jm + internet   180

Tech Leaders Dismayed by Weaponization of Social Media - IEEE Spectrum
“We have passed the fail-safe point,” McNamee said. “I don’t think we can get back to the Silicon Valley that I loved. At this point we just have to save America.”
propaganda  fake-news  facebook  twitter  social-media  us-politics  brexit  internet  russia  silicon-valley  usa 
20 days ago by jm
Something is wrong on the internet – James Bridle – Medium
'an essay on YouTube, children's videos, automation, abuse, and violence, which crystallises a lot of my current feelings about the internet through a particularly unpleasant example from it. [...]

What we’re talking about is very young children [..] being deliberately targeted with content which will traumatise and disturb them, via networks which are extremely vulnerable to exactly this form of abuse. It’s not about trolls, but about a kind of violence inherent in the combination of digital systems and capitalist incentives. It’s down to that level of the metal.'
internet  youtube  children  web  automation  violence  horror  4chan  james-bridle 
4 weeks ago by jm
Normietivity: A Review of Angela Nagle's Kill all Normies
Due to a persistent vagueness in targets and refusal to respond to the best arguments presented by those she loosely groups together, Nagle does not provide the thoroughgoing and immanent treatment of the left which would be required to achieve the profound intervention she clearly intended. Nor does she grapple with the difficult implications figures like Greer (with her transphobic campaign against a vulnerable colleague) and Milo (with his direct advocacy for the nativist and carceral state) present for free speech absolutists. And indeed, the blurring their specifically shared transphobia causes for distinguishing between left and right wing social analysis.

In genre terms, Nagle’s writing is best described as travel writing for internet culture. Kill All Normies provides a string of curios and oddities (from neo-nazi cults, to inscrutably gendered teenagers) to an audience expected to find them unfamiliar, and titillating. Nagle attempts to cast herself as an aloof and wry explorer, but at various points her commitments become all too clear. Nagle implicitly casts her reader as the eponymous normies, overlooking those of us who live through lives with transgenders, in the wake of colonialism, despite invisible disabilities (including depression), and all the rest.

This is both a shame and a missed opportunity, because the deadly violence the Alt-Right has proven itself capable of is in urgent need of evaluation, but so too are the very real dysfunctions which afflict the left (both online and IRL). After this book patient, discerning, explanatory, and immanent readings of internet culture remain sorely needed. The best that can be said for Kill All Normies is, as the old meme goes, “An attempt was made.”
angela-nagle  normies  books  reading  transphobia  germaine-greer  milo  alt-right  politics  internet  4chan 
11 weeks ago by jm
"You Can't Stay Here: The Efficacy of Reddit’s 2015 Ban Examined Through Hate Speech"

In 2015, Reddit closed several subreddits—foremost among them r/fatpeoplehate and r/CoonTown—due to violations of Reddit’s anti-harassment policy. However, the effectiveness of banning as a moderation approach remains unclear: banning might diminish hateful behavior, or it may relocate such behavior to different parts of the site.

We study the ban of r/fatpeoplehate and r/CoonTown in terms of its effect on both participating users and affected subreddits. Working from over 100M Reddit posts and comments, we generate hate speech lexicons to examine variations in hate speech usage via causal inference methods. We find that the ban worked for Reddit. More accounts than expected discontinued using the site; those that stayed drastically decreased their hate speech usage—by at least 80%. Though many subreddits saw an influx of r/fatpeoplehate and r/CoonTown “migrants,” those subreddits saw no significant changes in hate speech usage. In other words, other subreddits did not inherit the problem. We conclude by reflecting on the apparent success of the ban, discussing implications for online moderation, Reddit and internet communities more broadly.


(Via Anil Dash)
abuse  reddit  research  hate-speech  community  moderation  racism  internet 
september 2017 by jm
Godwin repeals Godwin's Law
'By All Means, Compare These Shitheads to the Nazis'
mike-godwin  nazis  shitheads  funny  godwins-law  internet 
august 2017 by jm
Mounir Mahjoub​i​, the 'geek' who saved Macron's campaign: 'We knew we were going to be attacked' | World news | The Guardian
What a great story.

As a child, he was into maths and geometry, the middle child with one sister 10 years older and another 10 years younger. “I heard about this incredible new thing called the internet,” he says, adding how, aged 12, he saw an advert for the Paris science museum where you could try the internet for free. “There were 15 computers and you queued to have an hour free if you bought an entry ticket. I bought an annual pass to the museum and every Saturday and Sunday I’d travel from one side of Paris to the other to get on the internet and see what it was about. I’d go on Yahoo, chat with people on the other side of the world. I didn’t speak great English then so it wasn’t brilliant chat ...”


