Pentagon Papers whistleblower (and our co-founder) Daniel Ellsberg held an expansive, seven-hour long Reddit “Ask Me Anything” session yesterday to explain why NSA whistleblower Edward Snowden will join our board of directors. He also discussed many other subjects—including NSA surveillance, President Obama’s flip-flop on whistleblowers, Nixon’s dirty tricks, and the dangers of excessive government secrecy.
Below are some of our favorite questions and answers. But make sure to read the last remarkable exchange, in which Mr. Ellsberg finds out—for the first time—that the Nixon administration had surveillance of him from before the Pentagon Papers were leaked.
Read the rest
KQED created this video of the 2013 Science Hack Day San Francisco organized by BB pal Ariel Waldman! More than 200 people -- makers, scientists, artists, designers, etc. -- spent the night at the California Academy of Sciences and hacked on a fantastically diverse and compelling assortment of prototypes, demos, and experiments. Ariel says "Here's how you can organize a Science Hack Day in your own city!"
Facebook and Microsoft released some information about the scope of secret orders with which each company has complied.
Google said Friday it is "negotiating with the government and that the sticking point was whether it could only publish a combined figure for all requests," adding that this would be "a step back for users," because it "already breaks out criminal requests and National Security Letters, another type of intelligence inquiry."
Edgertor says: "No list of hacker movies i've found includes this one from 1971, it might also be the earliest!"
A prank that starts with a group of college students creating a fictitious person so they can get a credit card develops into a plot that leaves three of them dead.
With Dean Stockwell and Stephanie Powers! I can't wait to watch it as soon as I'm finished with my hard day of posting links here at the Boing Boing headquarters.
Designer and theorist Edward Tufte was a friend and mentor of Aaron Swartz's. At Saturday's memorial to Aaron at the Cooper Union in NYC, Tufte remembered both Aaron and his own hacking career, inventing "blue boxes" and using them to make illegal calls on AT&T's network, and wondered about what would have become of him had he run into the same prosecutorial zeal as Aaron faced. Here's a quote from Dan Nguyen's transcript of the Livestream video feed:
…[Bowen] then became president of the Mellon Foundation and he had retired from the Mellon foundation. But he was asked by he foundation to handle the problem of JSTOR and Aaron.
So I wrote Bill Bowen an email about it. And I said first that Aaron is a treasure. And then I told a personal story about how I had done some illegal hacking as a student and had been caught at it and what happened.
In 1962, my housemate and I invented the first blue box. That’s a device that allows for free, undetectable, unbillable long-distance telephone calls.
And we got this up. And played around with it and at the end of our research came when we completed was what we thought was the longest long distance phone call ever made, which was from Palo Alto to New York time of day, via Hawaii.
Dawn is breaking over last day of the annual Chaos Communication Congress in Hamburg, Germany. CCC is the meeting of the Chaos Computer Club (also CCC), a group of German hackers hanging out together since 1981.Read the rest
Adrian Chen at Gawker has a must-read profile on Weev: so-called "iPad hacker," founder of the anti-blogging Internet-trolling organization "Gay Nigger Association of America," and born-again Mormon troll. Snip:
For Auernheimer, the AT&T breach was one of his finest works as a troll. He personally didn't hack anything—the program used to collect the email addresses was written by Spitler—except the media. He was the hype man for Goatse, and he claims blew the breach up far beyond its actual significance. "The bug that I'm indicted over isn't a big deal," he says. "What made it big is the way I presented it." He boils down his success at promoting the AT&T job to three bullet points: "Rhetoric, persuasion, and meme reference."
But was collecting the email addresses actually a crime? "If somebody mistakenly puts information out there on the web and somebody mistakenly gets that information, that's not illegal," says Jennifer Granick, a lawyer and the director of the Center for Internet and Society at Stanford. This is why Auernheimer decided to fight his charges instead of take a plea deal, as Spitler did last year.
"I contend there is no crime in telling the truth or using AT&T's, or anybody's, publicly accessible data, to cite it to talk about how they made people's data public," he told CNET.
Auernhemier's jury disagreed.
AdTrap is a planned $150 firewall box for consumers. Plugged in between your internet connection and router, it strips the web of advertising without requiring a moment's configuration. Unlike browser-based plugins, it covers the whole pipe rather than a single app: every device in the house managed from a single setup screen.
It's open-source and hackable, too, but the moral hazard with these concepts is always the same: the more successful they are in becoming a de facto middle-man between readers and publishers, the greater will be their incentive to research their way to concluding that you like some advertising after all.
Rumor de asilo a Assange es falso. Todavía no hay ninguna decisión al respecto. Espero informe de Cancillería.— Rafael Correa (@MashiRafael) August 14, 2012
A couple weeks ago, a few hundred Dropbox users noticed they were receiving loads of spam about online casinos and gambling websites, at email addresses those users had set up only for Dropbox-related actions. The online file storage service now admits that hackers snagged usernames and passwords from third party sites, and used this data to break into those Dropbox users' accounts. Dara Kerr, reporting for CNET:
"Our investigation found that usernames and passwords recently stolen from other websites were used to sign in to a small number of Dropbox accounts. We've contacted these users and have helped them protect their accounts," the company wrote in a blog post today. "A stolen password was also used to access an employee Dropbox account containing a project document with user email addresses. We believe this improper access is what led to the spam."
Over at Ars Technica, Jon Brodkin has more. Evidently, the illicit access happened because a Dropbox employee’s account was hacked.