I forgot to mention, the keys aren't really interacted with by the user, merely saved then used automatically as needed. Aside from your public key acting as an email address, you don't need to see the keys at all. The public key is also just text, so one can copy/paste the one line as a key quite easily. This gets rid of the hassle for the casual user, while still providing the protection you're after.
BitMessage is an attempt at a completely distributed email service using public/private key pairs. Your public key also acts as your email address with this system. They're currently looking for security experts to test the current cryptography, so there is a question as to the degree of security, but there has been at least one person to answer the call, break the crypto, and send the creators of the program a fix for the issue.
With that quote, you've got to take the context into consideration. The "eye of the needle" was a term that referred to the archway entering into certain larger cities. It was too small for the camel to just walk through. Getting the camel through required a fairly significant amount of work, it wasn't an easy task, but it was possible.
Re: Re: Ah, Mike the "economist" defending "virtual" money.
Not only that, but if it didn't hold value like real currency, I doubt the SEC would be getting involved. It's the real value that makes it worth the time to deal with the problem.
With a startup loan, the bank is hoping to get paid back. They will filter things through a very different lense (how much money can we possibly make, how likely are we to make money). This is different from a business or consumer who isn't expecting a monetary return on a product, and just wants to have their own copy of the finished product. On top of that, you're expected to pay back a loan, with a crowdfunded item, it's hoped you'll be capable of delivering on the promises.
Many are not opposed to it at all, some even welcome this. Others feel it's not quite THAT bad, etc. Even for those opposed, a protest is too much of a hassle, and too much work, for people to actually get off their lazy butts.
It sounds as though you don't understand communism. Communism is the government people were to implement after overthrowing the existing establishment in order to prevent the exploitation of the lower classes by the upper classes. It would do this by means of total control so that businesses couldn't push or force the government to give them excessive power over the lesser classes. Nothing about our current government is trying to do this. It's a police state for sure, and is exercising more and more power all the time, claiming it's in our interest, even though it isn't, but it's most definitely not communist.
I'll try to explain the purpose of the site for you. Basically, Techdirt is about how new technologies can disrupt established industries, resulting in something that is overall good for the industry as a whole, yet seem harmful to the established players in those industries. In particular, the attempts by those established players to try to block the new innovations and advancements in technologies.
Due to regulatory capture causing copyright, as well as patent law, to go far beyond anything reasonable, copyright and the DMCA are frequent topics here. The reason for this article is specifically the abuse of the takedown provisions of the DMCA, rather than the fight itself. This is a clear and obvious attempt to silence free speech using the DMCA is the method, despite defenders of the takedown provisions claiming that nothing about copyright can or will harm free speech.
If, as you suggest, this email is *not* the original email, the defendant could subpoena a copy of the original email from the provider of the email service, or from the hosting provider, to prove the plaintiff is lying. This would be a very easy tactic to undermine all credibility the plaintiff may have, making a victory in this regard that much easier. I'm not really seeing that here, so chances are this email is indeed the original email.
That's a grey area, not sure if the 5th amendment covers that, though it might. Realistically, you can plead the 5th for any reason at all, even if you aren't technically guilty. The reason for this is that probing into the reasons for pleading the 5th would be trying to force the person to incriminate themselves. You'd have to provide solid evidence that the answer to the question could not possibly have incriminated the person giving testimony to be able to levy any form of punishment.
For example, a person could testify in court in defense of some one who was definitely guilty of a crime, then plead the 5th when asked certain questions in order to deflect suspicion from the accused, onto them. You could try and question them as to why they plead the 5th, but they would respond by just pleading the 5th some more. How are you going to prove the answers to the questions can't possibly be seen as incriminating? That would be a hard thing to do, and I don't see it happening. The end result would be that a person can plead the 5th for any reason they want with out fear of any form of punishment.
What patents are these? A while back Oracle lost a lawsuit it filed against Google for infringing on its Java Copyright (specifically claiming the API is covered by copyright) on the Android OS. If they had patents on Java, why wouldn't they have also filed for infringement of the patents in question?
