This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 License.
Phil Zimmermann, the creator of PGP and Silent Phone is our guest at Google, talking about communications security. How large scale deployments of end-to-end secure communications take place, the challenges this brings and the influence this focus on Enterprise has brought to the end-user. Published on Jul 6, 2016
There are very few government checks on what America’s sweeping surveillance programs are capable of doing. John Oliver sits down with Edward Snowden to discuss the NSA, the balance between privacy and security, and dick-pics.
Here’s the video of my LastPass presentation from the Nebraska Library Association Conference presented on 10 October 2014.
I saw Citizenfour last weekend and I’m at a loss as to why this film was rated R. At least one theatre felt the same and did something about it:
The IFC Center theater in New York City isn’t having any of it, and has posted a notice inviting high-school age patrons to come, especially those who might vote in the next election.
Read the full article @ BoingBoing.
P.S. GO SEE THIS FILM!
The ALA published a report investigating the use of filters and found they were disproportionately blocking out left-leaning views on issues such as gay marriage and abortion. LGBT community websites were often blocked and identified as “sexual” sites.
They also found that low-income individuals are more impacted by filters. If you’re able to afford internet at home and aren’t finding the information you need at school or the library because it’s blocked out, the easy solution is to head home and Google it there. But for those whose only access point to the internet is at school or the public library, filters can choke out their ability to have the same access to information as their peers. Libraries in lower-income communities are also more likely to have filters because they lean on government funding and can’t afford separate labs.
And of course, there’s the slippery slope argument: if we start with pornography, where do we go from there? What’s appropriate in the eyes of one person might be wildly offensive to someone else.
Read the full article @ Motherboard.
Harvard Law School Professor Lawrence Lessig interviewed Edward Snowden at Harvard Law School on Oct. 20.
Adobe came under fire a few weeks ago when news was brought to light that critical user data was being sent to their servers from anyone using Adobe Digital Editions 4. The most important aspect of this story was that it was being done in clear text, with no encryption. Adobe has just patched ADE 4, to solve this issue.
This is from May but I’m a bit behind in some of my reading. However it is worth every moment you’ll spend reading it.
A great deal of confusion has been created by the distinction between data and metadata, as though there were a difference and spying on metadata were less serious.
Illegal interception of the content of a message breaks your secrecy. Illegal interception of the metadata of a message breaks your anonymity. It isn’t less, it’s just different. Most of the time it isn’t less, it’s more.
In particular, the anonymity of reading is broken by the collection of metadata. It wasn’t the content of the newspaper Douglass was reading that was the problem – it was that he, a slave, dared to read it.
The president can apologise to people for the cancellation of their health insurance policies, but he cannot merely apologise to the people for the cancellation of the constitution. When you are president of the United States, you cannot apologise for not being on Frederick Douglass’s side.
Read the full article @ The Guardian.
In my Windows 10 presentation yesterday a question was asked about the Windows 10 Technical Preview having a keylogger. I said it did and that I remember clicking through a EULA as part of the install. Well, I happened to have taken a photo of the screen I recall clicking OK on and here it is:
As you can guess, I did not click on the “learn more,” “privacy,” or “Customize” links so I can’t say exactly what’s there. However, the important line is the fifth one which said you’re helping to improve Microsoft by “sending us info.” And yes, that includes a keylogger. If you’d like more info on just why there’s a keylogger, check out the ‘Microsoft clears the air on Windows 10 “keylogger”‘ article from Den of Geek.