The NYT's "Room for Debate" section asked a variety of people for positions on the UK's Great Firewall of Cameron -- a new rule whereby ISPs must slap an "adult content" filter on every Internet connection in the land, which is meant to stop everything from porn to gambling sites to "esoteric material" (whatever that is). I wrote one of the pieces, as did many others.
The companies that supply networked censorware turn a profit selling to dictatorships, like the United Arab Emirates, where network filters from American companies were used to suppress footage of a member of the royal family torturing a man and then running him over with a luxury car (the software also handily compiled a list of everyone who was trying to look at that video, which must have been useful for the secret police, whose boss was, coincidentally, the royal torturer caught in the video).
The companies repackage this software for use by Fortune 100 companies, libraries and schools, which must censor according to the terms of the Communications Decency Act – and now, for use by all of Britain's Internet service providers. In practice, the British law means shipping the nation's Internet traffic offshore for processing and surveillance by criminal regimes and their allies.
No one seriously pretends that this will stop kids who want to look at porn from finding it. But a regime of total, national surveillance in the name of protecting children serves an important political purpose. It satisfies the security syllogism: “Something must be done! I have done something. There now, something has been done.”
Can Free Speech and Internet Filters Co-Exist?
Most people don’t look at any news, or at one news site; using social media a lot (even without the intention of looking for news) means that sometimes you’ll end up clicking a news link — so heavy social media users, on average, are consuming a wider media diet than those who do not use […]
In 2012, Google introduced Certificate Transparency, an internet-wide tripwire system designed to catch cryptographic “certificate authorities” who abused their position to produce counterfeit credentials that would allow criminals, governments and police to spy on and tamper with secure internet connections.
Yesterday’s massive ransomware outbreak of a mutant, NSA-supercharged strain of the Petya malware is still spreading, but the malware’s author made a mere $10K off it and will likely not see a penny more, because Posteo, the German email provider the crook used for ransom payment negotiations, shut down their account.
Between election hacks, ransomware, and Devil’s Ivy, the cybersecurity space is booming as malware and hackers become more sophisticated. If you’re interested in pursuing a career in ethical hacking, or just want to secure your own devices, The Super-Sized Ethical Hacking Bundle is a great resource.In this bundle, you’ll learn the fundamental skills of ethical hacking, prepare […]
The TREBLAB X11 Earphones are versatile, offer great sound, and are currently $32.99 in the Boing Boing Store.These Bluetooth earbuds are a great workout companion. They’re totally sweat proof and their ear-fins keep them snugly in place during high activity — something that Apple’s AirPods can only do if you were blessed with precisely the […]
Whether you’re a seasoned entertainment industry veteran or a student working on your first spec script, having the right tool for the job will make a huge difference in your focus and productivity.Final Draft 10 is far and away the world’s best screenwriting software, used extensively by professional film and TV writers at top production […]