Hírek  

4chan adopts DMCA policy after nude celebrity photo postingsSite agrees to remove “bona fide” infringing material if asked.

via 4chan adopts DMCA policy after nude celebrity photo postings | Ars Technica.

As evidence mounts, it’s getting harder to defend Edward Snowden – Skating on Stilts.

The evidence is mounting that Edward Snowden and his journalist allies have helped al Qaeda improve their security against NSA surveillance. In May, Recorded Future, a predictive analytics web intelligence firm, published a persuasive timeline showing that Snowden’s revelations about NSA’s capabilities were followed quickly by a burst of new, robust encryption tools from al-Qaeda and its affiliates:

This is hardly a surprise for those who live in the real world. But it was an affront to Snowden’s defenders, who’ve long insisted that journalists handled the NSA leaks so responsibly that no one can identify any damage that they have caused.

In damage control mode, Snowden’s defenders first responded to the Recorded Future analysis by pooh-poohing the terrorists’ push for new encryption tools. Bruce Schneier declared that the change might actually hurt al Qaeda: “I think this will help US intelligence efforts. Cryptography is hard, and the odds that a home-brew encryption product is better than a well-studied open-source tool is slight.”

Schneier is usually smarter than this. In fact, the product al Qaeda had been recommending until the leaks, Mujahidin Secrets, probably did qualify as “home-brew encryption.” Indeed, Bruce Schneier dissed Mujahidin Secrets in 2008 on precisely that ground, saying “No one has explained why a terrorist would use this instead of PGP.”

But as a second Recorded Future post showed, the products that replaced Mujahidin Secrets relied heavily on open-source and proven encryption software. Indeed, one of them uses Schneier’s own, well-tested encryption algorithm, Twofish.

Faced with facts that contradicted his original defense of Snowden, Schneier was quick to offer a new reason why Snowden’s leaks and al Qaeda’s response to them still wouldn’t make any difference:

Whatever the reason, Schneier says, al-Qaida’s new encryption program won’t necessarily keep communications secret, and the only way to ensure that nothing gets picked up is to not send anything electronically. Osama bin Laden understood that. That’s why he ended up resorting to couriers.

Upgrading encryption software might mask communications for al-Qaida temporarily, but probably not for long, Schneier said….”It is relatively easy to find vulnerabilities in software,” he added. “This is why cybercriminals do so well stealing our credit cards. And it is also going to be why intelligence agencies are going to be able to break whatever software these al-Qaida operatives are using.”

So, if you were starting to think that Snowden and his band of journalist allies might actually be helping the terrorists, there’s no need to worry, according to Schneier, because all encryption software is so bad that NSA will still be able to break the terrorists’ communications and protect us. Oddly, though, that’s not what he says when he isn’t on the front lines with the Snowden Defense Corps. In a 2013 Guardian article entitled “NSA surveillance: A guide to staying secure,“ for example, he offers very different advice, quoting Snowden:

“Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”

Scheier acknowledges that hacking of communication endpoints can defeat even good encryption, but he’s got an answer for that, too:

Try to use public-domain encryption that has to be compatible with other implementations. …Since I started working with Snowden’s documents, I have been using GPGSilent CircleTailsOTRTrueCryptBleachBit, and a few other things I’m not going to write about.…

The NSA has turned the fabric of the internet into a vast surveillance platform, but they are not magical. They’re limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.

Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That’s how you can remain secure even in the face of the NSA.

It sounds as though al Qaeda took Bruce Schneier’s advice to heart, thanks to leaks from Edward Snowden — even if Schneier is still doing everything he can to avoid admitting it.

UPDATE: The description of Recorded Future was changed at the request of the company, which said, “While this may seem like splitting hairs, in the world of data analysis software “predictive analytics” has specific technical meaning which implies something different. We use the term web intelligence to reduce this confusion.”

A Dutch marketplace for second hand eBooks is being allowed to continue operating after the Amsterdam Court dismissed complaints from book publishers. The Court ruled that “Tom Kabinet” operates in a legal gray area which requires further investigation. Meanwhile the used eBook business is booming.

via Online Store Can Sell ‘Used’ Ebooks, Court Rules | TorrentFreak.

“It is clear from the TOR website that TOR is knowingly assisting websites such as Pinkmeth in committing torts against Texas resident, that the sole cause of action alleged against TOR herein conspiracy arises from its conduct in Texas and against Texas residents, and that assumption of jurisdiction by this court will not offend traditional notions of fair play and substantial justice.”

via Tor Sued Over Revenge Porn – Business Insider.

