background preloader

Re: Doctorow Books / InfoSec / InfoFreedom

Facebook Twitter

Internet privacy. Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third-parties, and displaying of information pertaining to oneself via the Internet. Internet privacy is a subset of computer privacy. Privacy concerns have been articulated from the beginnings of large scale computer sharing.[1] Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual.

Some experts such as Steve Rambam, a private investigator specializing in Internet privacy cases, believe that privacy no longer exists; saying, "Privacy is dead – get over it".[2] In fact, it has been suggested that the "appeal of online services is to broadcast personal information on purpose Levels of privacy[edit] People with only a casual concern for Internet privacy need not achieve total anonymity. Risks to Internet privacy[edit] Hacktivism. Overview[edit] Hacktivist activities span many political ideals and issues.

Freenet is a prime example of translating political thought (anyone should be able to speak) into code. Hacktivism is a controversial term with several meanings. The sense discussed in this article is closest to cyberterrorism. Controversy[edit] While some self-described hacktivists have engaged in DoS attacks, critics suggest that DoS attacks are an attack on free speech that they have unintended consequences. Forms of hacktivism[edit] In order to carry out their operations, hacktivists might create new tools; or integrate or use a variety of software tools readily available on the Internet. Notable hacktivist events[edit] The earliest known instance of hacktivism as documented by Julian Assange is as follows:[15]Hacktivism is at least as old as October 1989 when DOE, HEPNET and SPAN (NASA) connected VMS machines world wide were penetrated by the anti-nuclear WANK worm. [...]

Related notions[edit] Civic hacking Other. Crypto-anarchism. Described by Vernor Vinge, crypto-anarchy is more specifically anarcho-capitalist, employing cryptography to enable individuals to make consensual economic arrangements and to transcend national boundaries. Etymology[edit] The "crypto" in crypto-anarchism should not be confused with the use of the prefix "crypto-" to indicate an ideology or system with an intentionally concealed or obfuscated "true nature". For example, some would use the term "crypto-fascist" to describe an individual or organization that holds fascist views and subscribes to fascist doctrine but conceals their agenda so long as these doctrines remain socially unacceptable. However, Timothy C. Motives[edit] Also, the technical challenge in developing these cryptographic systems is tremendous, which interests some programmers into joining the projects.

Cryptography and law[edit] Plausible deniability[edit] Crypto-anarchism relies heavily on plausible deniability to avoid censorship. Anonymous trading[edit] See also[edit] Free Haven. From their webpage: The Free Haven Project aims to deploy a system for distributed, anonymous, persistent data storage which is robust against attempts by powerful adversaries to find and destroy any stored data. Cory Doctorow’s craphound.com » News.

Cory Doctorow. Cory Efram Doctorow (/ˈkɒri ˈdɒktəroʊ/; born July 17, 1971) is a Canadian-British[1] blogger, journalist, and science fiction author who serves as co-editor of the blog Boing Boing. He is an activist in favour of liberalising copyright laws and a proponent of the Creative Commons organization, using some of their licenses for his books. Some common themes of his work include digital rights management, file sharing, and post-scarcity economics.[2][3][4] Life and career[edit] Doctorow, a member of the Open Rights Group's Advisory Council speaks about how he got involved in digital rights.

Doctorow later relocated to London and worked as European Affairs Coordinator for the Electronic Frontier Foundation for four years,[2] helping to establish the Open Rights Group, before leaving the EFF to pursue writing full-time in January 2006. Other work and fellowships[edit] He served as Canadian Regional Director of the Science Fiction and Fantasy Writers of America in 1999. Fiction[edit] Awards[edit] Tor Browser Bundle. Tor Network[edit] Tor works by routing Internet traffic through several "onion" servers, obscuring the originating address. This naturally provides anonymity for other Internet programs that are configured to connect to it on the system, or even network.

Applications can be directed to the Tor network through a SOCKS proxy at localhost on port 9050 as well as a HTTP proxy at localhost on port 8118. This port can be changed via the torrc configuration file in the Tor section of the program. Reading the Tor documentation is highly recommended to prevent configuration mistakes that could compromise the user's anonymity. See also[edit] References[edit] External links[edit] Official website. Tor (anonymity network) Tor (previously an acronym for The Onion Router)[4] is free software for enabling online anonymity and censorship resistance.

Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays[5] to conceal a user's location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including "visits to Web sites, online posts, instant messages, and other communication forms", back to the user[6] and is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential business by keeping their internet activities from being monitored. An extract of a Top Secret appraisal by the NSA characterized Tor as "the King of high secure, low latency Internet anonymity" with "no contenders for the throne in waiting".[7] Alice's Tor client picks a random path to destination server Steven J. OpenNet Initiative. The OpenNet Initiative (ONI) is a joint project whose goal is to monitor and report on internet filtering and surveillance practices by nations.

The project employs a number of technical means, as well as an international network of investigators, to determine the extent and nature of government-run internet filtering programs. Participating academic institutions include the Citizen Lab at the Munk Centre for International Studies, University of Toronto; Berkman Center for Internet & Society at Harvard Law School; the Oxford Internet Institute (OII) at University of Oxford; and, The SecDev Group, which took over from the Advanced Network Research Group at the Cambridge Security Programme, University of Cambridge. Methods[edit] ONI uses several methods to test and document internet censorship in a country.

ONI Principal Investigators[edit] The ONI principal investigators are:[1] Major Accomplishments[edit] ONI Asia[edit] Psiphon[edit] Censorship research reports[edit] Books[edit] See also[edit] Libertarianism. Traditionally, libertarianism was a term for a form of left-wing politics; such left-libertarian ideologies seek to abolish capitalism and private ownership of the means of production, or else to restrict their purview or effects, in favor of common or cooperative ownership and management, viewing private property as a barrier to freedom and liberty.[6][7][8][9] In the United States, modern right-libertarian ideologies, such as minarchism and anarcho-capitalism, co-opted the term in the mid-20th century to instead advocate laissez-faire capitalism and strong private property rights, such as in land, infrastructure, and natural resources.[10][11][12] Etymology[edit] The 17 August 1860 edition of Le Libertaire: Journal du Mouvement Social, a libertarian communist publication in New York In the mid-1890s, Sébastien Faure began publishing a new Le Libertaire while France's Third Republic enacted the lois scélérates ("villainous laws"), which banned anarchist publications in France.

OpenNet Initiative.