The location in Texas was left out of the synopsis. In case you are wondering where this happened;
Plaintiff-Appellant Phillip Turner was video recording a Fort Worth
police station from a public sidewalk across the street when Defendants-
Appellees Officers Grinalds and Dyess approached him and asked him for identification.
Good God! I freaking amazes me how many people, apparently Mike included, feel compelled to come to the defense of companies trying to strong arm local government. Somehow believing that because those companies used a newer technology to operate, they must somehow be above reproach?
WAKE UP!
Uber, and Lyft were/are trying to strong-arm the government into writing laws specifically tailored for their monopoly. They were (past tense) the only companies operating in town when they spent millions of dollars spreading false statistics so they could further their own agenda. In an immature hissy-fit they've now left Austin, and been REPLACED WITH FIVE LEGAL (and one questionable) ALTERNATIVES. Five companies that want to operate legally, with the local government, and community.
People around here in particular, like to complain about how lobbyists are rewriting the laws for their greedy desires. But now when the local community stands up and tries to stop them, how many of you are siding with those same lobbyists?
And to Mike specifically;
What the hell dude! Talk about bad reporting. First off you forget to mention that there's five fully legal ride sharing alternatives currently operating in Austin. Instead you concentrate, and ONLY MENTION THE ONE QUESTIONABLY LEGAL OPERATION! What the hell?
Then the article you link to doesn't even come close to supporting that bull shit statistic that you so blindly parroted. In fact, it shows that ride sharing made no impact on DWI's at all.
Let me repeat that, RIDE SHARING MADE NO IMPACT ON DWI ARRESTS!
Between June 2015 and February 2016, the number of DWI-related wrecks increased by 4 percent when compared with the same nine-month time period in 2014 and 2015, a Statesman analysis found.
Over the past five years, the largest decrease in that June-to-February time period occurred between 2012 and 2013, when the number of drunken driving accidents dropped by 26 percent. That was before Lyft and Uber came to Austin.
In the Statesman analysis, the figures for each period run from June, the month that ride-hailing services came to Austin in 2014, to February, the most recent month that statistics were available.
So Google Fiber is looking like a "disruption to the present broadband market?" That is great marketing speak. Unfortunately the truth is more dismal.
Speaking for here in Austin, Google Fiber is running an estimated 18 months behind schedule. And as far as I know, they still haven't hooked up customer #1 yet. Being an Austin resident, residing slightly outside one of the first three "fiber-hoods" they designated, I don't expect to see Google Fiber for at least two years. If not five.
I don't know, maybe all of this may be normal for rolling out a large fiber network, in a sprawling city. However, to me, it's looking like Google Fiber is having issues. If their roll out rate remains the same in other towns, any stories right now about "how disruptive they are," are a good decade too early.
Shane
I have a Google Fiber t-shirt, Google Fiber shopping bags, Google Fiber pens, Google Fiber water bottles. The only thing I don't have? Google Fiber./div>
Unfortunately I'm the barer of bad news here, so I'll start off with saying explicitly that I DO NOT CONDONE ANY PART OF WHAT I'M ABOUT TO EXPLAIN. I've been trying for the past few months to get the main stream media to pick up the story, alas with no luck.
A technique that is nicely called "HTTPS Snooping" (or more accurately called Man-In-The-Middle-Attack http://en.wikipedia.org/wiki/Man-in-the-middle_attack), is available from companies like Cisco, and Websense. These solutions are currently deployed at companies that are snooping on their employees.
Most companies fear malware, and corporate espionage, and thus justify snooping on private communications of their employees. More respectable companies limit what they can see to things like GMail, and unknown addresses. Less respectable companies (like I've ran across) snoop all traffic, including banking, and health care. Would you really want your fellow employees to know your bank account balance, or what medications you're currently taking? How about your boss?
All of this happens by terminating the HTTPS connection at at a border, or firewall system. The traffic is then decrypted, scanned, re-encrypted and transferred to the end user. All of this works because the end user's system is told to accept the local certificate from the firewall system. The User doesn't recognize that anything is going on, because to their browser, the certificate is valid, and it's encrypted. So to them, everything is working perfectly, and they have no clue that their traffic is being snooped on. When they transmit back (say their login/password information) all of their communications simply reverse the process. The information is encrypted with the local firewall certificate, transmitted to that firewall, decrypted, scanned, and re-encrypted for the end system using the official certificate from that site.
Right now, these systems are deployed on large, paranoid corporate networks. However, it scales very simply. All an ISP would have to do is deploy a larger system (or array of systems) to do the same thing. They could convince their end users to use this system, by telling them to "Install This Network Acceleration Software," that would install their local certificate, and proxy all the traffic through their systems.
