security

Privacy and Surveillance Conference, UC Berkeley

The conference is hosted by the Data and Democracy Initiative at University of California at Berkeley.  Do let me know if you would like your work included as part of the dialogue. Event: Pan Optics: Perspectives on Digital Privacy & Surveillance March 6, 2014 11am-4:30pm Banatao Auditorium, Sutardja Dai Hall Presented by CITRIS, CITRIS Data […]

physical and virtual

In the words of Eric Schmidt, executive chairman at Google (paraphrased, I can’t find the original quote): “Identity will change from something that originates in the physical world and is being projected into the virtual world, to Identity that is created in the virtual and experienced in the physical world.” Coincidentally, there is this news […]

what paranoid networking physically looks like (and sounds like)

From a discussion about protecting yourself against most ‘black bag’ and ‘evil maid’ attacks. put distinctive scratches into all your peripherals, take a photo, and regularly check that the scratches are identical to the photo. This is how weapons inspectors ensure the seals protecting weapons caches have not been tampered with. The seals are scratched […]

Attacker model

Q: Is it possible to put security in place to protect against state surveillance? A: “You are not even aware of what is possible. The extent of their capabilities is horrifying. We can plant bugs in machines. Once you go on the network, I can identify your machine. You will never be safe whatever protections […]

Encryption

A basic tool for free speech: learn how to use email encryption.  Mac and Windows versions are here; the mothership is for Linux. It couldn’t be easier, the end-user versions come with great instructions. Send me something good! Here’s my public key for sievers@khm.de (actually those tools above will find it for you automatically). http://khm.de/~sievers/D457B050.asc  […]

understanding computers?

“…our inability to describe and understand technological infrastructure reduces our critical reach, leaving us both disempowered and, quite often, vulnerable.” James Bridle “Again it comes back to infrastructure and how our inability to describe and understand reduces our critical reach, leaving us both disempowered and, quite often, vulnerable. Opacity is an important word here too, […]

Bruce Schneier braindump: "Internet and Power"

The always excellent Bruce Schneier (who coined the term “security theater”) in a talk at Harvard’s Berkman Center (video and transcript). About the Internet and Power,  and technological advances that set into motion events no could can possibly predict. In his own words: What I’ve Been Thinking About I have been thinking about the Internet and power: how the […]

"stay alert"

You would think they don’t really need these kinds of appeals any more… NYC’s ‘Ring of Steel’ is one of the most integrated “full spectrum, military grade” surveillance networks. Cryptome.org / Natsios-Voir-Dire.pdf (local mirror) Documentary on NYC’s Ring of Steel pt 2: Central Command