Whenever someone drives down the wrong side of a highway and kills people, we don't see it being rebuilt into a zig zag pattern, speed bumps added, and mud poured in. If there's a few bad actors out there the public shouldn't pay for it by being forced to use gimped infrastructure. Private toll roads get a pass too if their roads are designed and kept up according to the same standards.
Section 512 should be dropped in favor of audits and specific guidelines on private hosting companies to make sure they're not conspiring with the infringers, terrorists, pedophiles, etc.
And then grant them full immunity from contributory cases. No notice & takedown provisions, let the courts handle that.
The EFF used a single phone, trying to download a video file hosted on one of their own servers. Then they flipped the switch on Binge On and tested again.
Running Android/iOS versions of tcpdump & traceroute and having the phone stream something from YouTube would be much better.
TBH the EFF's tests didn't go far enough to prove throttling.
Poor mean throughput could still be caused by Binge On users being pointed to an overloaded server located thousands of miles and several additional router hops from them.
Identical routes and graphs proving traffic shaping would be more damning evidence.
DRM in HTML5 is a Joke (And Why You Should Support The Spec)
Publishers will look elsewhere if it's not implemented... like TBL said "back to Flash" even though they pretty much never left Flash or Silverlight. But it would be amusing to see them get what they want in HTML5 only to find out the shiny new DRM they backed is actually built to make it easier for people save full quality videos to their own computer (the shock! the horror!)
Even something that hasn't been cracked yet programmatically can be bypassed by using screen capture software, but all "useful" DRM relies on obfuscation of the decryption method and closed-source code. The Encrypted Media Extensions spec is openly published and if it ends up in an open source web browser someone could easily add an on/off switch or a download button, perhaps even officially (Mozilla are you listening???)
One upside that seems to be overlooked is that EME could be used for encrypted live video streams over HTTP. There are already javascript crypto libraries that can be used to securely transfer live text over HTTP, and the speed of DH key exchange operations will improved when the native "Web Cryptography API" starts being implemented in browsers.
So a crutch for the content industry's shiny new broken-by-design DRM might actually be a powerful tool against surveillance.
Adobe has announced diminished support on certain platforms but it's not like they gutted the team and boarded up the doors yet. They still actively maintain ARM and x86 ports of Adobe AIR and Flash Player.
Flash Player for Android Ice Cream Sandwich unofficially works on Jelly Bean.
Microsoft amusingly enabled Flash Player by default in an update for Surface RT devices yesterday, probably to prevent Surface Pro devices from completely cannibalizing sales, yet like most other Windows apps there's not even a Silverlight browser plugin for RT...
Blame should be squarely on the registrar for handling the situation like they did. Taking down t.co didn't even take down the phishing site, as it was only linking to one. How many times have we heard a story like this happen before at different levels of the internet food chain (site->datacenter->registrar->government)? This will continue happening forever but it can become less annoying if there was an automated scheme in place to send browsers to an alternate location or two.
If they hacked the FBI they probably were smart enough to send the data to a server somewhere that they anonymously paid for, rather than trying to push 3TB over 7 proxies. It would have still taken a while but not more than a few days over a fiber uplink the FBI should be using.
Large upload monitoring can be thwarted by splitting the data into smaller packets. Any small leak could be damaging on it's own. If they they are trying to stop the problem at that point, they've already lost. I don't see any reason a dossier on Apple devices and their owners would need to be that accessible in the first place.
The explanation raises more questions than answers
Such as admitting "I worked for them in 2008"
Perhaps someone from the campaign recognized her screenname, or she was luckily or randomly picked out of thousands and had nothing to do with the selection?
Okay.
Even if the question wasn't planted, knowingly asking softball questions is a shameful thing for a journalist/blogger to do.
Like we can't already get those answers from campaign ads, stump speeches, candidate web sites, many mainstream media interviews, etc.
Perhaps they intercepted a plot to have man-in-the-middle attacks on unsuspecting attendees. They can enforce the ban by following the radio signals to their source. Turning off SSID broadcasting is effective in evading simple scanning but not guaranteed for more sophisticated methods they could use.
Re: Re: Re: a*hole trying to hide the dirt now. robots.txt archive block just went live
I know it's been blocked from viewing online, but the copies probably weren't deleted from their servers. Here's an example of a judge ordering a company to remove a robots.txt file from their website so historical pages could be restored and the Wayback Machine could be used for discovery purposes:
Re: a*hole trying to hide the dirt now. robots.txt archive block just went live
As far as I know they don't delete snapshots if someone just puts up a robots.txt file. When they launched the new Wayback Machine about a year ago I was able to access snapshots of sites that were blocked for years. My theory is that they didn't import the existing exclusion database from the classic Wayback Machine, but had each site's robots.txt recrawled. That sometimes left open a window of 5-10 minutes to browse a site that was supposed to be blocked. I think if someone wants something truly removed from their servers they need a court order and as a library they have some protections against that happening.