With government assistance, they could force say Network Solutions to issue a certificate that is officially signed for all networks. Then the local ISP wouldn't have to require people to install their own local certificate. They could simply pass the certificate down just like normal, and everyone's system would accept it because it was officially signed.
I'll leave the full ramifications of this process, and the problems with certificate based encryption up to others to discuss. I'll simply say this breaks the Internet, and how it was designed.
If you want a more technical in-depth discussion, this was a recent topic on /. (http://ask.slashdot.org/story/12/06/16/223208/ask-slashdot-whats-your-take-on-https-snooping) including me describing my own run in with these systems./div>
Siri, Apple's newest twist on artificial intelligence did start directing people who asked "what is the best smartphone ever" to the Nokia Lumia 900 over the weekend. So, apparently even Siri knows that Apple can't compete any more!
Ahm, isn't this a duplicate of a posting done on April 5th? Google confirms this was posted on April 5th, and links to today's story.
I mean, don't get me wrong, I liked it the first time around. But re-posting it, is the Friday 13th equivalent of f'ing with those of us that haven't quite had enough caffeine yet today.
From the viewpoint of a photographer, I'd think he'd pursue defamation of character, libel, and probably a few other civil items. The FBI certainly knew (or should have known) who is was, and although he could be considered a celebrity, they definitely knew the situation was false.
This is no different than the National Inquirer publishing a false story. The only way they get away with it on a regular basis, is they buy the stories from people that tell them it's true. Once they know it's false, publishing it would be negligence under the Sullivan rule. (http://en.wikipedia.org/wiki/New_York_Times_Co._v._Sullivan)/div>
I do this day in, and day out. I'm doing it right now. I constantly refresh my news feeds, my Facebook stalker feed, and occasionally my LinkedIn feed all looking for little tidbits of data. Something, anything to give me hope that things are getting better. That somewhere, someplace someone has figured out a plan to straighten things out again.
The worse things get, the worse news I find, the more intense I search. There's got to be a way out of this mess the world is coming to. Now if I could just find it./div>
The PDF file opened fine under Ubuntu's Document Viewer. That was the easy part. Reformatting for here, and getting it past the spam filter was a bit harder.
Imagine there is the appropriate "http colon slash slash" in front of the tinyurl.
"5 Million Dollars 1 Terrabyte" File List
Contents Dowload Link File Size Value
Adobe Font Collection tinyurl.com/3qa6 .069GB 20,000
Adobe Creative Suite PC tinyurl.com/3cs7 6GB 2,600
Adobe Creative Suite MAC tinyurl.com/3q2q 6GB 2,600
AutoCAD 2011 PC tinyurl.com/4x4b 2GB 3,600
AutoCAD 2011 MAC tinyurl.com/3osz 2GB 3,600
Artlantis tinyurl.com/3ufc .5GB 1,200
Autodesk Motion Builder tinyurl.com/3kk8 1.6 GB 3,500
Soft Image Face Robot tinyurl.com/3gm8 .5GB 95,000
AutoCAD MAP 3d tinyurl.com/3p53 1GB 6,000
AutoCAD Mega Pack tinyurl.com/3k47 80GB 95,000
Autodesk AutoCAD tinyurl.com/42ca 3GB 1,000
Rosetta Stone Language Pack tinyurl.com/3zcw 33GB 15,000
Complete n64 Game Collection tinyurl.co m/3k33 7GB 4,000
Font Collection tinyurl.com/3bnc 21GB 80,000
N intendo DS Rom Collection tinyurl.com/3kep 137GB 145,000
Fiction Books 2003-2011 tin yurl.com/3vnj 133GB 3,000,000
GBA,GBC,SNES,NEOGEO Roms tinyurl.com/3ofk 27GB 10 ,000
Osprey Book Collection tinyurl.com/3e4a 39GB 180,000
Fiction Library tinyurl.com/3nfu 23GB 400,000
Programming Book Collection tinyurl.com/3l3l 18GB 18,000
PC Games 1979-2001 tinyurl.com/3dvu 130GB 150,000
Nintendo DS Rom Co llection tinyurl.com/4ymc 88GB 100,000
Video Game Collection tinyurl.com/442h 34GB 30,000
Arcade Game Collection tinyurl.com/3dox 20GB 37,000
Music Album Collection tinyurl.com/3j96 124GB 46,000
Java Programming Book Pack tinyurl.com/3 ku4 .5GB 3,000
MATLAB Book Collection tinyurl.com/3glw 1GB 7,500
Visu al Basic Book Collection tinyurl.com/3hb3 .5GB 3,000
Kindle Book Collection tinyur l.com/3pzh 1 9,760
Science Text Book Collection tinyurl.com/3oh9 76GB 500,00 0
Tot al: 1,016GB 4,971,760
Yea, the formatting still sucks, sorry. Best I can do./div>
As soon as all the corrections which happened to be necessary in any particular number of The Times had been assembled and collated, that number would be reprinted, the original copy destroyed, and the corrected copy placed on the files in its stead. This process of continuous alteration was applied not only to newspapers, but to books, periodicals, pamphlets, posters, leaflets, films, sound-tracks, cartoons, photographs – to every kind of literature or documentation which might conceivably hold any political or ideological significance. Day by day and almost minute by minute the past was brought up to date. In this way every prediction made by the Party could be shown by documentary evidence to have been correct, nor was any item of news, or any expression of opinion, which conflicted with the needs of the moment, ever allowed to remain on record. All history was a palimpsest, scraped clean and reinscribed exactly as often as was necessary. In no case would it have been possible, once the deed was done, to prove that any falsification had taken place.
