background preloader

About Net-Neutrality...

Facebook Twitter

The Truth About 'Net Neutrality' FCC to Seize Entire Internet, Cable Spectrum Under 400-Page “Rules” FCC cherry picking existing laws for cable, radio & broadband to regulate Internet Kit Daniels Prison Planet.com March 13, 2015 The FCC is combining several separate sections of telecommunications law developed for radio, cable TV and broadband access for a regulatory takeover of the Internet and is enforcing it with the same rules and methods as the Justice Department, according to its 400-page report released Thursday. The agency is going to regulate the Internet like broadcast radio and television through a patchwork of telecommunications laws which were developed not only separately of each other but also in different decades.

“We ground the open Internet rules we adopt today in multiple sources of legal authority – Section 706, Title II and Title III of the Communications Act [of 1934],” page 120 of the 400-page FCC report states. A d v e r t i s e m e n t But what are these statues? [ad] In other words, the government, not the free market, makes the decisions over broadband access.

Dr. Federal Judge Rules You May Be Forced To Provide Decryption Password. In July, we wrote about an ongoing case wherein a woman accused of fraud was being asked by the prosecution to provide the password to access her computer’s data, which otherwise would remain encrypted and unreadable, weakening their case. They got permission to compel her to reveal the password, but the defense said that it was unconstitutional to do so, as providing that information was essentially self-incriminating testimony. The defense and the prosecution disagree, there is no single compelling precedent, and even the Supreme Court, which has weighed in on a similar topic, isn’t quite sure what to make of the situation. So, doing what Judges are made to do, Judge Robert Blackburn made a decision: “the Fifth Amendment is not implicated by requiring production of the unencrypted contents of the Toshiba Satellite M305 laptop computer.”

The question everybody is asking is not whether Ramona Fricosu will be convicted of fraud, but how access to data should be considered in a courtroom. News Republic. Selon 1 doc. interne des serv. secr techniques britanniques, la DGSE entretient une... Atlantico Thursday, March 20, 2014 12:39 PM GMT Selon un document interne des services secrets techniques britanniques (GCHQ), les services secrets français, la Direction générale de la sécurité extérieure (DGSE), entretiennent une coopération étroite avec "un opérateur de télécommunication français".

Selon le Monde, il s'agit de France Télécom-Orange. Selon le GCHQ, la DGSE et l'opérateur historique français travaillent ensemble pour améliorer les capacités nationales d'interception sur les réseaux de communication et collaborent pour casser les cryptages de données qui circulent dans les réseaux. Ainsi, France Télécom est un acteur important du système de surveillance en France. Cette note, extraite des archives de la NSA par son ex-consultant Edward Snowden, assure que la relation entre la DGSE et l'opérateur français constitue un atout majeur par rapport à ses homologues occidentaux. Cette collecte portant sur des données massives, touche aussi bien des Français que des étrangers. Your WhatsApp messages may not be private: Here’s how to secure them Tech2 Mobile. By Nikhil Subramaniam / 13 Mar 2014, 18:18 Thought your WhatsApp messages cannot be accessed remotely? Think again as one security expert has discovered a way to read WhatsApp messages off Android devices.

Security consultant Bas Bosschert said that it was possible for others to access users’ private WhatsApp chats through downloaded Android apps. Bosschert insists his method works even on the latest WhatsApp update for Android which adds privacy settings. However, as he says it’s only possible when WhatsApp is backing up your messages to the SD card. Bosschert published a proof of concept on his blog and explained the workings in detail. Despite WhatsApp using encryption to secure the message database, it’s possible to extract messages using easily-available online tools. “The WhatsAppp database is a SQLite3 database which can be converted to Excel for easier access. Related: #WhatsApp for Android #WhatsApp loophole #WhatsApp Messenger #WhatsApp security #WhatsApp vulnerability. FCC Chairman Sold Out The Internet. Creating a Two-Speed Internet. Net Neutrality. Dangers of a World Without Net Neutrality. Last month the FCC released its proposal for America’s new network neutrality rules.

Unfortunately, the agency’s proposal included rules that would permit Internet providers to prioritize certain websites, e.g., make deals with some services for a faster and better path to subscribers. While the FCC claims it is not endorsing such deals, the proposed rules will inevitably be read as exactly that. The parties most threatened by this kind of network discrimination are those who are trying to make novel and unanticipated uses of the network and who cannot afford payola.

But innovators need more than a level playing field – they need specific details about how Internet providers manage their networks so that they can figure out how best to maintain current offerings and develop new products. To see why, let’s fill in some blanks. In harm’s way Yet other forms of pay-for-play and general accessibility discrimination are equally important.