On the post: Texas Legislature Says You Can't Teach About Racism In Schools, But Social Media Sites Must Host Holocaust Denialism
Re: Re:
A woman whose son died in the Kabul terrorist attack the other day was banned more or less for saying Biden is unfit to lead.
On the post: Copyright Office Pushing Dangerous And Ridiculous Plan To Strip Websites Of DMCA Safe Harbors
Re: Proof of timely registration
1998-2002 $20
2002-2006 $30
2006-2008 $80
2008-Present $105
On the post: US Copyright Office Asks For Public Comments On DMCA's Notice And Takedown
Section 512 extensions IRL (Car Analogy)
Section 512 should be dropped in favor of audits and specific guidelines on private hosting companies to make sure they're not conspiring with the infringers, terrorists, pedophiles, etc.
And then grant them full immunity from contributory cases. No notice & takedown provisions, let the courts handle that.
On the post: T-Mobile Is Flat Out Lying: It's Throttling Video Even Though It Says It's Not
Re:
Running Android/iOS versions of tcpdump & traceroute and having the phone stream something from YouTube would be much better.
On the post: T-Mobile Is Flat Out Lying: It's Throttling Video Even Though It Says It's Not
Poor mean throughput could still be caused by Binge On users being pointed to an overloaded server located thousands of miles and several additional router hops from them.
Identical routes and graphs proving traffic shaping would be more damning evidence.
On the post: Senator Feinstein Finally Finds Surveillance To Get Angry About: When It Happened To Her Staffers
Re: And then they came for me
On the post: Former Police Chief Defends NYPD's 'Stop And Frisk' Program, Because It Has A Checklist
On the post: Disappointing: Tim Berners-Lee Defends DRM In HTML 5
Re: Re: Re: Re: Re:
Talk about cutting off the nose to spite the face...
On the post: Disappointing: Tim Berners-Lee Defends DRM In HTML 5
DRM in HTML5 is a Joke (And Why You Should Support The Spec)
Even something that hasn't been cracked yet programmatically can be bypassed by using screen capture software, but all "useful" DRM relies on obfuscation of the decryption method and closed-source code. The Encrypted Media Extensions spec is openly published and if it ends up in an open source web browser someone could easily add an on/off switch or a download button, perhaps even officially (Mozilla are you listening???)
One upside that seems to be overlooked is that EME could be used for encrypted live video streams over HTTP. There are already javascript crypto libraries that can be used to securely transfer live text over HTTP, and the speed of DH key exchange operations will improved when the native "Web Cryptography API" starts being implemented in browsers.
So a crutch for the content industry's shiny new broken-by-design DRM might actually be a powerful tool against surveillance.
On the post: Disappointing: Tim Berners-Lee Defends DRM In HTML 5
Re:
Flash Player for Android Ice Cream Sandwich unofficially works on Jelly Bean.
Microsoft amusingly enabled Flash Player by default in an update for Surface RT devices yesterday, probably to prevent Surface Pro devices from completely cannibalizing sales, yet like most other Windows apps there's not even a Silverlight browser plugin for RT...
On the post: 'Human Error' Briefly Kills All Shortened Twitter Links
On the post: FBI Denies That Hacked Apple Info Came From FBI
Re: Re: Re:
Large upload monitoring can be thwarted by splitting the data into smaller packets. Any small leak could be damaging on it's own. If they they are trying to stop the problem at that point, they've already lost. I don't see any reason a dossier on Apple devices and their owners would need to be that accessible in the first place.
On the post: Reddit Sleuths In Action: Highlight How Obama Answered A 'Planted' Question [Update: Or Not?]
Re: Re:
Such as admitting "I worked for them in 2008"
Perhaps someone from the campaign recognized her screenname, or she was luckily or randomly picked out of thousands and had nothing to do with the selection?
Okay.
Even if the question wasn't planted, knowingly asking softball questions is a shameful thing for a journalist/blogger to do.
Like we can't already get those answers from campaign ads, stump speeches, candidate web sites, many mainstream media interviews, etc.
On the post: Reddit Sleuths In Action: Highlight How Obama Answered A 'Planted' Question [Update: Or Not?]
On the post: Fifteen Years Ago Today, Techdirt Was Born
Re:
On the post: If You Go To The Olympics, You Can Bring Your iPhone Or Android Phone... But You Better Not Tether
On the post: Sarkozy Seeks To Criminalize 'Habitually Visiting' Websites About Violence
Re: Police visit those sites too
On the post: Hollywood Astroturf Group Releases Ad Saying It Needs SOPA To Shut Down Megaupload... Five Days After Megaupload Is Shut Down
On the post: Lamar Smith Caught Infringing On Photographer's Copyright
Re: Re: Re: a*hole trying to hide the dirt now. robots.txt archive block just went live
http://en.wikipedia.org/wiki/Wayback_Machine#Netbula_LLC_v._Chordiant_Software_Inc.
On the post: Lamar Smith Caught Infringing On Photographer's Copyright
Re: a*hole trying to hide the dirt now. robots.txt archive block just went live
Next >>