I use now are, to the extent possible, based on community values, not corporate ones.
tl;dr There is an adware called Privdog that gets shipped with software from Comodo. It totally breaks HTTPS security.
From Naked Capitalism's summary:
So here we have the CEO of a Certificate Authority (CA), Comodo, who is also the CEO of Privdog, whose product subverts the certificate authority system. Oh, and Comodo ships that very product with its software. These bottom feeders make Bill Gates look like St. Francis of Assisi. How deep does the rot in the software industry go, anyhow?
I am beginning to believe that Richard Stallman is right, living in freedom means using free and open software.
But Samsung’s televisions are far from the only seeing-and-listening devices coming into our lives. If we’re going to freak out about a Samsung TV that listens in on our living rooms, we should also be panicking about a number of other emergent gadgets that capture voice and visual data in many of the same ways.
... .... Samsung’s competitor, the LG Smart TV, has basically the same phrase about voice capture in its privacy policy: “Please be aware that if your spoken word includes personal or other sensitive information, such information will be among the Voice Information captured through your use of voice recognition features.”
It isn't just TVs, Microsoft's xBox Kinect, Amazon Echo, GM's Onstar, Chevrolet’s MyLink and PDRs, Google's Waze, and Hello's Sense all have snooping capabilities. Welcome to the world of Stasi Tech.
The Interactive Voter Choice System (IVCS) enables voters to insert a new layer of voter-controlled online voting blocs, political parties, and electoral coalitions (BPCs) into electoral and legislative processes that can build electoral bases large enough to win elections.
Since the system will run on a single computer platform accessible by any voter via the reinventdemocracy.net website, it enables voters to autonomously create and manage their BPCs online — in most cases without having to first pass or reverse any laws, regulations or rules governing electoral and legislative processes.
A Step by Step View
Voters create personal accounts and profiles on reinventdemocracy.net and use IVCS agenda setting tools and databases to set individual legislative agendas. Voters connect with like-minded voters across the political and ideological spectrum on reinventdemocracy.net with similar agendas. Like-minded voters with similar agendas join forces to build online voting blocs, political parties and electoral coalitions (BPCs), and negotiate and vote on common agendas using the IVCS voting utility.
BPCs surmount partisan differences and legislative deadlocks by setting transpartisan legislative agendas that cross political and ideological lines. BPCs nominate transpartisan slates of candidates and build winning transpartisan electoral bases larger than the electoral base of any single political party, enabling their candidates to run for office without needing special interest campaign contributions to build a winning electoral base.
BPCs use IVCS outreach tools to recruit new members, merge BPCs to increase their electoral strength, and plan and implement get-out-the-vote campaigns to vote their candidates into office.
BPCs use their agendas to provide legislative mandates to their elected representatives and oversee their legislative actions.
BPCs pressure elected representatives to enact their agendas by signing online petitions, holding online referendums and conducting online straw recall votes using the IVCS voting utility.
BPCs evaluate and compare their agendas to their representatives' legislative track records in deciding whether to support them in the next election or run candidates to defeat them.
Samsung’s privacy policy raised concerns with privacy activists who spotlighted the warning: “Please be aware that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.” Now there are concerns that tinkering with the software by tech-savvy customers may run afoul of the Digital Millennium Copyright Act.
The danger is that with so much data and so much complexity, an automated system is in control. The software could end up discriminating against certain racial or ethnic groups without being programmed to do so.
As has been said before: Code is law.
Some intrepid biologists at the University of Southern California (USC) have discovered bacteria that survives on nothing but electricity — rather than food, they eat and excrete pure electrons. These bacteria yet again prove the almost miraculous tenacity of life — but, from a technology standpoint, they might also prove to be useful in enabling the creation of self-powered nanoscale devices that clean up pollution. Some of these bacteria also have the curious ability to form into ‘biocables,’ microbial nanowires that are centimeters long and conduct electricity as well as copper wires — a capability that might one day be tapped to build long, self-assembling subsurface networks for human use.
All seems condemned in the long run to approximate a state akin to Gaussian noise. -- James Martin