[identity profile] lafinjack.livejournal.com posting in [community profile] talkpolitics


The Calyx Institute has been getting a lot of press the past couple days. They have a new proposal for how the business of mobile phone and internet service providing should work: customer first, privacy paramount. CNet has a writeup here, and the basic business model is to encrypt all communications to the fullest extent and encrypt all ISP-local static storage (i.e. email accounts) so not even the ISP can access it, only the customer.

This will make everything more secure for the customer, obviously, but is also a part of several other practices within the ISP. Most major ISPs, such as AT&T and Verizon, pretty much automatically roll over for any government inquiry, regardless of how trivial, and have explicit backdoors built in to their networks for unfettered government access. Calyx plans to "challenge government surveillance demands of dubious legality or constitutionality". Spurious stuff, basically, not to mention requests that aren't accompanied by a court order. In addition, the practice of encrypting all ISP storage would make them literally unable to comply with such orders, as stipulated under the 1994 Communications Assistance for Law Enforcement Act.

Essentially, "Calyx will use all legal and technical means available to protect the privacy and integrity of user data" founder Nick Merrill says.

Given how much first and fifth amendment rights have been eroded under previous and current administrations, I see this as a positive reaction against repeated government encroachment. The Calyx proposals are legal now, but will the likes of the FBI and NSA stand for it without a fight?

(no subject)

Date: 19/4/12 01:03 (UTC)
From: [identity profile] dwer.livejournal.com
I've got their donation page open right now. If these guys can get off the ground, I'm a guaranteed customer.

(no subject)

Date: 19/4/12 01:10 (UTC)
From: [identity profile] telemann.livejournal.com
Yep. Me too.

(no subject)

Date: 19/4/12 02:08 (UTC)
From: [identity profile] mrbogey.livejournal.com
You can get an encrypted VPN right now for a few shekels a month.

The internet is still pretty anonymous if you want it to be and don't raise too much of a ruckus.

And as my IP address proves, Hong Kong rocks...

(no subject)

Date: 19/4/12 02:10 (UTC)
From: [identity profile] mrbogey.livejournal.com
No.. no... Amsterdam rocks. Yea... and if you give me 10 seconds I can post from Paris...

(no subject)

Date: 19/4/12 05:10 (UTC)
From: [identity profile] dv8nation.livejournal.com
What service do you use?

(no subject)

Date: 19/4/12 02:39 (UTC)
From: [identity profile] telemann.livejournal.com
PGP for E-mail is great too. Won't work with G mail however.

(no subject)

Date: 19/4/12 03:08 (UTC)
From: [identity profile] telemann.livejournal.com
Yeah, I know. And the Chinese gov't wouldn't like Google either. Oh they don't already ;)
Edited Date: 19/4/12 03:08 (UTC)

(no subject)

Date: 19/4/12 05:12 (UTC)
From: [identity profile] dv8nation.livejournal.com
There's a demand for this so it was only a matter of time. More power to 'em.

(no subject)

Date: 19/4/12 05:31 (UTC)
From: [identity profile] rimpala.livejournal.com
Oh the government isn't going to like that...

(no subject)

Date: 19/4/12 11:23 (UTC)
From: [identity profile] rasilio.livejournal.com
I can smell the RICO charges cooking as we speak.

(no subject)

Date: 19/4/12 15:31 (UTC)
From: [identity profile] sophia-sadek.livejournal.com
I have more respect for the NSA than I do for the FBI. That is not just because I had a business relationship with the NSA for a while in the 1990s. They tend to have more smarts at their disposal. I recall an incident when some FBI technical officers were poking their noses into a testbed site of a secure networking product. One of them commented that there were only hackers at the site. Our engineers snickered at the fact that they were only able to pick up on the hackers.

As for secure cell service, it may be less expensive to use an insecure carrier with your own encryption techniques. This is the approach taken by al-Qaeda. Before the heat was turned up on them, they communicated freely over insecure lines using a simple set of code phrases. What is even more fun is to pretend to use code phrases over insecure lines merely to set off the monitoring alarms.

Let me shout out to all my homies: It doan stop, dawg. It jus doan stop.

(no subject)

Date: 21/4/12 14:35 (UTC)
From: [identity profile] brockulfsen.livejournal.com
Dude, the rubber bands are on their way airmail.

(no subject)

Date: 23/4/12 14:57 (UTC)
From: [identity profile] sophia-sadek.livejournal.com
I shall try to put them to good use.

Credits & Style Info

Talk Politics.

A place to discuss politics without egomaniacal mods

DAILY QUOTE:
"The NATO charter clearly says that any attack on a NATO member shall be treated, by all members, as an attack against all. So that means that, if we attack Greenland, we'll be obligated to go to war against ... ourselves! Gee, that's scary. You really don't want to go to war with the United States. They're insane!"

March 2026

M T W T F S S
       1
2345 678
910 1112 1314 15
1617 1819 202122
23242526272829
3031