Austrian Tor Exit Node Operator Found Guilty As An Accomplice Because Someone Used His Node To Commit A crime

from the bad,-bad-news dept

Three years ago we wrote about how Austrian police had seized computers from someone running a Tor exit node. This kind of thing happens from time to time, but it appears that folks in Austria have taken it up a notch by… effectively now making it illegal to run a Tor exit node. According to the report, which was confirmed by the accused, the court found that running the node violated §12 of the Austrian penal code, which effectively says:

Not only the immediate perpetrator commits a criminal action, but also anyone who appoints someone to carry it out, or anyone who otherwise contributes to the completion of said criminal action.

In other words, it’s a form of accomplice liability for criminality. It’s pretty standard to name criminal accomplices liable for “aiding and abetting” the activities of others, but it’s a massive and incredibly dangerous stretch to argue that merely running a Tor exit node makes you an accomplice that “contributes to the completion” of a crime. Under this sort of thinking, Volkswagen would be liable if someone drove a VW as the getaway car in a bank robbery. It’s a very, very broad interpretation of accomplice liability, in a situation where it clearly does not make sense.

via Austrian Tor Exit Node Operator Found Guilty As An Accomplice Because Someone Used His Node To Commit A crime | Techdirt.

NSA: Linux Journal is an “extremist forum” and its readers get flagged for extra surveillance

 

A new story published on the German site Tagesschau and followed up by BoingBoing and DasErste.de has uncovered some shocking details about who the NSA targets for surveillance including visitors to Linux Journal itself.

While it has been revealed before that the NSA captures just about all Internet traffic for a short time, the Tagesschau story provides new details about how the NSA’s XKEYSCORE program decides which traffic to keep indefinitely. XKEYSCORE uses specific selectors to flag traffic, and the article reveals that Web searches for Tor and Tails–software I’ve covered here in Linux Journal that helps to protect a user’s anonymity and privacy on the Internet–are among the selectors that will flag you as “extremist” and targeted for further surveillance. If you just consider how many Linux Journal readers have read our Tor and Tails coverage in the magazine, that alone would flag quite a few innocent people as extremist.

While that is troubling in itself, even more troubling to readers on this site is that linuxjournal.com has been flagged as a selector! DasErste.de has published the relevant XKEYSCORE source code, and if you look closely at the rule definitions, you will see linuxjournal.com/content/linux* listed alongside Tails and Tor. According to an article on DasErste.de, the NSA considers Linux Journal an “extremist forum”. This means that merely looking for any Linux content on Linux Journal, not just content about anonymizing software or encryption, is considered suspicious and means your Internet traffic may be stored indefinitely.

 

via NSA: Linux Journal is an “extremist forum” and its readers get flagged for extra surveillance | Linux Journal.

A kiadókkal, forgalmazókkal és egyéb jogtulajdonosokkal ápolt viszonyuk amúgy érdekes. Mint mondják, rengeteg dolog szerepel a tiltott anyagok listáján. „Alapvetően mindenkivel megegyezünk, aki normális hangnemben közelít. A kamerás filmek sem csak azért lettek letiltva, mert lesújtóan szar minőségűek; hanem több filmforgalmazóval is megállapodtunk, hogy a dvd/bluray kiadásig várunk, így adva több esélyt a moziknak.” A legfrissebb olyan dolog, amit sokan keresnének, de nem találják az oldalon, a Watch Dogs című játék, amit egy ideig a magyar forgalmazó kérésére nem engednek majd feltölteni senkinek.A hivatalos indoklás szerint erre azért van szükség, hogy a játék kiadó

via Index – Tech – A rendőrök is tőlünk töltik le a filmeket.

The Law Library of Congress has digitized its collection of pre-1923 piracy trial. This historical collection of piracy trials is critical for understanding how the various nations of the world handled piracy issues before the year 1900. The full texts of these titles are available from the bibliography listed below.

via Piracy Trials | Law Library of Congress.

Against the Hypothesis of the End of Privacy

An Agent-Based Modelling Approach to Social Media

via Against the Hypothesis of the End of Privacy – An Agent-Based Modelling Approach to Social Media.

The Fourth RevolutionHow the Infosphere is Reshaping Human Reality

via The Fourth Revolution: Hardback: Luciano Floridi – Oxford University Press.

Older Posts »