Archive for 2011/01/30
Assange, according to the AFP, claims that the Norwegian newspaper Afterposten is a “media partner’ of WikiLeaks. That, according to the newspaper editors, is categorically untruePosted: 2011/01/30 in Education / Awareness
“According to our information, Julian assange is, to put it mildly, not very pleased that Afterposten, too, has obtained … the U.S. diplomatic cables from a source,’ the paper’s chief editor wrote earlier this month, according to AFP.
This isn’t the first time Assange has been beaten at his own game.
After Cablegate, Wikileaks got very powerful. Julian’s declarations about future leaks influence markets and government policies. While it becomes a power, shouldn’t WL create a mechanism of accountability by the public opinion?
The flaw in Anonymous’s argument is that when one elects to take part in a demonstration, one accepts the legal consequences. If the demonstration is a perfectly legal street march, no consequences (should) ensue. But if it’s a sit-in that disrupts a business or traffic, one is liable to being physically handled or arrested. Plainly DDOS attacks are closer to the latter than the formerPosted: 2011/01/30 in Cybercrime, Education / Awareness, Organized Crime
This is the basic social contract around the rule of law for protestors: individuals don’t get to pick and choose which laws they are bound by and which they aren’t, even if their goal is to change the law or expose injustice. Whether someone who participated in a DDOS attack knew they were exposing themselves to arrest or not (bearing in mind the most widely-used DDOS tool, Low Orbit Ion Cannon, does nothing to hide your IP address), they face the consequences of that social contract: DDOSing is illegal.
Dutch web magazine Tweakers.net is reporting that mobile operator T-Mobile is doing research to find out whether it can block heavy data traffic such as uploading pictures or video conferencing via Skype to guarantee functionality of text messaging and Twitter services during peak traffic and during concerts or other events where tens of thousands want to use a limited number of antennae. “Smartphones are treating data in a different way,” T-Mobile spokesperson Priscilla Tomasoa argues, “so we are looking for different ways to manage traffic”. The provider does not know whether the system they’re looking at will actually be implemented.
T-Mobile already uses technologies such as Cell_PCH aka Network Controlled Fast Dormancy (by Nokia-Siemens) to manage the data traffic burden by having data connections enter ‘sleep mode’ whenever they’re not being used. That already saves 30 percent of data traffic.
Dutch web magazine Tweakers.net suggests that Belgian Internet Service Provider Belgacom could have blocked the website http://bgcmap.narod.ru/ without a court order, at least temporarily…until internet users reported it to the media.
The website provides information about technical facilities such as local exhanges, local distribution centres and local street cabinets all belonging to Belgacom.
The site turned out to be inaccessible last week on both the networks of Belgacom and its mobile branch Proximus unless the internet users would go and use a proxy server to circumvent the blockade. Customers of other providers could easily access the website.
Traceroute information would stall at Belgacom’s servers which led to the conclusion that it wasn’t a DNS blockade but a blockade of a specific website. One commenter argued that Belgacom would not go and block a site without a court order.
At first Belgacom was not able to quickly provide comments over the weekend but now the provider states:
The information about the street cabinets has been stolen. Belgacom did have a court order. The information is no longer accurate.Meanwhile internet users report that the site is accessible again. Probably due to the fact that another user had copied the stolen data and uploaded it to Google Maps. Secondly, the source code of the website itself has been copied and made available online. This renders any blocking activity useless.
Behold: PirateBox. PirateBox is a self-contained mobile collaboration and file sharing device. Simply turn it on to transform any space into a free and open file sharing networkPosted: 2011/01/30 in Education / Awareness, Future Developments?
Share Freely Inspired by pirate radio and the free culture movements, PirateBox utilizes Free, Libre and Open Source software (FLOSS) to create mobile wireless file sharing networks where users can anonymously share images, video, audio, documents, and other digital content.
Online file-sharers disheartened at the news that Google has begun censoring peer-to-peer search terms can now take their data into the real world with the PirateBox, a lunchbox-sized device created by David Darts, a professor of art and technology at NYU Steinhardt.
If you fancy making your own PirateBox, Darts provides instructions for building one at a cost of around $100. It’s not the first time file-sharing has entered the real world though – last year artist Aram Bartholl installed USB sticks in walls and buildings around New York to create a series of digital dead drops.
China is planning to introduce a blacklist system for websites charged with online piracy of films and TV series as part of a major effort to better protect copyrightPosted: 2011/01/30 in Education / Awareness, Enforcement, Illegal File Sharing, Public Policy
PhD student Robert Layton and researcher Prof Paul Watters, of Ballarat University’s Internet Commerce Security Laboratory (ICSL), wrote a program that can track illegal downloads through torrent websitesPosted: 2011/01/30 in Education / Awareness, Illegal File Sharing, New Business Models, Tech Evolution
The program maps the extent of criminal activity and copyright infringement online.
It uses a tagging technique to track files through networks commonly used by movie and music pirates to transfer large files in fragments from multiple users simultaneously.
“We have found that while many people download copyright infringing material, only about 100 people in the world upload most of the content.”
It’s not, however, Keller’s or Schumer’s definition of journalism that is relevant. It’s the definition under the law. That makes Assange, whom Keller described as “arrogant” and “conspiratorial,” very difficult – if not impossible – to prosecutePosted: 2011/01/30 in Education / Awareness
Hacks is an English and German language documentary by Christine Bader. It was shot over a period of four years, starting in 1993 and released in 1997. This documentary deals with social aspects of hacking by covering not only the more traditional “computer” hacks, but expanding the definition to the realms of society, politics, environment, and artPosted: 2011/01/30 in Education / Awareness
We move back to technological aspects of hacking and spend time discussion the creation and inherent decentralized architecture of the Internet with Rop Gonggrijp and Wau Holland. As an example of Internet freedom, Felipe Rodriquez, Haneke Vermeulen, and Marleen Stikker describe efforts of XS4ALL to bring access to the Internet to common people.
We learn about ‘subversive way of thinking’ from several CCC members, as well as about their exploits hacking into a bank in Hanover
Direct link to video (right click + ‘save as’): http://www.thesprawl.org/hacktube/videos/1/Hacks%20by%20Christine%20Bader.m4v
Direct link to video (right click + ‘save as’): http://www.thesprawl.org/hacktube/videos/1/unauthorized_access.m4v
Blast From The Past. The 2009 WikiLeaks Panel – Daniel, Rop, Julian, ex-MI6 officer and others. ‘Child pornography is sort of used as a sweetener for censorship. It’s the entry for censorship’Posted: 2011/01/30 in Education / Awareness
Part 1/9 http://www.youtube.com/watch?v=v0E-AScyqq4
Part 2/9 http://www.youtube.com/watch?v=6EFSyQLoBPI
Part 3/9 http://www.youtube.com/watch?v=-kAtEuUWYgc
Part 4/9 http://www.youtube.com/watch?v=Heq8hlqZEUg
Part 5/9 http://www.youtube.com/watch?v=TT_HL5yKCZs
Part 6/9 http://www.youtube.com/watch?v=fflqJFvnPy8: ‘Child pornography is sort of used as a sweetener for censorship. It’s the entry for censorship’
Part 7/9 http://www.youtube.com/watch?v=AnLXhkUnoLI
Part 8/9 http://www.youtube.com/watch?v=_dX3ddKJ57s
Part 9/9 http://www.youtube.com/watch?v=bMbCafRRmqo
Daniel, Rop, Julian, ex-MI6 officer and others