Archive for the ‘Filtering’ Category
ISP PlusNet Reports Huge Increase in UK Online Video Gaming Traffic, List Most Popular Games. But How Do They Know?Posted: 2013/09/30 in Bandwidth Management, Education / Awareness, Filtering, Privacy / Data Protection, Stats / reports, Tech Evolution
Indeed PlusNet reports that, even after downloading the games, video gaming related Internet traffic on their network only accounts for 2% of the total network bandwidth. By comparison, streaming services (YouTube, Spotify etc.) take up roughly 50% because of the huge amount of data that is being consumed (note: this could easily become confusing when you consider the new streamed video game services like Onlive). So which games and platforms eat up most of PlusNet’s precious bandwidth?
Top Video Game Platforms by Internet Bandwidth
1. Xbox Live 35%
2. Playstation Network 30%
3. PC/Laptops 25%
4. Tablets/Smartphones 5%
5. Wii 5%
Top Video Games by Internet Bandwidth
1. Call of Duty
2. DOTA 2
3. World of Warcraft
4. League of Legends
6. Planetside 2
7. Team Fortress
8. Guild Wars
9. Battlefield (EA/DICE)
Apparently the largest ever amount of bandwidth data usage was for the download of Black Ops Vengeance Pack 2, which gobbled 1,279 Megabytes per second (yes they said Megabytes). In terms of traffic trends, most video gaming understandably takes place after everybody gets home from work and school (between 7pm and 9pm at night) during a normal week (the trend is more stable over holiday periods).
In the future we’d expect usage to rise, especially with the release of Microsoft’s XBox One and Sony’s PlayStation 4 (PS4) due before the end of this year. Not to mention the release of Battlefield 4, yet another Call of Duty game and many more. Multiplayer has become a crucial element for most games but luckily it’s a lot easier to manage than streaming.
Dutch Intelligence Agencies Recruiting 350 Ub3rh3x0r5 For Their Joint SIGINT Cyber Unit, Codename: SYMBOLONPosted: 2013/09/24 in Education / Awareness, Enforcement, Filtering, Network Security, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
To mimic the work of their U.S. and UK counterparts…
Dutch language news article:
Freedom of information? Not on Facebook!
Just two weeks after Ars featured the work of a man who spends his free time late at night working on a browser extension that adds a slew of new features to Facebook, the famed social network abruptly trashed his extension’s Facebook pages.
On his blog, Matt Kruse, the creator of Social Fixer, wrote on Thursday:
I’ve spent 4 years and countless hours building up a community around my software: my Page had 338,050 Likes, my Support Group had 13,360 members, and my Interest List had 1.47 Million followers. But all of that work was wiped out in an instant when Facebook decided to shut it down without notice.
Kruse clicked Facebook’s “appeal” button to try to reverse the decision to pull his page, but by September 11, it was completely removed.
If Just 2% of Internet Users Are Responsible for Most Online Piracy, It Shouldn’t Be A Problem For ISPs, Search Engines And Authorities To Act Against That, Right?Posted: 2013/09/12 in Blocking, Copyright, Education / Awareness, Enforcement, File Sharing, Filtering, Public Policy, Stats / reports, Tech Evolution
Or are they trying to claim that, since it’s such a small problem, there’s really no need for any enforcement action?
Is Bruce Schneier Second To Wash His Hands Of NSA Disclosure (After Ellison)? Does He Genuinely Think This Can Be Fixed??Posted: 2013/09/05 in Blocking, Education / Awareness, Enforcement, Filtering, Network Security, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
Government and industry have betrayed the internet, and us.
To the engineers, I say this: we built the internet, and some of us have helped to subvert it. Now, those of us who love liberty have to fix it.
[Indeed...it has been subverted by the builders, the engineers. They got paid twice...]
