Membership in the Nation’s Book Club ™ is manditory for all citizens over the age of 18. Damn, there goes the free wifi and cheap refills at my favorite coffee house. The reactions to a bait and switch on Live Journal are funnier than the original prank. EFF announces key escrow plan. If they are [...]
Tag Archives: cryptography
Okay, running with the “Walled Garden” concept. Over at Drupal, they’re considering my posts, and point out some things Ben Trott’s been working on for Movable Type to sign comments.
My friend Rick Kier, who works in UW Madison’s IT organization, emailed in response to the “Walled Garden” discussion to bring up the Internet 2 Shibboleth project: In the Old Testament, somewhere in Judges, there’s a story of how, after a battle, the Gileadite warriors needed to distinguish their own side and their enemies, the [...]
Pete over at Rasterweb wrote in response to my post on “Walled Garden” weblogs: Drupal offers more control over users and user permissions than Movable Type. It might do what’s needed for walled garden posting. Drupal’s a nice system, but it doesn’t do what I really want: I’d like a system which does not require [...]
Reflections on High Concept, Low Tech, Martial Law, the new Paper Gauntlet and the changing meaning of 911.
Update same entry from last year, new location. Related to Robert Wright’s essay (above). From the Cypherpunks Nettime list, yet another essay on the WTC/Pentagon attacks, where the author points out that the APIs and interface abstractions which make life easy also make it dangerous: As of Tuesday fly-by-wire is to “terrorists” what Perl is [...]
[ via Privacy Digest ] An inconsistent version of Digest Authentication in updates to Internet Explorer means that those clients may only authenticate to Microsoft’s IIS web server. Furthermore, other clients implementing Digest Authentication such as Opera, can’t authenticate with IIS. Microsoft claims a different reading of the standard for Digest Authentication, a method of [...]
I’m still too angry to speak on it myself. So I’ll just point you at Cory Doctorow of the EFF’s comments: If Senator Fritz has his way, no new technologies will be brought to market without a one-year review. Open Source will be dead, since there will be no way to ensure that your users [...]
[ via R. A. Hettinga ] Comp Sci godfather Donald Knuth isn’t worried about the security of his keys, he’s already been rooted by G_D. However, the cypherpunk community isn’t keen on letting The Allmighty sign their keys just yet. The browser asks if you want to trust the Aleph-One length key signed by the [...]
Nick Denton’s all bent out of shape that Slashdot obscures their logs. Too bad Mr. Denton, I’m sorry that you don’t seem to understand that terrorism does not magicaly make the right of people to peacefuly assemble, even in cyberspace, go away. Tossing the Constitution in the dustbin so you can show those Conservabloggers just [...]
Bruce Sterling gave an address to a recent gathering on cryptography: The truer and sadder story of crypto was that the spooks and the geeks both beat the hell out of our democratic process, rendering lawyers, consumers, the Congress, the industry, and the Administration totally irrelevant, and leaving crypto as a blasted technical wasteland, in [...]
[ via the Muted Horn ] US and UK authorities have seized on the September 11 attacks as an excuse to ban or curtail encryption. However, the prime suspects in the case did not use encryption, nor did they hide secret messages in images of naked women.
Bruce Schneier asks that the issue of Crypto-Gram on the WTC/Pentagon attacks be distributed widely. Read it! And get a copy of Secrets and Lies while you’re at it.
Phil Agre collected hundreds of URLs related to the WTC/Pentagon attacks. All the URLs are now archived in one place.
You can get a plug-in for the OS X mail application that hooks into GNU Privacy Guard.
Get while you can: GNU Privacy Guard for Mac OS X. And if you’re having second thoughts about encryption, consider this: the bad guys are attacking computers. If you keep sensitive material for your work or family on a machine, then encryption helps protect you.