www.fgks.org   »   [go: up one dir, main page]

 WARNING: JavaScript is either disabled or not supported by your browser. You may encounter problems using various features on CircleID. 

Privacy

Blogs

Luddites of the 21St Century Unite?

In the past few weeks doom and gloom stories about the future were printed, discussed and opined in the press. The down and out of the message of futurists is that the middle class is going to be swept away in the coming years because of software and robotic solutions (from here on: automated processes), making humans redundant... Do Luddites of the 21st century need to rise? I want to look at the topic from a few angles. more»

Extreme Vulnerability at the Edge of the Internet - A Fresh New Universal Human-Rights Problem

By design, the Internet core is stupid, and the edge is smart. This design decision has enabled the Internet's wildcat growth, since without complexity the core can grow at the speed of demand. On the downside, the decision to put all smartness at the edge means we're at the mercy of scale when it comes to the quality of the Internet's aggregate traffic load. Not all device and software builders have the skills - and the quality assurance budgets - that something the size of the Internet deserves. more»

Playing the Long Game at the Internet Governance Poker Table

Poker players say if you can't spot the fish within your first 15 minutes at the table, you're the fish. With that in mind, I'm tempted to ask ICANN President Fadi Chehade who's the fish in the high-stakes game of global Internet governance we're now playing. In 2013, ICANN dramatically changed its course in the global Internet governance debate. For a decade ICANN largely stayed out of the game, allowing stakeholders to defend the multi-stakeholder model where private sector and civil society are on equal footing with governments. But in 2013 ICANN went on the offensive... more»

W3C/IAB "Strengthening the Internet" Workshop: Deadline Monday to Submit Position Papers

How can the open standards organizations of the IETF and W3C "strengthen the Internet" against large-scale pervasive monitoring? That is the topic up for discussion at the "Strengthening the Internet Against Pervasive Monitoring (STRINT)" workshop planned for February 28 and March 1, 2014, and jointly sponsored by the Internet Architecture Board (IAB) and the W3C. The workshop is by invitation-only and has a deadline of Monday, January 20, 2014 (by 11:59 UTC) for submission of either position papers or Internet drafts. more»

It's Time for Privacy Progress in ICANN

Privacy issues have been important to parts of the ICANN community for many years. I can attest to that fact as a long time veteran of Whois debates as far back as 1998 when I was with the U.S. Federal Trade Commission. However, they have started to receive the general ICANN community visibility only relatively recently. These efforts must continue in order to protect rights, to avoid increasing potential conflicts between ICANN rules and applicable laws, and to generally maintain trust in the Internet as a place to be. more»

Internet Governance Outlook 2014: Good News, Bad News, No News?

What does the crystal ball say for the Internet in 2014? Here are three scenarios for what could happen with the global Internet Governance Eco-System in the coming 12 months... In the worst case scenario the Internet gets more and more fragmented and re-nationalized. A growing number of governments start to define a "national Internet segment" and develop policies to surveil, censor and control access to and use of the Internet. National firewalls will separate the "domestic Internet" from the global Internet and an exit and entrance regime into networks is introduced where users need passwords, handed out by governmental authorities on an annual basis, to go from one domain to another... more»

From Wikileaks of 2012 to Snowden's NSA Leaks of 2013: Implications for Global Internet Governance

2012 will always be remembered as the Year of Wikileaks. Similarly, 2013 shall also be remembered as the year that Edward Snowden, a computer security specialist and former CIA employee and National Security Agency contractor, leaked classified information regarding the NSA global surveillance programs. Whilst Wikileaks was about US diplomatic cables, the Edward Snowden disclosure of classified NSA information to private media organizations such as the UK Guardian newspaper has had graver implications for global Internet privacy. more»

Canada's Anti-Spam Law Coming Into Force July 01, 2014

Canada's Anti-Spam Law, CASL, is now a done deal. Last Thursday, Treasury Board of Canada President (and champion of CASL) Tony Clement approved Industry Canada regulations in their final form. Today, Minister of Industry the Honourable James Moore announced CASL will come into force in July 1, 2014. more»

Telecoms As a Spying Tool

With more and more stories coming in from all over the world about the prolific use of telecommunications to spy on what people are doing, the ball has been thrown back into the industry's court, to do something about it. In principle, ever since telecoms came into existence in the 1850s spying was high on the agenda of the people who started to use the new technology. In 1865 countries formed the International Telecommunications Union (ITU). This later became the first institution under the UN and all countries in the world are a member. more»

2014 M3AAWG Mary Litynski Award Nominations Now Being Accepted

In 2010 the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) and the Internet industry as a whole lost a great friend and supporter, Mary Litynski. Her dedication, excellence, perseverance and tireless work behind the scenes of M3AAWG helped make the organization the success that it is today. Through this award, M3AAWG seeks to bring attention to the remarkable work that is done far from the public eye over a significant period of time... more»

Who Uses Google's Public DNS?