--George Orwell, "1984"
I understand that the rest of the world deals with airport/airplane security by concentrating on "who is flying" instead of "what they bring on-board." However, in the U.S. that probably won't work as effectively. Specifically because, it will still be a government ran agency making the determination.
For example, would you agree to a credit check before you boarded a plane? The first time it appears that someone who was in "massive debt" (ie: most everyone in America) took payment to bring something on a flight, it will happen. Are you unemployed, and flying to a job interview somewhere? Sorry about you luck, you're now a security risk!
How about your driving record? Get a speeding ticket on the way to the airport? Sorry, you're reckless and distracted. You must be a terrorist!
Taxes? Are you about to be audited? What do you have to live for? You must be a terrorist!
How about medical records? Just diagnosed with a fatal condition, and want to spend your remaining days with family? What do you have to live for? You must be a terrorist!
No, "who" over "what" doesn't solve the problem, as long as the deranged puppet masters of this security theatre are still making the rules.
Government has to solve the problem, that's what government is there for. However, the mentality and approach used to determine who is a threat has to change. Ignoring humanity, and liberty to appease the paranoid will achieve nothing.
Fort Worth
The location in Texas was left out of the synopsis. In case you are wondering where this happened;
/div>Parroting Uber, and Lyft talking points don't make them any more legit
WAKE UP!
Uber, and Lyft were/are trying to strong-arm the government into writing laws specifically tailored for their monopoly. They were (past tense) the only companies operating in town when they spent millions of dollars spreading false statistics so they could further their own agenda. In an immature hissy-fit they've now left Austin, and been REPLACED WITH FIVE LEGAL (and one questionable) ALTERNATIVES. Five companies that want to operate legally, with the local government, and community.
People around here in particular, like to complain about how lobbyists are rewriting the laws for their greedy desires. But now when the local community stands up and tries to stop them, how many of you are siding with those same lobbyists?
And to Mike specifically;
What the hell dude! Talk about bad reporting. First off you forget to mention that there's five fully legal ride sharing alternatives currently operating in Austin. Instead you concentrate, and ONLY MENTION THE ONE QUESTIONABLY LEGAL OPERATION! What the hell?
Then the article you link to doesn't even come close to supporting that bull shit statistic that you so blindly parroted. In fact, it shows that ride sharing made no impact on DWI's at all.
Let me repeat that, RIDE SHARING MADE NO IMPACT ON DWI ARRESTS!
(http://www.mystatesman.com/news/news/local-govt-politics/police-revise-drunken-driving-crash-stats- key-to-p/nrHyH/)
If ride sharing never reduced the number of DWI arrests, how can it somehow spike them after they've left?
And that's from the article that YOU LINKED TO! Come on Mike, I expect much better reporting out of you and Techdirt in general./div>
Follow the money...
Binge On was NOT enabled on my account
Jumping the gun, aren't we?
Speaking for here in Austin, Google Fiber is running an estimated 18 months behind schedule. And as far as I know, they still haven't hooked up customer #1 yet. Being an Austin resident, residing slightly outside one of the first three "fiber-hoods" they designated, I don't expect to see Google Fiber for at least two years. If not five.
I don't know, maybe all of this may be normal for rolling out a large fiber network, in a sprawling city. However, to me, it's looking like Google Fiber is having issues. If their roll out rate remains the same in other towns, any stories right now about "how disruptive they are," are a good decade too early.
Shane
I have a Google Fiber t-shirt, Google Fiber shopping bags, Google Fiber pens, Google Fiber water bottles. The only thing I don't have? Google Fiber./div>
(untitled comment)
Don't forget!
http://www.smbc-comics.com/comics/20120920after.gif/div>
Technically speaking, there's currently a way to implament this now
A technique that is nicely called "HTTPS Snooping" (or more accurately called Man-In-The-Middle-Attack http://en.wikipedia.org/wiki/Man-in-the-middle_attack), is available from companies like Cisco, and Websense. These solutions are currently deployed at companies that are snooping on their employees.
