Category Archives: work2

Misuse of data on the server side can be meaningfully prevented by devising user-controlled organizational processes…

… ensuring that:
-sw and hw actually running are those supppsed to be and have been audited extremely relative to conplexity
-access to servers require physical entrance in a hosting roon whose access is conditional to 5 randomly selected users acting as citizen-jury in guarantee of the legality AND constitutionality of access. The will be able to launch a scorched earth procedure with plausible deniability in case of forceful abise attempts.

The latter would protect from insider as well as state abuse, while maintaining access for constitutional intercept.

We are planning that at the User Verified Social Telematics project.

EFF Dir. on The Economist say the truth about the still very sorry state of crypto:”we might have a chance to protect everyone else who isn’t being targeted for surveillance”

http://www.economist.com/news/science-and-technology/21634993-alarm-some-lawmakers-scrambling-data-becomes-easy-encryption-turns?fsrc=scn/tw/te/pe/ed/cryptographyfordummies

“Rather, we might have a chance to protect everyone else who isn’t being targeted for surveillance,

In 2009 NSA top execs dissenters proposed a “system to quickly send queries to the telephone companies as needed”

http://bigstory.ap.org/article/acc54fc0c64c4c3eae29b8ac380cc065/ap-exclusive-snowden-debate-inside-nsa
“To address their concerns, the former senior official and other NSA dissenters in 2009 came up with a plan that tracks closely with the Obama proposal that the Senate failed to advance on Tuesday. The officials wanted the NSA to stop collecting the records, and instead fashion a system for the agency to quickly send queries to the telephone companies as needed, letting the companies store the records as they are required to do under telecommunications rules.”

With CivicRoom of the User Verified Social Telematics project, we’ve devised a system that would allow for such needed, legal and constitution function for criminal and national security investigations but in such a way that its constitutional would be under the citizen-jury like bodies controlled by the users, through extremely accountable service providing organizations.

We should consider if almost all free software ethical hackers, and their fan journos, over last 2 decades have been very “usefull idiots” for NSA

We should consider if almost all free software ethical hackers, and their fan journos, over last 2 decades have been very “useful idiots” for NSA, and similar, by unwillingly conveying a hugely false sense of security on the techs they have been providing.

That has had catastrophic consequences, allowing NSA and similar: (1) to spy on a ton of people sharing very valuable critical data via the Net which they wouldn’t have if they knew better, (2) to cry for “going dark”, and (3) to push for laws to outlaw access privacy.

Nov 27th 2014 UPDATE: I regret the choice of the term “useful idiots” which may be regarded as offensive, even though that is not its original meaning.

“Officials have expressed alarm for several years about the expansion of online communication services that — unlike traditional and cellular telephone communications — lack intercept capabilities because they are not required by law to build them in.”

says a US official in this Washington Post article.

“I do think that more and more they’ll see less and less,” said Albert Gidari Jr., a partner at the law firm Perkins Coie who represents tech firms, referring to the government’s quandary. “But it’s their own fault,” he added. “No one now believes they were ever going dark. It’s just that they had the lights off so you couldn’t see what they were collecting.”

The new “Anti-theft kill-switch” backdoor mandated by new law in CA is coming nation-wide.

The extension nation-wide of such California and Minnesota laws matches well the recurring proposals for giving ability to FBI to implant malware when court-mandated for lawful intercept or search & seizure.

The 2 laws attempt, ineffectively, tackle a genuine important problem of “going dark” while, of course, creating huge potential (certainty?!) for privacy abuse.
In fact, in order to stop criminals, the FBI should also be able to prevent non-compliant devices to be used on US soil or connect in any way to US.

Is there a way to prevent its abuse through state-regulated and/or citizen-controllled safeguards?

TOR exec dir:” I worry that by making turning encryption into a panacea, law enforcement and intelligence agencies will just lobby for weak encryption, backdoor access, or flat out make it illegal.”

http://blog.lewman.is/personal-thoughts-on-being-targeted-by-the-nsa

Sounds that the only solution may be to devise techs and services that reconcile ability to perform court-mandated intercept (search and seizure) and to provide meaningful privacy,  so that they would be made illegal ?
May as User Verified Social Telematics project?