Pinboard (jm)
https://pinboard.in/u:jm/public/
recent bookmarks from jmFireside Chat with Vint Cerf & Marc Andreessen (Google Cloud Next '17) - YouTube2017-05-15T10:09:07+00:00
https://youtu.be/y9bJ8LslSZ4?t=27m00s
jmvint-cerf gcp regulation oversight politics law reliability systemshttps://pinboard.in/https://pinboard.in/u:jm/b:3abb7da356e4/NSA: Linux Journal is an "extremist forum" and its readers get flagged for extra surveillance2014-07-04T09:16:32+00:00
http://www.linuxjournal.com/content/nsa-linux-journal-extremist-forum-and-its-readers-get-flagged-extra-surveillance
jmDasErste.de has published the relevant XKEYSCORE source code, and if you look closely at the rule definitions, you will see linuxjournal.com/content/linux* listed alongside Tails and Tor. According to an article on DasErste.de, the NSA considers Linux Journal an "extremist forum". This means that merely looking for any Linux content on Linux Journal, not just content about anonymizing software or encryption, is considered suspicious and means your Internet traffic may be stored indefinitely.
This is, sadly, entirely predictable -- that's what happens when you optimize the system for over-sampling, with poor oversight.]]>false-positives linuxjournal linux terrorism tor tails nsa surveillance snooping xkeyscore selectors oversighthttps://pinboard.in/https://pinboard.in/u:jm/b:c5ec3c5b6761/How the NSA Plans to Infect 'Millions' of Computers with Malware - The Intercept2014-03-12T17:25:29+00:00
https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/
jmThe implants being deployed were once reserved for a few hundred hard-to-reach targets, whose communications could not be monitored through traditional wiretaps. But the documents analyzed by The Intercept show how the NSA has aggressively accelerated its hacking initiatives in the past decade by computerizing some processes previously handled by humans. The automated system – codenamed TURBINE – is designed to “allow the current implant network to scale to large size (millions of implants) by creating a system that does automated control implants by groups instead of individually.” In a top-secret presentation, dated August 2009, the NSA describes a pre-programmed part of the covert infrastructure called the “Expert System,” which is designed to operate “like the brain.”
Great. Automated malware deployment to millions of random victims. See also the "I hunt sysadmins" section further down...]]>malware gchq nsa oversight infection expert-systems turbine false-positives the-intercept surveillancehttps://pinboard.in/https://pinboard.in/u:jm/b:24f41bcf95c4/BBC News - Chinese firm Huawei controls net filter praised by PM2013-07-26T13:26:50+00:00
http://www.bbc.co.uk/news/technology-23452097
jmhuawei talk-talk oversight overblocking politics china uk david-cameron filtering censorshiphttps://pinboard.in/https://pinboard.in/u:jm/b:2c4e0c1973c4/Digital Rights Ireland » Garda plans to introduce web blocking in Ireland2011-03-29T12:28:18+00:00
http://www.digitalrights.ie/2011/03/29/garda-plans-to-introduce-web-blocking-in-ireland/
jmgardai blocking filtering ireland politics legislation oversight isps ispai alto censorship effhttps://pinboard.in/u:jm/b:1e0e7241c2d5/