Most companies fear malware, and corporate espionage, and thus justify snooping on private communications of their employees. More respectable companies limit what they can see to things like GMail, and unknown addresses. Less respectable companies (like I've ran across) snoop all traffic, including banking, and health care. Would you really want your fellow employees to know your bank account balance, or what medications you're currently taking? How about your boss?
All of this happens by terminating the HTTPS connection at at a border, or firewall system. The traffic is then decrypted, scanned, re-encrypted and transferred to the end user. All of this works because the end user's system is told to accept the local certificate from the firewall system. The User doesn't recognize that anything is going on, because to their browser, the certificate is valid, and it's encrypted. So to them, everything is working perfectly, and they have no clue that their traffic is being snooped on. When they transmit back (say their login/password information) all of their communications simply reverse the process. The information is encrypted with the local firewall certificate, transmitted to that firewall, decrypted, scanned, and re-encrypted for the end system using the official certificate from that site.
Right now, these systems are deployed on large, paranoid corporate networks. However, it scales very simply. All an ISP would have to do is deploy a larger system (or array of systems) to do the same thing. They could convince their end users to use this system, by telling them to "Install This Network Acceleration Software," that would install their local certificate, and proxy all the traffic through their systems.
With government assistance, they could force say Network Solutions to issue a certificate that is officially signed for all networks. Then the local ISP wouldn't have to require people to install their own local certificate. They could simply pass the certificate down just like normal, and everyone's system would accept it because it was officially signed.
I'll leave the full ramifications of this process, and the problems with certificate based encryption up to others to discuss. I'll simply say this breaks the Internet, and how it was designed.
If you want a more technical in-depth discussion, this was a recent topic on /. (http://ask.slashdot.org/story/12/06/16/223208/ask-slashdot-whats-your-take-on-https-snooping) including me describing my own run in with these systems./div>
Well Siri sorta agrees
http://www.bbc.co.uk/news/technology-18071342/div>
Next version of SOPA
No, the next version of SOPA will simply make it illegal to contradict the official government version of history.
http://en.wikipedia.org/wiki/Nineteen_Eighty-Four#Censorship/div>
Repost? Duplicate? Mike's early onset of Alzheimer's?
I mean, don't get me wrong, I liked it the first time around. But re-posting it, is the Friday 13th equivalent of f'ing with those of us that haven't quite had enough caffeine yet today.
Shane/div>
Photographers viewpoint
This is no different than the National Inquirer publishing a false story. The only way they get away with it on a regular basis, is they buy the stories from people that tell them it's true. Once they know it's false, publishing it would be negligence under the Sullivan rule. (http://en.wikipedia.org/wiki/New_York_Times_Co._v._Sullivan)/div>
Where's all that water coming from?
Just like Facebook changing the layout...again?/div>
Yes I do this
The worse things get, the worse news I find, the more intense I search. There's got to be a way out of this mess the world is coming to. Now if I could just find it./div>
Congress
Where's the real Congress?/div>
Contents of the PDF file.
Imagine there is the appropriate "http colon slash slash" in front of the tinyurl.
Yea, the formatting still sucks, sorry. Best I can do./div>
Contents of the PDF file.
Sorry about the formatting, I tried to align it from the PDF the best I could./div>
Trolling
History
That reminds me. I should donate some money to the Internet Archive. (http://www.archive.org/donate/)/div>
Who is on the plane doesn't necessarily solve the problem either
For example, would you agree to a credit check before you boarded a plane? The first time it appears that someone who was in "massive debt" (ie: most everyone in America) took payment to bring something on a flight, it will happen. Are you unemployed, and flying to a job interview somewhere? Sorry about you luck, you're now a security risk!
How about your driving record? Get a speeding ticket on the way to the airport? Sorry, you're reckless and distracted. You must be a terrorist!
Taxes? Are you about to be audited? What do you have to live for? You must be a terrorist!
How about medical records? Just diagnosed with a fatal condition, and want to spend your remaining days with family? What do you have to live for? You must be a terrorist!
No, "who" over "what" doesn't solve the problem, as long as the deranged puppet masters of this security theatre are still making the rules.
Government has to solve the problem, that's what government is there for. However, the mentality and approach used to determine who is a threat has to change. Ignoring humanity, and liberty to appease the paranoid will achieve nothing.
Shane/div>
More comments from Shane C >>
Techdirt has not posted any stories submitted by Shane C.
Submit a story now.
Tools & Services
TwitterFacebook
RSS
Podcast
Research & Reports
Company
About UsAdvertising Policies
Privacy
Contact
Help & FeedbackMedia Kit
Sponsor/Advertise
Submit a Story
More
Copia InstituteInsider Shop
Support Techdirt