The Internet Engineering Task Force has published RFC 7258, which is a bombshell whose title is: "Pervasive Monitoring Is an Attack." It represents the outcome of a long argument about whether the Internet's technical architecture should take active countermeasures to fight mass surveillance, which Tim Bray summarizes. I especially like his rejoinder to people who argue against this because there are places where it's legitimate to monitor communications, like prisons: "We don't want an Internet optimized for prisons."
I and lots of others didn’t buy the objections. My own takes are: First, the document carefully steers clear of the motivations for pervasive monitoring, mostly because you can’t figure out what they are. Second, we don’t want an Internet optimized for prisons. Third, if your application doesn’t support privacy, that’s probably a bug in your application. Fourth, the cost of ignoring surveillance exceeds the cost of mitigating it. Finally, the state of Internet privacy suggests that the security people historically haven’t been mean enough.
Of course, if you were paranoid and suspicious, you might feel that some of the resistance is related to the facts that there are people making big money selling surveillance technology, and that other people think Ed Snowden is a traitor and it’s perfectly reasonable for the NSA to know everything about everyone, because if you’re not doing anything wrong why would you want privacy?
Pervasive Monitoring Is an Attack [Tim Bray]
RFC 7258 [IETF]
A new phishing attack hops from one Gmail account to the next by searching through compromised users’ previous emails for messages with attachments, then replies them from the compromised account, replacing the link to the attachment with a lookalike that sends you to a fake Google login page (they use some trickery to hide the […]
An anonymous editor from Crimethinc writes, “As 2017 opens, we face new challenges in an increasingly volatile world. Since last summer, we’ve been hard at work expanding our networks and updating our infrastructure to prepare for the global situation that is now unfolding. Over the next month, we’ll be announcing several ambitious new projects.”
danah boyd writes, “Yesterday, a group of us at Data & Society put out six essays on ‘media, technology, politics.’ Taken together, these pieces address different facets of the current public conversation surrounding propaganda, hate speech, and the US election. Although we only allude to specifics, we have been witnessing mis/disinformation campaigns for quite some […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]
One of the best ways to progress a career in project management is through earning recognized certifications. These certifications carry significant clout and don’t require expensive tuition or student loans. This Ultimate Project Management Certification Bundle is a great example of an affordable way to get ahead. It includes training for 9 certifications including PMP, […]
There’s nothing quite like the rush of playing against a real human opponent. But from a developer standpoint, creating fun multiplayer experiences is incredibly complex. Fortunately, the Unity3D game engine has made all aspects of game creation, including multiplayer functionality, as accessible as ever.This Unity Course Bundle introduces all of the necessary elements of creating […]