(no subject)
18/4/12 19:33
The Calyx Institute has been getting a lot of press the past couple days. They have a new proposal for how the business of mobile phone and internet service providing should work: customer first, privacy paramount. CNet has a writeup here, and the basic business model is to encrypt all communications to the fullest extent and encrypt all ISP-local static storage (i.e. email accounts) so not even the ISP can access it, only the customer.
This will make everything more secure for the customer, obviously, but is also a part of several other practices within the ISP. Most major ISPs, such as AT&T and Verizon, pretty much automatically roll over for any government inquiry, regardless of how trivial, and have explicit backdoors built in to their networks for unfettered government access. Calyx plans to "challenge government surveillance demands of dubious legality or constitutionality". Spurious stuff, basically, not to mention requests that aren't accompanied by a court order. In addition, the practice of encrypting all ISP storage would make them literally unable to comply with such orders, as stipulated under the 1994 Communications Assistance for Law Enforcement Act.
Essentially, "Calyx will use all legal and technical means available to protect the privacy and integrity of user data" founder Nick Merrill says.
Given how much first and fifth amendment rights have been eroded under previous and current administrations, I see this as a positive reaction against repeated government encroachment. The Calyx proposals are legal now, but will the likes of the FBI and NSA stand for it without a fight?
(no subject)
Date: 19/4/12 01:03 (UTC)(no subject)
Date: 19/4/12 01:10 (UTC)(no subject)
Date: 19/4/12 02:08 (UTC)The internet is still pretty anonymous if you want it to be and don't raise too much of a ruckus.
And as my IP address proves, Hong Kong rocks...
(no subject)
Date: 19/4/12 02:10 (UTC)(no subject)
Date: 19/4/12 05:10 (UTC)(no subject)
Date: 19/4/12 02:39 (UTC)(no subject)
Date: 19/4/12 02:59 (UTC)(no subject)
Date: 19/4/12 03:08 (UTC)(no subject)
Date: 19/4/12 05:12 (UTC)(no subject)
Date: 19/4/12 05:31 (UTC)(no subject)
Date: 19/4/12 11:23 (UTC)(no subject)
Date: 19/4/12 15:31 (UTC)As for secure cell service, it may be less expensive to use an insecure carrier with your own encryption techniques. This is the approach taken by al-Qaeda. Before the heat was turned up on them, they communicated freely over insecure lines using a simple set of code phrases. What is even more fun is to pretend to use code phrases over insecure lines merely to set off the monitoring alarms.
Let me shout out to all my homies: It doan stop, dawg. It jus doan stop.
(no subject)
Date: 21/4/12 14:35 (UTC)(no subject)
Date: 23/4/12 14:57 (UTC)