Category Archives: Public Policy

Truly Anonymous Surfing?

This article in Wired talks about a new method for masking online identities to provide ultra-anonymous Internet access. It was developed by Hacktivismo, an offshoot of the hacker collective Cult of the Dead Cow (cDc), and is called “Six/Four”, named after the June 4, 1989 massacre in Beijing’s Tiananmen Square. Six/Four combines peer-to-peer technologies with Virtual Private Networking (VPN) and “open proxy” connections, which allow one computer to establish direct, secure communications with another over the Internet. Traditional VPNs take the information along a single path from Point A to Point B. Six/Four’s route is more circuitous, sending its tunnel through a series of computers on its peer-to-peer network before heading to the public Internet. Data goes from Point A to Point K to Point Z to Point G, only eventually winding up at Point B. Each link in the chain only knows the link immediately before, not the final destination. Since every server along the way requires separate search warrant in order to view that computer’s logs (if they even still exist) to get your IP address, the approach adds layer after layer of anonymity between client and server. One developer says “It’s like a highway that’s redesigned for every Brinks truck that rides on it.”

Copyleft 101

NewScientist has a very good survey article regarding copyleft. They discuss the legal implications of waiving the exclusivity rights, as well as the philosophical differences in vision regarding the commercialization of intellectual properties.

Online Rights: No "Deep Linking" – Texas

Wired News is reporting on a cease and desist letter sent to an independent news site by Belo, corporate parent of The Dallas Morning News, forbidding links to individual stories within the web site. They claim the author can only link to the web site’s homepage, and attempting to link to stories within the site violates their copyright.

If things move in this direction, the best characteristics of the web will be wasted.

Informatics Used to Manipulate Politics

The Economist is publishing an article describing how information about demographics is leading to an algorythmic method of “redistricting” to enable very meaningful manipulation of state-wide votes.

The article provides examples, and even claims “Weirdly shaped districts… are signs that a crime has been committed. Again, start with Florida. This year, the Republican-controlled legislature has proposed a map with 18 Republican-leaning seats and seven Democratic ones. But as the 2000 presidential vote showed, Florida’s electorate is split perfectly down the middle. The map has been rigged outrageously to favour the Republicans. ”

The Article also discusses the cases of Michigan, Texas, and California.

Electronic terrorism and anti-terrorism

The Los Angeles Times is reporting that the CIA is warning of possible cyber-terrorism against U.S. and Taiwanese computer systems by the Chinese Army. The United States Secret Service is considering proactive defense strategies.