Was sonst noch interessant war: Netz-Sperren, Forschung mit E-Mail, Open Data Kritik

A Weapon We Can’t Control

New York Times – Misha Glenny

During the cold war, countries’ chief assets were missiles with nuclear warheads. Generally their number and location was common knowledge, as was the damage they could inflict and how long it would take them to inflict it.

Advanced cyberwar is different: a country’s assets lie as much in the weaknesses of enemy computer defenses as in the power of the weapons it possesses. So in order to assess one’s own capability, there is a strong temptation to penetrate the enemy’s systems before a conflict erupts. It is no good trying to hit them once hostilities have broken out; they will be prepared and there’s a risk that they already will have infected your systems. Once the logic of cyberwarfare takes hold, it is worryingly pre-emptive and can lead to the uncontrolled spread of malware.

International conference against commercial sexual exploitation of children in Tokio, Japan

Deutsche Kinderhilfe – Georg Ehrmann

First of all admitting, that Deutsche Kinderhilfe used to support the law regulated access blocking in 2009, I described the severe disappointments by reluctant policy makers hiding behind a false sense of security, ignoring that harming contents can turn up again on other websites easily, just to calm the voters. Bothered by doubtful statistics, created to support access blocking only, the Deutsche Kinderhilfe is now convinced that access blocking is neither an effective nor a desirable method. The opposite is true. Nowadays, defeating blocking system and moving web sides automatically is a breeze for criminals even with smattering knowledge.

Evgeny Morozov curbs Web enthusiasm

Los Angeles Times – James Rainey

His next book will include an attack on the „open data“ movement. In one cautionary example, the Indian state of Karnataka put millions of property records online in the name of convenience and transparency.

„The wealthy and the powerful used this new data to evict the poor, find the right people to bribe and so forth,“ Morozov said. „The moral of the story here is that transparency and efficiency should not be pursued for their own sake. They should serve as enabling factors to other goods and values.“

Globale Wanderungstrends im E-Mail-Verkehr entdeckt

Max-Planck-Institut fürr demografische Forschung – Emilio Zagheni

In diesem Fenster soll der Inhalt eines Drittanbieters wiedergegeben werden. Hierbei fließen personenbezogene Daten von Dir an diesen Anbieter. Aus technischen Gründen muss zum Beispiel Deine IP-Adresse übermittelt werden. Viele Unternehmen nutzen die Möglichkeit jedoch auch, um Dein Nutzungsverhalten mithilfe von Cookies oder anderen Tracking-Technologien zu Marktforschungs- und Marketingzwecken zu analysieren.

Wir verhindern mit dem WordPress-Plugin „Embed Privacy“ einen Abfluss deiner Daten an den Drittanbieter so lange, bis Du aktiv auf diesen Hinweis klickst. Technisch gesehen wird der Inhalt erst nach dem Klick eingebunden. Der Drittanbieter betrachtet Deinen Klick möglicherweise als Einwilligung die Nutzung deiner Daten. Weitere Informationen stellt der Drittanbieter hoffentlich in der Datenschutzerklärung bereit.

Zur Datenschutzerklärung von TED

Zur Datenschutzerklärung von netzpolitik.org

The Register – Iain Thomson

Phil Zimmermann and some of the original PGP team have joined up with former US Navy SEALs to build an encrypted communications platform that should be proof against any surveillance.

The company, called Silent Circle, will launch later this year, when $20 a month will buy you encrypted email, text messages, phone calls, and videoconferencing in a package that looks to be strong enough to have the NSA seriously worried.

The Tor Project helps journalists and whistleblowers go online without leaving a trace

Nieman Lab – Adrienne LaFrance

With an infusion of Knight News Challenge funds announced Monday, Tor will establish a multilingual help desk so that people using the software around the world can get instant assistance any time.

3 Ergänzungen

  1. Der Schlüsselaustausch bei Phil Zimmermanns Silent Circle soll via Diffie Hellman geschehen, anfällig für Man-In-The-Middle.

  2. …have joined up with former US Navy SEALs to build an encrypted communications platform that should be proof against any surveillance.

    Göttlich!

Dieser Artikel ist älter als ein Jahr, daher sind die Ergänzungen geschlossen.