For putting the logo on the uniforms yes, but not for things like a documentary which happens to show the logo they put on the uniforms. Same with the pictures on the stadium wall, as that's showing their history (even if it is one that includes copyright infringement). I could certainly see a potential argument regarding the video game though, as that isn't about documenting anything historically, but rather just a "retro" uniform that isn't needed to play the game.
The Department of Justice (DoJ) has claimed that violation of the Terms of Service (ToS) is a violation of the Computer Fraud and Abuse Act (CFAA). Anyone (including Clinton) who has ever violated the ToS of a website, is, by the DoJ interpretation of the law, guilty of violating the CFAA, and, if convicted, is a felon.
There was no accusation by Mike. His complaint here, was that the DoJ interpretation of the CFAA is far too broad, and makes felons out of the average citizen for doing things that would be considered mundane and ordinary, rather than a seeming ethical or moral wrong. Here's a few examples.
Under the DoJ interpretation, any child under the age of 13 who signs up for a Facebook account is a felon. Same with any parent that sets up an account for said child. If a website tells you not to view the source code for the website, and you do so, you are a felon. If you tell a little white lie in your profile on a dating site, such as claiming your hair color is natural, and not died, and the website says you aren't allowed to lie about your personal information, you are a felon.
Gnu Privacy Guard for your emails, but you'll need the receiving user to have it as well. Some linux distros will have it installed by default. Gnu PG for Windows is available for those using Windows computers (and even comes with a GUI, unlike mine). Chances are, it's also available for Mac.
Useful tool. It works be creating 2 keys, public and private. The public key can only encrypt the email/document/file, it can't reverse the encryption. The private key though, is one you must protect and keep hidden. That key is the one that breaks the encryption. Keep a backup, but keep it locked up (for example, on a USB drive inside a lockbox) so prying eyes can't get their hands on it.
Using GPG is not too hard. Step 1, create your public and private keys. Step 2, share the public key with anyone at all who would be interested in sending you encrypted emails. Step 3, obtain public keys from anyone you would want to send email to. Now you're ready to use it.
Any emails you receive, you run through your personal private key, and it decrypts. Any emails you send, run the text through the receiving user's public key first to encrypt it, then send it out.
Yeah, I don't doubt it'd never make it through lobbying, but should such a change occur, that would, for the most part, fix the issue with large corporations controlling all the works.
On the post: Feds Threaten To Arrest Lavabit Founder For Shutting Down His Service
Re: Re: What's the next Lavabit?
On the post: Feds Threaten To Arrest Lavabit Founder For Shutting Down His Service
Re: What's the next Lavabit?
On the post: Rep. Mike Rogers Blocking Other Congressional Reps From Access To Info On NSA Surveillance
Re: Re: Re: Rep. Mike Rogers
On the post: SEC Confirms That Bitcoin Savings & Trust Was A Ponzi Scheme; Files Lawsuit
Re: Re: Ah, Mike the "economist" defending "virtual" money.
On the post: Canonical Goes Big In Attempt To Crowdfund Exclusive Ubuntu Phone
Re: Re: Re: Re:
On the post: NSA Talking Points On Utah Data Center: We're Teaming Up With Tech Companies To 'Protect' The Internet
Re: Re: Re:
On the post: NSA Whistleblower Ed Snowden: From My Desk I Could Wiretap Anyone: You, A Federal Judge Or The President Of The US
Re:
On the post: More Details Emerge On Key Legal Fight Over DMCA Abuse
Re: Passerby - NOT a silly fight.
Due to regulatory capture causing copyright, as well as patent law, to go far beyond anything reasonable, copyright and the DMCA are frequent topics here. The reason for this article is specifically the abuse of the takedown provisions of the DMCA, rather than the fight itself. This is a clear and obvious attempt to silence free speech using the DMCA is the method, despite defenders of the takedown provisions claiming that nothing about copyright can or will harm free speech.