Much has been said about how Google uses the services they provide, including their mail service, their office productivity tools, file storage and similar services, as a means of gathering an accurate profile of each individual user of their services. The company has made a very successful business out of measuring users, and selling those metrics to advertisers. But can we measure Google as they undertake this activity? How many users avail themselves of their services? Perhaps that's a little ambitious at this stage, so maybe a slightly smaller scale may be better. Let's just look at one Google service. more»

We Have a Paradigm for Surveillance That's Broken, Fit Only for the Analogue Past

As each day brings new revelations about surveillance online, we are starting to see increasing activity in national legislatures intended either to establish more control over what the security services can do to their nationals (in countries like the US), or to limit access by foreign secret services to the personal information of their citizens (countries like Brazil). Unfortunately, neither of these approaches address the underlying problem: we have a paradigm for surveillance that's fit for the analogue past, not the digital present, let alone the future. more»

PRISM and the Administration State Strikes Back

It is a safe assumption that if you are reading this post, you like technology. If that is the case, then you understand the tremendous economic, cultural, and human rights benefits an open, universal, and free Internet provides. That freedom is under attack. And it is our responsibilities, as stakeholders in a successful Internet, to balance governments and have an open dialog on the topic. more»

Video: IETF Chair Jari Arkko on "Pervasive Monitoring and the Internet"

Today at the RIPE 67 event in Athens, Greece, IETF Chair Jari Arkko gave a presentation on "Pervasive Monitoring and the Internet" where he spoke about the ongoing surveillance issues and: What do we know? What are the implications? What can we do? Similar to his earlier article on the topic, Jari looked at the overall issues and spoke about how Internet technology should better support security and privacy. more»

The Boundary Between Sec. 230 Immunity and Liability: Jones v. Dirty World Entertainment Recordings

Out in the wilderness of cyberspace is a boundary, marking the limits of Sec. 230 immunity. On the one side roams interactive services hosting third party content immune from liability for that third party content. On the other sides is the frontier, where interactive content hosts and creators meet, merge, and become one. Here host and author blend, collaborating to give rise to new creations. more»

News Briefs

Turkish Parliament Approves Internet Bill, Lets Government Block Websites, Seize Personal Data

Canadian Government Used Airport Wi-Fi to Track Travellers, According to Leaked Snowden Documents

IETF Reaches Broad Consensus to Upgrade Internet Security Protocols Amid Pervasive Surveillance

IETF Looking at Technical Changes to Raise the Bar for Monitoring

Google DNS to Be Discontinued in Brazil Ahead of New Law

Brazil Pushing Plans for Local Internet Data Storage Amid U.S. Spying

Rally Organized by Coalition Against Mass Surveillance in Washington, DC

More Petition by Google for Greater Transparency

EU Politicians Call for Immediate Suspension of Data-Sharing Agreement Amid New NSA Allegations

Bruce Schneier: Government and Industry Have Betrayed the Internet, and Us

ISOC: Global Internet Community Must Unite to Support Open Internet Access, Freedom, and Privacy

Renowned Security Expert Bruce Schneier Joins EFF Board of Directors

ICANN Working Group Is Seeking Input on a Replacement for the Current WHOIS System

Google Asks U.S. Government to Allow Transparency for Its National Security Request Data

NSA Builds Its Biggest Data Farm Amidst Controversy

NSA PRISM Program Has Direct Access to Servers of Google, Skype, Yahoo and Others, Says Report

FBI Pushing Plans to Force Surveillance Backdoors on Social Networks, VoIP, and Email Providers

EFF: U.S. Cybersecurity Strategy Likely to Have Serious Implications for Canadians

Canadian Government Stepping Up on Internet Surveillance

European Commission Proposes "Right to be Forgotten" Internet Law

Most Viewed

Do Not Enter - It's XXX

Help! My Domain Name Has Been Hijacked!

Whois Privacy vs. Anonymity

Adult-Related TLDs Considered Dangerous

Examining Two Well-Known Attacks on VoIP

Most Commented

Conflict of Opinion

DPI is Not a Four-Letter Word!

Hunting Unicorns: Myths and Realities of the Net Neutrality Debate

Whither DNS?

The Anti-Phishing Consumer Protection Act of 2008