Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:CALEA (Score 1) 127

Oh agreed. Definitely. In fact I already knew the answer before writing the guy originally. Any telecom provider located in the US *must* be CALEA compliant. However the entire service will give folks a false sense of security and that's the larger point I was trying to make.

Most speech isn't prohibited today, but political winds change all too often and what may be legal today may become illegal tomorrow.

Just hope and wish folks realize that their calls can and WILL be intercepted no matter what Silent Circle may say on the matter, that's all.

Comment CALEA (Score 5, Informative) 127

I wrote to Silent Circle over a week ago when news of the impending launch first started making circles.

SC's COO was kind to respond in an attempt to allay my fears. Sadly though his answer was more "non" than one.

A week ago replied back with a follow-up question, and have yet to receive a response.

While my political activism is pretty much limited to change.org petitions, SC is directly marketing their services TO activists. As the Occupy movement has shown, political activism, and the free-speech that goes along with it, are becoming in jeopardy. My concern, and I feel it's a valid one, is that CALEA will give subscribers a false sense of security. After all when Microsoft purchased Skype, one of the first things they did (they had no choice) was to install CALEA intercepts.

Hopefully somebody at Silent Circle will be able to answer this. Until then, I wouldn't recommend it. Check out The Guardian Project and Jitsi instead.

(Note - I'm only posting this because as Silent Circle's COO, Vic Hyder is authorized to speak on behalf of the Company.)

-----BEGIN EMAIL-----
Mr. Hyder,

Thank you very much for the reply and information you've provided below,
but I'm afraid I'm still unclear on one particular point: /does Silent
Circle fall under /CALEA/jurisdiction or not/?

Kind regards,

George Ellenburg

On 10/11/12 7:43 PM, Vic Hyder wrote:
> *George*,
> Thanks for the note. Quick response - Silent Circle provides peer to
> peer encryption from subscriber to subscriber. The Secure Calling Plan
> offers members a little flexibility to use their Silent Phone number
> to send and receive calls outside the Circle (encrypted to our servers
> but decrypted from servers to non-subscriber). We'll let our members
> determine what their threat model is and how they need to protect
> their transmissions.
>
> Circle up.
> *______________*
>
> Vic Hyder
> Chief Operations Officer
>
> Silent Circle
> Private Encrypted Communications
> Silicon Valley | Washington DC
>
> w: SilentCircle.com
>
> This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to whom they
> are addressed. If you received this e-mail in error, please notify the
> sender immediately and destroy and/or delete all copies. Circle up.
>
>
>
> On Oct 11, 2012, at 6:01 AM, George Ellenburg > wrote:
>
>> Hello-
>>
>> I read with interest news reports yesterday that Silent Circle was
>> getting ready to launch. As an activist and privacy advocate, I was
>> troubled though to read that Silent Circle was planning on offering a
>> Secure Calling Plan amongst other communication services.
>>
>> I understand the obvious revenue stream such an offering will generate,
>> but I'm intrigued as to how you plan to not comply with CALEA, or
>> curious as to how CALEA wouldn't do an end-run around your service
>> altogether? CALEA, as you probably know, is the Communications
>> Assistance for Law Enforcement Act, which requires mandatory technical
>> intercept points for Law Enforcement and Intelligence purposes.
>>
>> Being a United States Company, offering Communication services, located
>> in the United States, your Company is certainly subjected to mandatory
>> CALEA implementations.
>>
>> Thanks for your time. I earnestly look forward to your response.
>>
>> -George Ellenburg
>>
>
-----END EMAIL-----

Comment Re:Showers (Score 1) 365

Thank you for this. This is precisely what I'm planning on doing myself in a few years when hopefully the housing market can recover even just a little.

Sell everything (house, car, most furnishings, etc.) and buy a used 40' 5th wheel & truck and basically live and work out of it full-time.

Only thing I'm debating is whether to get one with 2 bedrooms (1 for office) or "work" out of the living room.

(And I'm a pretty hardcore geek so power & network access is a must.) :-)

Comment Re:Perspectives (Score 4, Interesting) 782

LOL. We're not injecting anything.

We've got a Microsoft Enterprise PKI.

Our own Root CA, Policy CA, and Issuing CA.

All of the machines that are joined to our domain are company-owned workstations and servers.

The Local & Personal Certificate Stores are controlled through Group Policy.

All of our workstations have our internal root certificate already on the machines, and all of our workstations and servers explicitly trust our root certificate.

Again: Our stuff. Our network. Our data. You have no privacy.

If employees stopped conducting themselves like they thought they had privacy while they were surfing the net while they were at work they wouldn't be so shocked and amazed when they find out they have none.

Comment Re:Perspectives (Score 2) 782

Not saying I disagree with anything you've written, but the courts have stated an employee has an implicit expectation of privacy while reading their blackberry sitting on the toilet.

However, they have none while they're surfing the net.

There is a distinct difference than an employer installing a video camera in the bathrooms than installing technical controls to fulfill their fiduciary and regulatory responsibilities to protect their trade secrets and other company data.

Slashdot Top Deals

It is easier to write an incorrect program than understand a correct one.

Working...