On the post: More Details Emerge On Key Legal Fight Over DMCA Abuse
Re: Re: Re: Why am I not surprised?
On the post: John Steele Plans To Appeal Judge Wright's Order; Says Judge Is 'No Fan Of IP Law'
Re: Huff and Puff
On the post: John Steele Plans To Appeal Judge Wright's Order; Says Judge Is 'No Fan Of IP Law'
Re: Re: Re:
For example, a person could testify in court in defense of some one who was definitely guilty of a crime, then plead the 5th when asked certain questions in order to deflect suspicion from the accused, onto them. You could try and question them as to why they plead the 5th, but they would respond by just pleading the 5th some more. How are you going to prove the answers to the questions can't possibly be seen as incriminating? That would be a hard thing to do, and I don't see it happening. The end result would be that a person can plead the 5th for any reason they want with out fear of any form of punishment.
On the post: Over 90% Of The Most Innovative Products From The Past Few Decades Were NOT Patented
Re: Re:
On the post: CBS Says It Could Move To Cable In A 'Few Days' If Aereo Wins; Receives Several Offers To Help Pack Its Bags
Re: Dear CBS:
On the post: Authors Guild Shuts Itself Off From Public Criticism, As People Realize It Represents Publishers, Not Authors
Re: Re: Re: Re: As usual, Misleading Mike reads only what fits his template.
On the post: Things You Don't See Every Day: MPAA Argues For Fair Use In Court
Re: Not even remotely fair use, they should pay
On the post: The Law Should Never Be Secret, So Why Will CISPA Debate Be Secret?
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
I wish I could edit my comments on here.
On the post: The Law Should Never Be Secret, So Why Will CISPA Debate Be Secret?
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
The Department of Justice (DoJ) has claimed that violation of the Terms of Service (ToS) is a violation of the Computer Fraud and Abuse Act (CFAA). Anyone (including Clinton) who has ever violated the ToS of a website, is, by the DoJ interpretation of the law, guilty of violating the CFAA, and, if convicted, is a felon.
There was no accusation by Mike. His complaint here, was that the DoJ interpretation of the CFAA is far too broad, and makes felons out of the average citizen for doing things that would be considered mundane and ordinary, rather than a seeming ethical or moral wrong. Here's a few examples.
Under the DoJ interpretation, any child under the age of 13 who signs up for a Facebook account is a felon. Same with any parent that sets up an account for said child. If a website tells you not to view the source code for the website, and you do so, you are a felon. If you tell a little white lie in your profile on a dating site, such as claiming your hair color is natural, and not died, and the website says you aren't allowed to lie about your personal information, you are a felon.
On the post: DEA Accused Of Leaking Misleading Info Falsely Implying That It Can't Read Apple iMessages
Re: Re:
http://gpgtools.github.io/GPGTools_Homepage/
And for Windows users:
http://www.gpg4win.org/
Linux users, you probably already know that you have it in your software center or equivalent.
On the post: DEA Accused Of Leaking Misleading Info Falsely Implying That It Can't Read Apple iMessages
Re:
Useful tool. It works be creating 2 keys, public and private. The public key can only encrypt the email/document/file, it can't reverse the encryption. The private key though, is one you must protect and keep hidden. That key is the one that breaks the encryption. Keep a backup, but keep it locked up (for example, on a USB drive inside a lockbox) so prying eyes can't get their hands on it.
Using GPG is not too hard. Step 1, create your public and private keys. Step 2, share the public key with anyone at all who would be interested in sending you encrypted emails. Step 3, obtain public keys from anyone you would want to send email to. Now you're ready to use it.
Any emails you receive, you run through your personal private key, and it decrypts. Any emails you send, run the text through the receiving user's public key first to encrypt it, then send it out.
On the post: Damaging The Internet Is Not Acceptable Collateral Damage In The Copyright Wars
Re: Re: Re: Re: Re:
Next >>