background preloader

Open Mesh Project - Don't let governments shut down the Internet

Open Mesh Project - Don't let governments shut down the Internet
Related:  About Net-Neutrality...

s | SQRL Secure Quick Reliable Login The user experience: Wishing to login to an online service where an “SQRL” code appears nearby: Even though it is THAT simple, it is FARmore secure than any other login solution. What happened behind the scenes? Summarizing this for your next cocktail party: “The website's login presents a QR code containing the URL of its authentication service, plus a nonce. This simple and straightforward SQRL protocolyields a surprising array of features and benefits: Anonymous Identification & Authentication: SQRL ID: Visitors to a website are uniquely identified by an absolutely anonymous SQRL ID. SQRL IDs are both user AND site specific: Although the same user always presents the same ID to the same site, they present an entirely different ID to every other site they visit. No annoying account creation: Suppose you wish to simply comment on a blog posting. An important note about anonymity: To be clear, virtually nothing else about the use of the Internet is securely anonymous. Hold on a second . . .

Le blog de Pierre Rabhi Un arbre unique et solitaire fait offrande de ses ramures au ciel incandescent. Nul ne sait par quel stratagème il a, dès son enfance, échappé à la main prédatrice de l’homme armé de fer, à la dent avide de l’animal famélique, à la rareté de l’eau et au dard du soleil plus que nulle part au sommet de son ardeur. Alentour est le désert infini submergé de silence séculaire parfois troublé par la rumeur lointaine de troupeaux évanescents allant sur les dunes et les immenses plateaux ensemencés de rocailles. Ici, l’espace et le temps sont confondus l’un par l’autre tenus, et n’ont d’autre mesure que la démesure de l’éternité. Dans cette vastitude lunaire librement parcourue de bise en février ou de vent en ouragan de sable, rugissant d’une fureur dont on ne sait la raison, l’arbre demeure en patience témoin superbe et pathétique d’un temps révolu. En m’approchant de la colline où il se tient en vigile de silence, il grandit à mes yeux. Des battements sourds se font entendre.

How Long Before VPNs Become Illegal? Across the world initiatives are appearing with an aim to increase Internet monitoring. In the U.S. file-sharers will soon be monitored and reported on behalf of the MPAA and RIAA, and in the UK there are plans to monitor and store all Internet communications. Countering this increased surveillance people are turning en masse to VPN services to ensure their privacy. This begs the question; how long before VPNs become illegal? In the coming decade there will be an avalanche of initiatives to regulate and monitor the Internet. The freedom, privacy and relative anonymity that people experience today will only be short-lived if the copyright lobby and intelligence agencies have their way. In the U.S. there is CISPA, a bill that would put an end to people’s privacy on the Internet by allowing companies to spy on Internet users. In the U.K. there are similar developments. A scary prospect for many, but as always there are plenty of ways to circumvent these spying efforts. But for how long?

The Day We Fought Back By The Numbers Thanks to everyone who participated on Tuesday. Together we demonstrated that activists, organizations, and companies can work in unison to fight mass surveillance, and laid a foundation for escalation over months to come. Below are some numbers that quantify how we did* on Tuesday. * The figures below represent a lower bound - at least tens of thousands of people took action independently and using tools on other sites. Révolte Numérique Dropbox Bans BitTorrent Startup Boxopus Over Piracy Concerns Dropbox has banned the new BitTorrent startup Boxopus from accessing its API. The company fears that BitTorrent's piracy stigma may rub off on the successful cloud storage service. The Boxopus team is disappointed by this anti-innovation move. Thousands of dollars in developments costs have gone down the drain for what they believe is an irrational fear imposed by a growing copyright lobby. On Saturday we covered Boxopus, a new startup that allows people to download torrents directly to their dropbox folders. The news was quickly picked up by many other technology sites and as a result the service’s member count surged to more than 50,000. However, where most reviews heralded the usefulness of the service, Dropbox sees it as a threat. Although Boxopus is a neutral technology, BitTorrent’s piracy stigma is something Dropbox wants to stay far away from. A few hours ago the Boxopus team received the following email from one of Dropbox’s engineers (emphasis added):

The Day We Fight Back: The Video websites so far. days hours minutes seconds left. Une armée de justiciers :: Pièces et Main d'Oeuvre-Mozilla Firefox Pendant plus de deux siècles, la révolte des ouvriers luddites a été diffamée, enfouie, refoulée par les historiens de toutes les écoles. En 1963, Edward P. Thompson, historien communiste – mais libre d’esprit – produit dans son livre The Making of the English Working Class (1) un chapitre d’épopée, « Une armée de justiciers », qui fait mieux que réhabiliter les luddites. Trente ans avant Marx et le Manifeste du Parti Communiste (1847), ces derniers critiquent en actes la dissociation entre moyens de production et rapports de production. Depuis ce livre pionnier, des études sur les luddites se multiplient. Le voici. Pièces et Main d’œuvre & Black Star (s)éditions Pour découvrir l’histoire des luddites en France, on se reportera au livre paru aux éditions L’Echappée en novembre 2010 : Les luddites en France - Résistances à l’industrialisation et à l’informatisation (collectif, coordonné par Cédric Biagini et Guillaume Carnino). (1) Editions Victor Gollancz.