Bruce Schneier Warns Against Governments Trying To Clean The Security Mess That Is The Internet. Forgets That He’s Had His Chance
China seen probing IBM, Oracle, EMC backdoors and even frontdoors, after Snowden leaks (and Ellison interview)
Oracle’s Larry Ellison: “Who’s Ever Heard Of This Information Being Misused By The Government? [What NSA Is Doing] Is Great, It’s Essential”
We Said It Before And We’ll Say It Again: There’s No Such Thing As Anonymity On The Internet. NSA And GCHQ Prove ItPosted: 2013/09/05 in Education / Awareness, Enforcement, Filtering, New Business Models, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.
The files show that the National Security Agency and its UK counterpart GCHQ have broadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.
The agencies, the documents reveal, have adopted a battery of methods in their systematic and ongoing assault on what they see as one of the biggest threats to their ability to access huge swathes of internet traffic – “the use of ubiquitous encryption across the internet”.
Those methods include covert measures to ensure NSA control over setting of international encryption standards, the use of supercomputers to break encryption with “brute force”, and – the most closely guarded secret of all – collaboration with technology companies and internet service providers themselves.
Through these covert partnerships, the agencies have inserted secret vulnerabilities – known as backdoors or trapdoors – into commercial encryption software.
The files, from both the NSA and GCHQ, were obtained by the Guardian, and the details are being published today in partnership with the New York Times and ProPublica. They reveal:
• A 10-year NSA program against encryption technologies made a breakthrough in 2010 which made “vast amounts” of data collected through internet cable taps newly “exploitable”.
• The NSA spends $250m a year on a program which, among other goals, works with technology companies to “covertly influence” their product designs.
• The secrecy of their capabilities against encryption is closely guarded, with analysts warned: “Do not ask about or speculate on sources or methods.”
• The NSA describes strong decryption programs as the “price of admission for the US to maintain unrestricted access to and use of cyberspace”.
• A GCHQ team has been working to develop ways into encrypted traffic on the “big four” service providers, named as Hotmail, Google, Yahoo and Facebook.
Among the new URLs are eztvproxy.net and eztv.dashitz.com, sites that allow blocked subscribers to access the TV-torrent site EZTV. As with previous changes, the movie studios and the ISPs have not disclosed which sites are being banned.
Highlights Of Pro-Privacy Movie “Terms And Conditions May Apply”. The Data Collection That The Patriot Act Required Became The Foundation Of The Modern Internet As We Know ItPosted: 2013/08/31 in Cybercrime, Education / Awareness, Enforcement, Filtering, New Business Models, Online advertising, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
- What if the data collection that the Patriot Act required became the foundation of a whole new business model? And the foundation of the modern internet as we know it? Would that be something worth covering up?
- It might feel very different if Google was effectively a $500-a-year service because that’s the value of the data you’re providing.
- Anonymity wasn’t profitable;
- Mark Zuckerberg doesn’t say he wants to share with the entire world…and yet, that’s the default.
- You get comfortable with whatever the default is. When the defaults change is when the problems emerge.
- I’m OK with Facebook acting like a company, but I think we need to treat it like a company and not some benign public utility.
- What Eric Schmidt said was the worst case scenario, Google had actually done.
- A company might actually use your data in a way that harms you.
- The reason we do not have a privacy law is largely due to lobbying by companies that have built extremely lucrative business around these business activities.
- John Kerry: I reject the notion that privacy protection is the enemy of innovation. It absolutely doesn’t have to be and isn’t.
Individuals involved in this industry don’t want to see any regulation whatsoever – Senator Ellen Corbett
- The Pentagon is clearly moving to create the largest electronic eye ever: Total Information Awareness.
- AT&T was engaged in a wiretapping program. They actually had a secret room in their facilities ad they were creating a copy of internet traffic and sending it to the NSA.
- Barack Obama did not shut those programs down. Even though he had threatened to before he became president.
- “The CIA has just announced its most recent handy invention – Facebook!”
- Why was FBI’s Robert Mueller in the Facebook building?
- “Remove” means that it is flagged as deleted. You’re hiding it from yourself. But government agencies and Facebook can still retrieve it later.
- De-anonymizing search records turns out to be shockingly easy.
- The third party doctrine means that when you the consumer share your data with a bank, e-mail provider, search engine (…) you have basically given up your 4th Amendment protection over that data.
- Facebook has 25 employees doing nothing but surveillance.
- 9/11 has provided a license for European countries, U.S., Australia, Canada, South Africa (…) to develop spying systems that affect all of us.
- What potential threat would all this surveillance we agree to actually prevent?
- There are folks being arrested and raided for silly Tweets and bad jokes on Facebook. Words are being interpreted by the machines (algorithms), not age, circumstances or any other context.
- Surveillance measures are being used to silence protests before they even happen.
50 of us were incarcerated (for 25 hrs) for THINKING about protest, for thinking about, in this case, some STREET THEATER – Chris Knight, Professor of Anthropology, Royal Wedding Protester
- The solution is to make sure that we elect better governments.
- The government is making whistle-blowing a crime, they’re making dissent a crime, especially when it embarrasses the government and calls the government to account.
- We as a society won’t know when our rights are being silently violated.
- Authoritarian governments will be able to perform retrospective surveillance, going back years and analyzing all events leading up to an arrest.
- We have woken up to the privacy concerns at least 4 years too late.
- I think we’re opting in a centimeter at a time, (…) you look behind you and you sort of wonder how you got where you were.
- The sky is the limit you know, they know everything about us now.
- Google doesn’t understand “Do Not Track”. The only reason Google “doesn’t understand” it, is because it doesn’t want to implement it.
- Mark Zuckerberg’s IM Chat: “I have over 4,000 emails, pictures, addresses (…) People just submitted it. I don’t know why. They “trust me”. Dumb fucks.”
Mark Zuckerberg smiled at me…and you know why? Because he thought I’d stopped recording. And he was relieved. Imagine what a relief it would be if all of these companies and the government stopped recording everything we do.
“This documentary should be mandatory viewing for everyone who uses the internet”
Dutch language news article:
The actual reason for this:
Dutch Mainstream Media Very Keen On Concluding That Pirate Bay Blockade By Dutch ISPs Did Not Affect Levels Of PiracyPosted: 2013/08/22 in Blocking, Copyright, Education / Awareness, Enforcement, Filtering, Illegal File Sharing, Litigation, New Business Models, Online advertising, Organized Crime, Public Policy, Stats / reports, Tech Evolution
2 minutes ago: http://radio.omroep.nl/f/152842/
7 minutes ago: http://www.nu.nl/tech/3556546/blokkade-pirate-bay-zinloos.html
13 minutes ago: http://www.powned.tv/nieuws/tech/2013/08/verrassing_blokkade_tpb_werkt.html
22 minutes ago: http://m.nos.nl/pl/svt/si/nos/po/opnl/sc/nosnieuwstest/dk/nosnews_test.08-22-2013.0130p0000/pa/248725
23 minutes ago: http://nos.nl/artikel/543027-weinig-effect-blokkade-pirate-bay.html
45 minutes ago: http://www.radio1.nl/items/84646-blokkade-pirate-bay-weinig-effect
55 minutes ago: http://nos.nl/audio/543029-blokkade-pirate-bay-weinig-effect.html
1 hr ago: http://www.nrc.nl/nieuws/2013/08/22/ondanks-blokkade-pirate-bay-neemt-downloaden-toe/
The articles quote a study by the University of Amsterdam in collaboration with “het Instituut voor Informatierecht” (IViR) and “the System and Network Engineering-group” of the UvA, and CentERdata (Tilburg University).
The English language study is available here:
Why The Pirate Bay Blocking Study Of The University Of Amsterdam, University Of Tilburg (CentERdata) And IViR Falls Flat (Again)
BREIN’s Tim Kuik: Conclusions Of IViR About Effectiveness Of Copyright Enforcement Are Irresponsible
Dutch ‘Scientists’ At IViR: Enforcement (Which Has Never Taken Place In The Netherlands) Is Not The Answer To Online Piracy
Dutch Researchers Claim Dutch Pirate Bay Blockade Is Futile
Woops, Lie Number 2? Or Just Wrong Math? New Details Show Broader NSA Surveillance Reach. Programs Cover 75% of Nation’s Traffic, Can Snare EmailsPosted: 2013/08/21 in Education / Awareness, Enforcement, Filtering, Privacy / Data Protection, Public Policy, Stats / reports, Tech Evolution
The National Security Agency—which possesses only limited legal authority to spy on U.S. citizens—has built a surveillance network that covers more Americans’ Internet communications than officials have publicly disclosed, current and former officials say.
The system has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans. In some cases, it retains the written content of emails sent between citizens within the U.S. and also filters domestic phone calls made with Internet technology, these people say.
The NSA’s filtering, carried out with telecom companies, is designed to look for communications that either originate or end abroad, or are entirely foreign but happen to be passing through the U.S. But officials say the system’s broad reach makes it more likely that purely domestic communications will be incidentally intercepted and collected in the hunt for foreign ones.
The programs, code-named Blarney, Fairview, Oakstar, Lithium and Stormbrew, among others, filter and gather information at major telecommunications companies. Blarney, for instance, was established with AT&T Inc., former officials say. AT&T declined to comment.
This filtering takes place at more than a dozen locations at major Internet junctions in the U.S., officials say. Previously, any NSA filtering of this kind was largely believed to be happening near points where undersea or other foreign cables enter the country.
As another U.S. official puts it, the NSA is “not wallowing willy-nilly” through Americans’ idle online chatter. “We want high-grade ore.”
To achieve that, the programs use complex algorithms that, in effect, operate like filters placed over a stream with holes designed to let certain pieces of information flow through. After the 2001 terrorist attacks, NSA widened the holes to capture more information when the government broadened its definition of what constitutes “reasonable” collection, according to a former top intelligence official.
Woops, Yet Another Lie? Or Just The Wrong Math? The NSA Searches Ten Times as Much of the Internet as It Said It Does
It Should Be Clear To Anyone By Now That In Relation To The Counter-Terrorism Effort, The End Justifies Any Means
Council bosses have admitted that they are working with a company that once used a “blacklist” to vet workers who were trade union members — despite making a public pledge never to employ such firms.
Construction and property group Kier was issued an enforcement notice by the Information Commissioner’s Office (ICO) in 2009 after being found to have used the Consulting Association, which created and managed the blacklist.
The group recently took over construction firm May Gurney, which has a vehicle maintenance contract with Barking and Dagenham.
Fresh calls for an investigation into blacklisting allegations have been made by unions and politicians concerning the £14.5bn Crossrail project in London, which Kier is involved in as part of consortium BFK with two other companies.
In May this year, council leader Cllr Liam Smith told a full council assembly meeting that the authority would never employ firms involved in blacklisting.
He said: “Blacklisting of trade union members is abhorrent.”
Co-founder of the Blacklist Support Group, Dave Smith, said he set up the organisation after learning he was a victim.
“What I don’t want is the same thing happening to other people in Barking and Dagenham. There are questions that need to be asked of Kier.”
Holy sh*t, the hate minions are after Amazing Atheist. Somehow, his videos are getting removed and rejected by YouTube. You know, they’re the videos with names like “Stupid Christian Comics”, “The Origin of Islamic Extremism”, “Can Men Talk About Feminism?” and “DIFFERENT POPE; SAME SH*T”. His videos get blocked like he’s playing one-on-one against Dwight Howard. Jesus, why would somebody want those videos remov.. oh, wait, we see what’s going on. The intolerant are going their intolerant ways again. Because they feel that only they are allowed to freely speak their mind and put their arguments out there. So they consider any form of criticism as being ‘offensive’ and try their best to kill the other part of the debate. Well, we think of somebody who takes a regular piss out of religious nuts, futile feminists, and stupid people in general as a true friend. If speaking the truth is considered offensive, we’d gladly like to help out in hurting some precious religious feelings. Give your support to the Amazing Atheist on his Facebook, his Tumblr and his Twitter. And tell him to take his talents to Dumpert, a.k.a. beacon of light and freedom of speech safe haven, just like Pat Condell did. We at GeenStijl believe freedom of speech is the most valuable treasure of them all. Amazing Atheist, you’re video’s are always welcome on our servers and will never be removed. Also, you’re in our prayers.
Changing your IP address or using proxy servers to access public websites you’ve been forbidden to visit is a violation of the Computer Fraud and Abuse Act (CFAA), a judge ruled Friday in a case involving Craigslist and 3taps.
The legal issue is similar to one in the Aaron Swartz case, in which there was debate over whether Swartz “had committed an unauthorized access under the CFAA when he changed his IP address to circumvent IP address blocking imposed by system administrators trying to keep Swartz off the network,” law professor Orin Kerr wrote yesterday on the Volokh Conspiracy blog.
The ruling in Craigslist v. 3taps (PDF) is the first “directly addressing the issue,” Kerr wrote. 3taps drew Craigslist’s ire by aggregating and republishing its ads, so Craigslist sent a cease-and-desist letter prohibiting the company from doing so. Craigslist also blocked IP addresses associated with 3taps’ systems.
“3taps bypassed that technological barrier by using different IP addresses and proxy servers to conceal its identity and continued scraping data,” wrote Judge Charles Breyer of US District Court in Northern California. Craigslist subsequently accused 3Taps of violating the CFAA, which “imposes criminal penalties on any person who, among other prohibitions, ‘intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains… information from any protected computer.’”
Apple Is Patenting Technology That Will Cripple Its Devices When They Are In the Proximity of ‘A Concert or a Classified Facility’Posted: 2013/08/18 in Blocking, Education / Awareness, Enforcement, Filtering, New Business Models, Public Policy, Stats / reports, Tech Evolution
It’s easy to forget that owning something digitally is way different from owning it for real. And if you do forget, it can bite you in the ass. That’s what happened to Jim O’Donnell when he traveled into Singapore and found that Google Play Books app on his iPad had up and deleted all his ebooks.
the Google Play Store doesn’t operate in Singapore, Google Play Books aren’t available in Singapore, so obviously it’s not going to sell to people who are there. But apparently the DRM goes a step further, and can/will actually delete your stuff if it catches you visiting the wrong part of town the world.
Thousands of malicious apps being disabled by Facebook and like anyone else, they sometimes make a mistakePosted: 2013/08/16 in Blocking, Cybercrime, Education / Awareness, Enforcement, Filtering, Privacy / Data Protection, Stats / reports, Tech Evolution
On August 13th, we undertook such a procedure. We started with a broad pattern that correctly matched many thousands of malicious apps but, unfortunately, also matched many of your high quality apps. When we detected this error, we immediately stopped the process and began work to restore access. The process took longer than expected because of the number of apps affected and bugs related to the restoration of app metadata.
A California District Court has updated and clarified the permanent injunction the MPAA won against the BitTorrent search engine isoHuntPosted: 2013/08/15 in Copyright, Education / Awareness, Enforcement, File Sharing, Filtering, Illegal File Sharing, Jurisprudence, Litigation, New Business Models, Stats / reports, Tech Evolution
Under the new injunction isoHunt is prohibited from “indexing or providing access to Dot-torrent or similar files harvested or collected from the following sites or services: The Pirate Bay, Torrentspy, BT Junkie, Torrentreactor.net, kat.ph or torrents.net”
While it’s understandable that this language is updated, the inclusion of “TorrentSpy and BTJunkie” is peculiar since these sites closed down a long time ago.
TorrentSpy closed down half a decade ago when the MPAA won a $110 million judgment against the site. BTJunkie has been around for longer, but threw in the towel early last year after the Megaupload raid.
Needless to say, there’s not much that can be harvested from these sites so isoHunt should have no issues complying with this part of the injunction.
The injunction does, however, allow the MPAA to request that new sites are added to this list when they have sufficient proof that they’re infringing. This effectively means that it can severely limit isoHunt’s sources.
Another update to the injunction is that isoHunt is prohibited from advertising its services by referring to the following sites: The Pirate Bay, TorrentSpy, Aimster, Kazaa, Grokster, Morpheus, Newzbin, BT Junkie, Torrentreactor.net, kat.ph, torrents.net, SurftheChannel.com, Kino.to, Movie2k.to, and/or Dl4all.com.
Again we see TorrentSpy and BTJunkie listed, as well as many other defunct services including Kazaa, Grokster and SurftheChannel.com.
This essentially means that EZTV, or any other blocked site, has the power to render entire websites inaccessible to Sky subscribers. Luckily we were the target and not Google
Social Media Shouldn’t Reflect The Real World. It Should Be A HAPPY Place…
Hollywood keeps censoring Pirate Bay documentary, Director outraged, gets in touch with Google’s Nordic Policy counselPosted: 2013/08/08 in Blocking, Copyright, Education / Awareness, Enforcement, Filtering, Google, Stats / reports
…who said he would follow up on the case. But today, two months and several reminders later, the director still has to receive a reply.
This leads Klose to belief that Google is more interested in helping Hollywood to censor the web than assisting independent creators to correct DMCA takedown abuses.
Google, Yahoo and Microsoft to Hollywood: DMCA is not the key to substantially reducing piracy. SEO is…Posted: 2013/08/06 in Blocking, Copyright, Education / Awareness, Enforcement, File Sharing, Filtering, Google, Illegal File Sharing, New Business Models, Online advertising, Stats / reports, Tech Evolution
According to a new research paper titled ‘The Search Fixation: Infringement, Search Results, and Online Content’, the emphasis rightsholders are placing on censoring search engine results is actually achieving very little and those valuable resources might be better off spent elsewhere.
The paper, published by the Computer & Communications Industry Association (CCIA) which counts Google, Yahoo, Microsoft and Facebook among its members, says that entertainment industry companies have become “fixated” on the role search engines play in unearthing illicit content. The focus is so great there was even an attempt to legislate site censorship via the controversial Stop Online Piracy Act.
“This might lead to the conclusion that search engines are a prominent tool in the infringers’ tool box. In fact, available evidence suggests that search is not a particularly relevant tool for infringers seeking to find sites (such as The Pirate Bay) or for sites to find users,” the report states.
The CCIA cites research from BAE Systems Detica which found that users are far more likely to return to infringing sites via a direct browser entry or via social networks. Furthermore, it appears that users looking for illicit material already know where they want to obtain it from even before they start searching.
CCIA suggests that if the entertainment industry wants their content to appear in search results when users type in “objectionable” terms such as those listed above, then they will have to start using them on pages offering legal content. Noting that legitimate sites aren’t currently employing such a strategy, the CCIA comes to two conclusions.
“This suggests either (a) a deficiency in otherwise robust online marketing strategies, or (b) that these terms are judged to be unworthy of optimizing because they will drive a trivial amount of commercial traffic.
“Stated otherwise: if search terms such as ‘mp3′ and ‘download’ were likely to lead to sales or subscriptions, a rational, profit-minded online platform engaging in basic search engine optimization (SEO) would attempt to incorporate those terms in site content.”
The CCIA concludes by noting that while DMCA notices might be a useful tool, they are unlikely to achieve the desired result of substantially reducing piracy. Concentrating on improving the visibility of legitimate content, even if that means utilizing “objectionable” terms, would be a more robust strategy.
The United States joined global Internet giants Google and Facebook on Tuesday in criticizing a new decree in Vietnam that further curbs online free speech and forces foreign companies to keep servers inside the country