UPDATE: my network started doing that thing where the DNS servers disappear every 2 minutes as soon as I posted this. Bastards.
UPDATE 2: This blog has recently been followed by the international english broadcasting apparatus of the state of Iran. It is not impossible that they are also logging who clicks the like button and comments and stuff (and there is another possible reason for an anomymous blog). On the other hand I’m thinking more seriously about self publishing now…
This is how Moore’s law work. Consider the recent NSA scandal: we use the same amount of data as we did before (okay maybe 2 or 3x more) but their capacity to store and decipher grows along the lines of Moore’s law: this is why I tend to disagree with the recent article I read where one Netroots Nation blogger said that “I know what metadata is; even with the most powerful computers they couldn’t store all the calls”. Audio is not that gigantic of a data stream and once unbreakable passwords and keys can now be cracked in 10 minutes by a cluster of servers on Amazon EC2 (https://www.wpacracker.com/)… They are limited much more by manpower than computers however many people of my generation and younger do not care if their network activity is followed (or interfered with(?))… (https://optin.stopwatching.us/) however in order to get true security you need not only well behaved spies but also passkeys that would take like ‘the age of the universe’ or equivalent for a single PC to crack (1/1000th of that for 1000 cloud VMs)….
What other options do we have for security? 1) use passphrases instead of passwords where possible https://en.wikipedia.org/wiki/Passphrase … use HTTPS Everywhere and Ghostery in your web browser, encrypt the disks and your phone, and use Silent Circle (https://silentcircle.com/) which encrypts your calls and message and also has a ‘burn after reading’ function…. You could join the Tor onion routing anonymizer too I suppose. Paradoxically this may get you very close scrutiny from the evil spies (one recent headline said ‘If you encrypt anything, the NSA thinks you might be evil, so they keep everything until they’re sure’) …
Do I do all these things? No. And the sad fact is that these cryptofascist children, with the new parallel processing technology of using graphics processor chips instead of just CPUs to handle bignum computing, could easily have an encryption hacker run 1 million times faster on 1000 machines, not just 1000 times.
The right is up in arms over this while the left dislikes it but is perhaps still too fatigued and jaded from the Bush years to work up a sweat over it… but this is an opportunity to change the law, if they can reach some agreement, left and right quarks, strange and charm quarks on this burning issue. Turn off the TV (programmable hypnosis, numbness, and social atomisation for all!) for a moment and lets run this thing back into the maw of Azathoth where it came from.
Also sign the petition: https://optin.stopwatching.us/
Of the things mentioned, Ghostery and HTTPS Everywhere are the easiest, followed by using the internet as a tool only, and not as a pervasive entertainment device. That and throwing out your cellphone and getting an old fashioned one. (no I’m not ready for that last one either). Alternative: keep your phone switched off except when its needed.
It makes me highly suspicious when my phone stops delivering messages to someone I have known for a year and had not quarrelled with…
For more on cryptofascism …. well I’ll just let you google it and see what you find; or if you might prefer not to have your searches and clicks recorded duckduckgo it instead ( duckduckgo.com )