Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Destroy "someone's" piece of software? (Score 1) 136

I worked at the EFF and spoke with Austin several times about Haystack. On the basis of what I learned then, EFF never publicly advocated using Haystack, and told any journalist or fundraiser who queried us that until Austin submitted the code for an independent security audit, we could not recommend its use.

Austin would inaccurately characterized these conversations (most recently at the Q&A here at Gnomedex, here http://www.youtube.com/watch?v=V6b5ND2js_8#t=35m0s ) as being that EFF telling Austin that Haystack should be open source.

To be clear: EFF never made this request, and I made it clear to Austin that there were a number of ways that a technical security audit could take place without making the source publicly available (for instance, we offered to put him in touch with independent security consultants who work with Microsoft and Google under NDA).

EFF works has and will work with both closed source and open source vendors to improve their products' privacy and security.

Comment Re:Ok you've got my attention (Score 1) 136

Okay, that's pretty much what we're thinking -- warn now, release details as soon as we can. Right now I'm talking to people to establish how widespread the message is, and also to get some idea of the actual, non-technical risk of "being a Haystack user". One of the problems is that there may be non-trivial amount of retrospective risk.

The service is actually down; that's what Austin claimed he did on Friday.

Comment Re:Ok you've got my attention (Score 2, Informative) 136

Hey, Kangsterizer. I'm sorry if you read my blog post expecting to find substantive technical details; that does seem like a waste of time, and maybe I should have made it clearer at the start that there would not be that level of detail.

My claim, and that of others involved in this (including I believe the coder of the Haystack system, who is posting on this thread also) is that we can't give out more detailed info about the problems because we believe that would put people at risk.

I find this incredibly frustrating, because obviously people in your position are entirely right to be skeptical. I'd like you to not believe it's FUD, but I can't think of a way to convince you short of as I said, a detailed public analysis.

Assuming for the moment what I'm saying isn't an ingenious pack of lies or delusion, what do you think I should do?

Firefox

Firefox Extension HTTPS Everywhere Does What It Sounds Like 272

climenole writes "HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites. Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site. The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS."

Comment Re:I want an iPhone but I am not switching carrier (Score 2, Interesting) 521

Ah yes. It's completely unreasonable for anyone to expect Apple to make a version of their phones with a CDMA (ie. the "wrong standard") radio in it. It's not like any other phone manufacturers build handsets for both standards. Certainly not RIM, Samsung, Palm, Motorola, etc.... Oh wait.

I'm not saying that there's anything _wrong_ with Apple's decision to only address part of the market. If they had to pick only one technology, they'll obviously pick the one with the biggest customer base.

What I'm saying is that the AC's implication that it is somehow strange for DarthVain to expect a phone to support more than one network is kind of ridiculous. It's not strange at all. In fact, Apple is pretty much the only phone manufacturer that sells into North America that doesn't also make CDMA phones. This fact will cost them some sales from people like DarthVain. They obviously know this, and are apparently okay with it.

It is also fairly annoying that it's necessary to hack the phone (jailbreak, whatever) to make it work with an otherwise compatible GSM network though. Vendor lock-in is pretty much par for the course with Apple stuff, though. It's part of why I don't really own any.

Comment Re:Cash for Rare Earth Metals Program (Score 1) 456

Thank you. You had to go and depress me with the truth again didn't you? If the "founding fathers" could have seen the end results of their work I honestly think they'd have put a musket to their heads.

The only way for a democracy to work is to have a strong majority of well educated and engaged citizenry. The only way for a totalitarian government to work is for it to consist wholly of well educated, selfless, empathetic leaders and bureaucrats. As far as I can tell, both are positions of unstable equilibrium and practically speaking unattainable. With that in mind... Anyone got a better idea?

Comment Re:Not a Great Analogy (Score 1) 456

The mine should have not been allowed to close in the first place.

Not allowed? How do you "not allow" private property owners to stop incurring the expense of pulling underpriced dirt out of a hole on their own land? Take the land at gunpoint? Then operate the mine subsidized by tax money to be competitive with Chinese peasant labor? To what end? Why don't we nationalize the entire economy then, Mister Trotsky?

Comment Re:I question a key point from TFA (Score 2, Insightful) 144

You're right on both parts, essentially. I think they also were monitoring calls originating in the US that were made to foreign numbers they believed to have ties with terrorism, too, but honestly it's hard to really figure out what the truth is and was with so much fear-mongering and hyperbole going on.

No, the reason why it's hard to find out the truth is because the government has attempted to cloak the entire process under a "states secrets" privilege. When you decide, as the elected officials of the country, to hide every aspect of your executive plans from your electors, the judicial system, and Congress, you should not be surprised if "hyperbole and fear-mongering" enters the vacuum.

Oh, and the program itself wasn't really new, it's been around forever. Bush & Co. just tweaked the rules around a little bit -- a move that I think was less about invading the privacy of Americans (which they've been able to do for several decades now) and more a matter of removing a bottleneck. The whole secret wiretap deal has to be approved by a secret court, I think there's a 24 or 48 hour window in which they can start a wiretap and then seek approval by this secret court. Well, in the wake of 9/11, they were using this quite a bit, and I'm of the belief that they circumvented the court not because they wanted to be Big Brother but because they knew that most these wiretaps would NOT result in any information but felt that at the time it was best to cast as wide a net as possible, immediately, and later worry about narrowing things down from "possible" to "likely".

This is all supposition on your part. Reassuring supposition, but as absent of proof as the most paranoid theories. If it were the case, there's a very simple procedure the administration could have followed: it could have gone to Congress and asked for the "paperwork", as you call it, to be reformed. That paperwork is there for a reason: it is so we can keep track of who follows the law, and we are nation under the law, not under men.

As it is, we know that there was a new "President's Surveillance Program", that differed substantially enough from previous practice to be described as such. We know, thanks to Mr Klein, that there was an installation in San Francisco whose abilities far exceeded those required for lawful interception. We have a group of telecom companies who seemed so unsure of their own legal position that when asked for the simple, legal authorization documents to clarify the lawfulness of their actions, they lobbied for (and got) blanket retroactive immunity, using the argument that they might owe billions in fines (a possibility that could only have occurred if the numbers of those wiretapped were counted in the hundreds of thousands).

What's a more sensible attitude in the face of apparent law-breaking by the highest levels of government, working in concert with our largest corporations? A genial "well I guess they had their reasons," shrug or a demand that the other branches of government use their power and the responsibility to uncover that illegality?

Comment Re:freelegoporn.com is not cybersquatting (Score 2, Insightful) 183

I firmly believe that what you say is not true -- you don't have to litigate every trivial instance of your trademark being violated. AFAICS, this is an urban myth that developed from the potential (but usually unlikely) threat of genericisation through overuse, and the utility of claiming it to be the case by IP lawyers.

I really don't, for instance, believe the Lego porn is going to lead to people using "lego" to refer to any other kind of brick. This is because I don't believe any of Lego's competitors are going to stand up in court and say "Well, *of course* we should be able to refer to our bricks as legos. Did you not see them fail to go after that pornography site that used such obviously fake Lego bricks?" That's why I ask for evidence that what you're saying is true.

Of course, if you are right, please wait five years, and then start your own lego brick company, citing the lack of any court action against this slashdot post as evidence that the Danish company lost the mark years ago.

Slashdot Top Deals

Love may laugh at locksmiths, but he has a profound respect for money bags. -- Sidney Paternoster, "The Folly of the Wise"

Working...