if sousveillance tools do not have sufficiently extreme levels of security and user-accoutability, they become additional tool of the powers-that-be…

This article – “Indian cops want Bangalore’s citizens to help them catch criminals by using Periscope” – makes me think that if sousveillance tools do not have sufficiently extreme levels of security and user-accoutability, they become additional tool of the powers-that-be… Even a Transparent Society – which could replace this one if we fail technically…

Who sets the security standards for lawful access systems like Hacking Team team?!

After what came out of the Hacking Team scandal, we should consider if the standards for such techs, crucial for society – that many governments want extended as mandatory to other IP communications – maybe we have a problem at their origina, i.e. with their international governance by NIST and ETSI, the non-binding bodies that set their standards (which are…

Why Hacking Team backdoor is old news from the late 80’s!

The just revealed Hacking Team RCS systems backdoor (for them and presumably for their state friends) was the very reason of existence of the first such systems from the early 80-90’s (!!), created by former NSA staff, and then taken over by former (?) Mossad senior agents, and sold to tens of governments worldwide. Pushed…

In a recent post on Wired, called “Why We Need Free Digital Hardware Designs“, Richard Stallman compares the prospects and meaining of Free digital Hardware and designs, in comparison with Free Software: You can’t build and run a circuit design or a chip design in your computer. Constructing a big circuit is a lot of painstaking work, and…

Adi Shamir: ” “In the Second World War if you had good crypto protecting your communication you were safe. Today with an APT sitting inside your most secure computer systems, using cryptography isn’t going to give you much protection.”

http://www.theregister.co.uk/2013/03/01/post_cryptography_security_shamir/ “In the Second World War if you had good crypto protecting your communication you were safe. Today with an APT sitting inside your most secure computer systems, using cryptography isn’t going to give you much protection. “It’s very difficult to use cryptography in an effective way if you assume that an APT is watching…

Panopticon sounds very much like the post-Snoden world for all of us

http://en.wikipedia.org/wiki/Panopticon The Panopticon is a type of institutional building designed by the English philosopher and social theorist Jeremy Bentham in the late 18th century. The concept of the design is to allow a single watchman to observe (-opticon) all (pan-) inmates of an institution without the inmates being able to tell whether or not they…

What’s the use of ultra-privacy techs when mics are everywhere?

Since Snowden all hopes to retain a meaningful, albeit limited, personal privacy sphere have relied on the possibility of making devices resistant to advanced surveillance available to citizens, supplementary to ordinary commercial ones, and make so that they won’t be made illegal. Eve if we succeeded, such devices may not serve their purpose or achieve…

John Maynard Keynes 1953 : “Will the discontented peoples of Europe be willing for a generation to come so to order their lives that an appreciable part of their daily produce may be available to meet a foreign payment, the reason of which … does not spring compellingly from their sense of justice or duty?” he asked. Greece profit from German history | Jeffrey Sachs | Comment is free | The Guardian

http://www.theguardian.com/commentisfree/2015/jan/21/greece-profit-german-history-1953-debt-relief