Learning from past Peering into the future. Network Neutrality Overview. OpenSSL: The Open Source toolkit for SSL/TLS. Your Interest in Privacy Will Ensure You're Targeted By The NSA. Have you ever wondered if you’re on an NSA observation list? Turns out that if you’ve even thought about it (or online privacy in general), you’re probably more likely to be on one. A few concerning news updates regarding mass surveillance by the NSA within the past week, including revelations from an analysis of the XKeyscore data collection system, have given us an idea of who might be among the NSA’s “targeted” individuals. Are You on the List? In previous documents, interviews, and other now-public materials, the NSA has stated that, while they can collect data from nearly anyone, they only target a small number of people who could be engaged in suspicious activity. Exactly what constitutes suspicious activity has never been very clear, but it’s safe to assume that anyone trying to get in touch with a terrorist organization, buy drugs online, or be in another way clearly intending to break the law, would be a target.

How Do We Know About XKeyscore? What Does This Mean For You? Facebook, trop c’est trop… “Si vous avez l’impression que vous êtes trop petit pour changer quelque chose, essayez donc de dormir avec un moustique. Vous verrez lequel des deux empêche l’autre de dormir” – Dalaï Lama Ce n’est peut-être pas encore votre cas, mais soyez patients, cela ne va pas tarder à vous arriver aussi. Voici mon amère expérience de ce matin sur Facebook. J’envoie un lien vidéo à un ami, facebook le considérant comme un spam a bloqué immédiatement mon compte car selon eux, un logiciel malveillant s’était installé sur mon ordinateur (en réalité, j’ai un bon antivirus, firewall et tout le package de sécurité à jour). Ma seule façon de revenir sur facebook était dès lors d’installer leur logiciel de protection.

Dans les conditions d’utilisation de cette extension Google Chrome, il est mentionné que le logiciel en question a le droit d’accéder à mes informations facebook, et surveiller ma navigation sur internet. M. M. Tous les sites et pages qui veulent participer à cette action sont les bienvenus. » The Plan to Kill the Internet Uncovered Alex Jones' Infowars: There's a war on for your mind! The Internet has emerged as the most empowering tool of individual freedom since the Gutenberg’s press, affording billions of people worldwide not only the tool of instant communication, but access to a wealth of liberating information, freedom from the chains of received consensus, and the opportunity to become their own media platform. This represents an ever increasing threat to the status quo of the elite, which is why the establishment is working feverishly to dismantle the freedom granted by the world wide web in its current form. 1) The Death of Net Neutrality The Federal Communications Commission (FCC) recently gave the green light for large Internet Service Providers to create a two-tier Internet system which would allow large corporations to buy up dedicated faster bandwidth, ending net neutrality and potentially leaving smaller websites in the dust.

“[S]maller companies that can’t afford to pay for faster delivery would likely face additional obstacles against bigger rivals. The Next Big Thing You Missed: A Would-Be Dropbox Meant to Thwart the NSA | Wired Business. BitTorrent was best known as an internet protocol that let people swap pirated movies and music at the expense of big Hollywood studios and record labels. But then came a Belarusian engineer named Konstantin Lissounov. About a year ago, Lissounov joined a hackathon sponsored by his employer, BitTorrent Inc., a company that seeks to transform the peer-to-peer protocol into a legitimate means of file-sharing for both consumers and businesses, and in a matter of hours, he slapped together a new BitTorrent tool that let him quickly and easily send encrypted photos of his three children across dodgy Eastern European network lines to the rest of his family.

The tool won first prize at the hackathon, and within a few more months, after Lissounov honed the tool alongside various other engineers, the company delivered BitTorrent Sync, a Dropbox-like service that lets you seamlessly synchronize files across computers and mobile devices. Comment se rendre invisible du réseau PRISM? La révélation par Edward Snowden des programmes américains de surveillance de l’internet et des communications a semé l’inquiétude chez certains internautes, y compris ceux qui n’ont pas de projets d’attentats ou de complots contre les Etats.

On connaît une liste de 9 firmes qui ont confirmé avoir collaboré avec la NSA dans le cadre de PRISM: Apple, Microsoft, Yahoo, Google, YouTube, Facebook, Skype, PalTalk et AOL. Sur cette base, un designer nommé Peng Zhong propose sur un site internet une série d’outils qui devraient aider les internautes soucieux de protéger leur vie privée à ne pas être espionné par les autorités américaines.

Ces outils ne peuvent pas avoir été développés par les 9 firmes qui collaborent avec la NSA. Selon Peng Zhong, si l’on veut échapper totalement à PRISM, il faut tout changer dans sa façon d’utiliser internet. En savoir plus sur BusinessInsider.com. Seven People Hold the Keys to Global Internet Security. The Guardian’s James Ball describes a Masonic-like meeting of the lords of the Internet in Los Angeles.