RIAA: ISPs to implement anti-piracy measures by July 12 Internet service providers are set to launch a new anti-piracy scheme this summer designed to alert and eventually punish suspected copyright infringers. The new policy was unveiled last year when top ISPs including Cablevision, Comcast, Time Warner Cable and Verizon announced their participation in a "graduated response" program to deal with illegal file sharing, bowing to pressure from the RIAA and MPAA with help from the U.S. government. In a panel discussion in front of some of the biggest U.S. publishers yesterday, the head of the RIAA Cary Sherman announced that the policies will come into effect July 12th. Under the program ISPs will be required to monitor their users' online activities for illegal file sharing. Those caught downloading copyrighted materials would receive a series of escalating warnings, starting with one or two "educational notices" informing users that what they're doing is illegal and asking them to stop.

Statement on Mozilla and the Importance of the Open Internetu We support the Mozilla community and the vital work they've done—and must keep doing—for the open Internet. EFF has been following the discussions around the choice of Brendan Eich as Mozilla’s CEO, including the announcement that he is stepping down. As partners to Mozilla in campaigns that have included the fight against SOPA/PIPA, the StopWatching.US Coalition against mass surveillance, the effort to Encrypt the Web, the battle to prevent non-consensual online tracking, and ongoing work to make Firefox a more secure browser, we appreciate the frank and honest discussion that the community has undergone over this issue and respect the openness of the process. We believe that what Mozilla stands for—building and supporting an open Internet that gives users freedom to communicate, innovate, and stay safe and secure—is a job that few other institutions are in a place to pursue. As David Clark said long ago, the Internet runs best on "rough consensus and running code."

L?art de la fuite. La philosophie politique de Julian Assange par lui-m?me. A titre de document et de contribution au débat, publie un texte écrit par Julien Assange en 2006, au moment de la fondation de Wikileaks. Ce texte théorique éclaire rétrospectivement sa visée stratégique. Contrairement à ce qu’une lecture hâtive peut laisser penser, ce qui est proposé ici n’est pas tant une théorie du complot - du moins pas sous la forme classique de la dénonciation paranoïaque - qu’un usage heuristique du modèle organisationnel de la conspiration : un réseau de pouvoir dont on peut tracer la carte. Assange est un hacker. S’il modélise la structure d’un pouvoir, c’est pour en découvrir les failles. Il se peut que vous lisiez ou , un texte d’orientation obscur, à peu près inutile tiré de son contexte, et peut-être même dès le départ. Plus une organisation est secrète ou injuste, plus des fuites vont entraîner de la peur et de la paranoïa dans son leadership et dans la coterie qui le dirige. {*style:<b> « La sécurité cède le pas à la conspiration ». ( , acte 2, sc. 3.

Google Claims Another Wi-Spy “Mistake” After Breaking Promise | Inside Google Google admitted Friday to the British data protection authorities that it failed to keep its promise to destroy data its Street View cars sucked up from private Wi-Fi networks. True to its form throughout out the Wi-Spy scandal, the Internet giant claimed it was all a mistake. “Google apologizes for its error,” wrote Peter Fleischer, Google’s Global Privacy Counsel (an oxymoron of a title by the way) in a letter to Steve Eckersley, Head of Enforcement for the Information Commission’s Office. Why am I not surprised? Here is how Fleischer put it: “In recent months, Google has been reviewing its handling of Street View disks and undertaking a comprehensive manual review of our Street View disk inventory. Let’s review what happened with the Wi-Spy scandal. When the Germans asked what was going on back in 2010, Google said its cars were only mapping the location of Wi-Fi networks. Ireland’s deputy commissioner for data protection, Gary Davis, called Google’s failure “clearly unacceptable.”

News Republic. Selon 1 doc. interne des serv. secr techniques britanniques, la DGSE entretient une... Atlantico Thursday, March 20, 2014 12:39 PM GMT Selon un document interne des services secrets techniques britanniques (GCHQ), les services secrets français, la Direction générale de la sécurité extérieure (DGSE), entretiennent une coopération étroite avec "un opérateur de télécommunication français". Selon le Monde, il s'agit de France Télécom-Orange. Selon le GCHQ, la DGSE et l'opérateur historique français travaillent ensemble pour améliorer les capacités nationales d'interception sur les réseaux de communication et collaborent pour casser les cryptages de données qui circulent dans les réseaux. Cette collecte portant sur des données massives, touche aussi bien des Français que des étrangers. "Le rapport entre France Télécom et la DGSE n'est pas de même nature que celui révélé dans le programme Prism de la NSA, qui a des liens contractuels avec les géants d'Internet, a expliqué un ancien chef de service de renseignement français.

Federal Judge Rules You May Be Forced To Provide Decryption Password In July, we wrote about an ongoing case wherein a woman accused of fraud was being asked by the prosecution to provide the password to access her computer’s data, which otherwise would remain encrypted and unreadable, weakening their case. They got permission to compel her to reveal the password, but the defense said that it was unconstitutional to do so, as providing that information was essentially self-incriminating testimony. The defense and the prosecution disagree, there is no single compelling precedent, and even the Supreme Court, which has weighed in on a similar topic, isn’t quite sure what to make of the situation. His opinion, which is embedded at the end of the post, is not a poorly informed or foolish one (like some inevitably are in tech), though it isn’t very transparent. The question everybody is asking is not whether Ramona Fricosu will be convicted of fraud, but how access to data should be considered in a courtroom.

Related: