You can set your main menu in Appearance → Menus


Obama demands power to shut down Internet and access private data during "emergencies"

by David Veksler David Veksler 3 Comments

If anyone out there still thinks that Obama is any improvement over Bush on Constitutional rights, they must be delusional if they persist in that belief after reading this:

Mother Jones:

The Cybersecurity Act of 2009 (PDF) gives the president the ability to “declare a cybersecurity emergency” and shut down or limit Internet traffic in any “critical” information network “in the interest of national security.” The bill does not define a critical information network or a cybersecurity emergency. That definition would be left to the president.

The bill does not only add to the power of the president. It also grants the Secretary of Commerce “access to all relevant data concerning [critical] networks without regard to any provision of law, regulation, rule, or policy restricting such access.” This means he or she can monitor or access any data on private or public networks without regard to privacy laws.

Support Tor: fight Internet censorship

by David Veksler David Veksler No Comments

Unless you are utterly ignorant of the outside world, you have heard that the government of China actively monitors and censors its citizen’s access to the Internet.  Its tight grip on Internet services is part of an overall policy of brutal suppression of free expression and human rights in China, including organ harvesting, mass murder, forced sterilization, and all the other assorted atrocities that go along with a totalitarian socialist regime.  As brutal as China is, the state of human rights in Putin’s Russia may be even worse. 

Besides their oppressive governments, China and Russia also share a large number of Internet users.  Being a highly decentralized network, the Internet is a critical link for citizens in these countries to connect to each other and the outside world.  Unfortunately American companies have eagerly provided technology that the Chinese government uses to block access to banned content and track down and shut down users and content publishers.

Fortunately, the technologies that allow the creation of ubiquitous surveillance also make possible ubiquitous secrecy.  One particular tool for circumventing state censorship is the Tor anonymity network.  For some time now, I’ve been running a node on the Tor network, which allows users to communicate anonymously on the Net.  Tor is an “onion routing” network, which means that I can see the (unencrypted) traffic leaving my node, but I cannot know where it originates. 

A common concern with anonymity networks is that they can be used for malicious purposes, such as identity theft, piracy, or child pornography.  I was curious to see how my node was being used, so I used some network sniffing software to monitor the sessions leaving my own node.  Since my snooping sessions occurred around 1AM, I was not surprised to find that most of the traffic went to Russian (which I speak) and Chinese (which I can translate) sites.  As far as I could tell, none of the content was illegal.  I found users browsing websites for gaming, online forums, photography, and health information.  (A health information blog might seem innocuous in the West, but such information is closely controlled in China.)  It only took a few minutes however to find traffic to Secret, a site in Chinese devoted to “promoting freedom of the press, a connecting bridge between the Western culture.”  Now as a statistical survey, this is a small sample, but it seems likely to me that at the very least, a substantial part of Tor traffic is being used by people who have legitimate reasons to hide their online activity from their governments.

If you wish to support freedom and privacy, consider visiting the Tor website, downloading the software, and running a Tor node.  You can read some reasons to run Tor on the project’s site, but here are mine:

  • I want to protect the rights of all people to communicate without interference or punishment from their governments.
  • I am concerned about the U.S. government’s policy of warrantless and unconstitutional surveillance, and want to protect myself against the consequences of its continued progress towards a totalitarian regime.
  • I believe that like the right to bear arms, my rights may become useless if they are not exercised.

Some tips for using Tor:

  • I am using the “unstable” version just fine.
  • You must configure Tor as a relay if you want to run a Tor node.
  • Tor will use a lot of traffic if you let it (slowing down your internet access and potentially reaching monthly bandwidth limits if you have any), and may expose you to legal investigation.  You should familiarize yourself with its options, as Tor makes it easy to control both the type and volume of traffic is relays. 
  • If you disable all the exit policies or enable the “help censored users reach the Tor network”, you can run a node without exposing yourself to liability.
  • The bandwidth graph will show total usage, so you can adjust the bandwidth limits appropriately.  For reference, Comcast has a limit of 250 GB per month.

FCC rewards piracy in the name of "net neutrality"

by David Veksler David Veksler 1 Comment

According to Ars Technica, yesterday the FCC ordered Comcast to stop slowing down the Internet traffic of users who use excessive file-sharing (P2P) software.  Instead, Comcast will slow down the Internet service of all users who use a lot of traffic, regardless of the content.  Other ISP’s will probably follow Comcast’s lead.

Basically, this order means that users who are anonymously sharing software and movies using file-sharing software (the vast majority of which is pirated and illegal) must be treated the same as users who are doing things such as video chat, telecommuting, and other applications that rely on real-time communications.  While not all P2P traffic is illegitimate, surely real-time applications should be given a lower priority than file-sharing.  Either way – ISP’s have the right to decide how to best route traffic on their networks.  Yet no law was necessary – just another politically-motivated decree from some nameless bureaucrat.

Score yet another victory for anti-corporate hysteria and the egalitarian ideology which is destroying capitalism and the rule of law in the name of “neutrality.”

How the World was Wired

by David Veksler David Veksler No Comments

If you’ve heard about the recent submarine cable outages, you might enjoy reading this fascinating 1996 article by science fiction genius Neal Stephenson on the first world-spanning fiber-optic network.  It includes some background on the brilliant and daring 19th century inventors and entrepreneurs who created the first world-spanning communications networks.  I’ve been reading it for the last nine hours, but I’m still not done because of all the historical and future (for 1996) places, technologies, and events it describes.