But “the reality is rather closer to ‘The Office’ than ‘The Matrix,’ ” he says. In a nondescript industrial estate in El Segundo, a boxy suburb in south-west Los Angeles just a mile or two from LAX international airport, 20 people wait in a windowless canteen for a ceremony to begin. Outside, the sun is shining on an unseasonably warm February day; inside, the only light comes from the glare of halogen bulbs. There is a strange mix of accents – predominantly American, but smatterings of Swedish, Russian, Spanish and Portuguese can be heard around the room, as men and women (but mostly men) chat over pepperoni pizza and 75-cent vending machine soda.

In the corner, an Asteroids arcade machine blares out tinny music and flashing lights. If you have trouble leaving a comment, review this help page. Still having problems? S | SQRL Secure Quick Reliable Login. The user experience: Wishing to login to an online service where an “SQRL” code appears nearby: Even though it is THAT simple, it is FARmore secure than any other login solution. (We'll define exactly what “far more secure” means, below.) What happened behind the scenes? Summarizing this for your next cocktail party: “The website's login presents a QR code containing the URL of its authentication service, plus a nonce. This simple and straightforward SQRL protocolyields a surprising array of features and benefits: Anonymous Identification & Authentication: SQRL ID: Visitors to a website are uniquely identified by an absolutely anonymous SQRL ID. SQRL IDs are both user AND site specific: Although the same user always presents the same ID to the same site, they present an entirely different ID to every other site they visit.

No annoying account creation: Suppose you wish to simply comment on a blog posting. Inherent Protection From Hackers: SQRL gives websites no secrets to keep. Yes. How the ‘John Oliver Effect’ Is Having a Real-Life Impact. Comedians mock our cultural and political institutions on TV all the time. But it’s not every day that a comic’s jokes crash a government website or directly inspire legislators to push for new laws. John Oliver, host of HBO comedy news program Last Week Tonight, is quickly building up that level of cultural cachet. While his forebears and former colleagues Stephen Colbert and Jon Stewart spend as much time lampooning the news media covering world events as they do analyzing events themselves, Oliver’s show stands out for its investigations into topics as varied as the militarization of the police state, Net neutrality and Argentina’s debt crisis.

Read more Feds Limit Law That Lets Cops Seize Your Stuff Oliver’s approach has even been cited as an inspiration for local government transparency. But the show has long caused real-world ripples. Ending Unfair Bail Requirements Eviscerating FIFA Crashing the FCC Over Net Neutrality Giving Back to Female Engineers Fox; Jamie McCarthy—Getty Images. Save the Internet! Article in globalresearch By Kevin Zeese and Margaret Flowers To ensure the Internet is open to all on an equal basis we must act now to prevent mega-corporations from destroying Internet Freedom Update: Actions every day starting on Wednesday, May 7th, at noon and 5 pm. To Save The Internet, we are building a People’s Firewall against the FCC’s proposed rule that will create a ‘pay to play’ Internet by ending net neutrality.

The FCC is located at 445 12th Street, SW, Washington, DC 20554. If we act NOW, we can ensure a free, open and equal Internet for the 21st Century. To ensure the Internet we want, we must take action today; and people need to plan to come to Washington, DC beginning next Wednesday to join in a series of escalating protests that will undermine the legitimacy of the FCC leadership and force them to pay attention to the public interest rather than the interests of mega-corporations. The FCC is being Driven off Track What Should Be Done? John Nichols writes in the Nation: Cell Storming - Media driven Mind Mapping, Brainstorming, and Idea Generation for the iPhone, iPod Touch and iPad. Cell Storming is a Brainstorming, Idea Generating, Mind Mapping App for your iPhone, iPod Touch, and iPad.

Use Cell Storming to develop your ideas by creating a network of cells to represent your thoughts as they come to you. Capture photos from your device camera or select from the camera roll to attach images to cells, or record a voice memo that can be played back simply when viewing your Cell Storming map. There is even a freehand drawing canvas if you want to quickly sketch a thought down. Attach text content, files (.PDF, .CSV, or .RTF) and web links to each cell so that your ideas can be explained in detail when you review them. Additional media options include videos recorded on your device and Address Book Contacts so you can relate people to tasks or resources in your cell map and contact them directly via the information presented. Cell maps can grow in any direction as you add more cells to represent your thoughts and ideas.

Crypto prof asked to remove NSA-related blog post. Is It the Dawn of the Encryption App? The Day We Fought Back By The Numbers. The Day We Fight Back: The Video. Open Mesh Project - Don't let governments shut down the Internet. Statement on Mozilla and the Importance of the Open Internetu. Republicans Look to Kill Net Neutrality, Hand the Web to Corporations. Five Things You Should Know to Keep the Man from Snooping on Your Digital Stuff.

Commotion : un nouvel Internet libre ? | Labo du web. Je n'ai rien à cacher. Why Privacy Matters Even if You Have 'Nothing to Hide'