(via Niall Murphy)
france  mounir-mahjoubi  internet  computers  society  macron  politics  security 
june 2017 by jm
iKydz
'Total Parent Control' for kids internet access at home. Dublin-based product, dedicated wifi AP with lots of child-oriented filtering capabilities
filtering  security  ikydz  kids  children  internet  wifi  ap  hardware  blocking 
may 2017 by jm
Build a Better Monster: Morality, Machine Learning, and Mass Surveillance

We built the commercial internet by mastering techniques of persuasion and surveillance that we’ve extended to billions of people, including essentially the entire population of the Western democracies. But admitting that this tool of social control might be conducive to authoritarianism is not something we’re ready to face. After all, we're good people. We like freedom. How could we have built tools that subvert it?

As Upton Sinclair said, “It is difficult to get a man to understand something, when his salary depends on his not understanding it.”

I contend that there are structural reasons to worry about the role of the tech industry in American political life, and that we have only a brief window of time in which to fix this.
advertising  facebook  google  internet  politics  surveillance  democracy  maciej-ceglowski  talks  morality  machine-learning 
april 2017 by jm
4chan: The Skeleton Key to the Rise of Trump
This is the best article on chan culture and how it's taken over
4chan  8chan  somethingawful  boards  history  internet  trump  alt-right 
february 2017 by jm
Riot Games Seek Court Justice After Internet Provider Deliberately Causes In-Game Lag
Pretty damning for Time-Warner Cable:
When it seemed that the service provider couldn’t sink any lower, they opted to hold Riot to a ‘lag ransom’. Following Riot’s complaints regarding the inexplicable lag the player base were experiencing, TWC offered to magically solve the issue, a hardball tactic to which Riot finally admitted defeat in August of 2015. Before the deal was finalised, lag and data-packet loss for League of Legends players were far above the standards Riot was aiming for. Miraculously, after the two tech companies reached an unpleasant deal, the numbers improved.
ftc  fcc  twc  time-warner  cable  isps  network-neutrality  league-of-legends  internet 
february 2017 by jm
The hidden cost of QUIC and TOU
The recent movement to get all traffic encrypted has of course been great for the Internet. But the use of encryption in these protocols is different than in TLS. In TLS, the goal was to ensure the privacy and integrity of the payload. It's almost axiomatic that third parties should not be able to read or modify the web page you're loading over HTTPS. QUIC and TOU go further. They encrypt the control information, not just the payload. This provides no meaningful privacy or security benefits.

Instead the apparent goal is to break the back of middleboxes [0]. The idea is that TCP can't evolve due to middleboxes and is pretty much fully ossified. They interfere with connections in all kinds of ways, like stripping away unknown TCP options or dropping packets with unknown TCP options or with specific rare TCP flags set. The possibilities for breakage are endless, and any protocol extensions have to jump through a lot of hoops to try to minimize the damage.
quic  tou  protocols  http  tls  security  internet  crypto  privacy  firewalls  debugging  operability 
december 2016 by jm
mjg59 | Fixing the IoT isn't going to be easy
We can't easily fix the already broken devices, we can't easily stop more broken devices from being shipped and we can't easily guarantee that we can fix future devices that end up broken. The only solution I see working at all is to require ISPs to cut people off, and that's going to involve a great deal of pain. The harsh reality is that this is almost certainly just the tip of the iceberg, and things are going to get much worse before they get any better.
iot  security  internet  isps  devices 
october 2016 by jm
Brian Krebs - The Democratization of Censorship
Events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely potent cyber weapons with transnational reach. More than 20 years after Gilmore first coined [his] turn of phrase, his most notable quotable has effectively been inverted — “Censorship can in fact route around the Internet.” The Internet can’t route around censorship when the censorship is all-pervasive and armed with, for all practical purposes, near-infinite reach and capacity.
brian-krebs  censorship  ddos  internet  web  politics  crime  security  iot 
september 2016 by jm
How Internet Trolls Won the 2016 Presidential Election
Because this was a novel iteration of online anti-Semitic culture, to the normie media it was worthy of deeply concerned coverage that likely gave a bunch of anti-Semites, trolls, and anti-Semitic trolls exactly the attention and visibility they craved. All without any of them having to prove they were actually involved, meaningfully, in anti-Semitic politics. That’s just a lot of power to give to a group of anonymous online idiots without at least knowing how many of them are 15-year-old dweebs rather than, you know, actual Nazis. [...]

In the long run, as journalistic coverage of the internet is increasingly done by people with at least a baseline understanding of web culture, that coverage will improve. For now, though, things are grim: It’s hard not to feel like journalists and politicos are effectively being led around on a leash by a group of anonymous online idiots, many of whom don’t really believe in anything.
internet  journalism  politics  4chan  8chan  channers  trolls  nazis  racism  pepe-the-frog  trump 
september 2016 by jm
Law to allow snooping on social media defies European court ruling
Karlin on fire:
But there’s lots in this legislation that should scare the public far more. For example, the proposal that the legislation should allow the retention of “superfluous data” gathered in the course of an investigation, which is a direct contravention of the ECJ’s demand that surveillance must be targeted and data held must be specifically relevant, not a trawl to be stored for later perusal “just in case”.
Or the claim that interception and retention of data, and access to it, will only be in cases of the most serious crime or terrorism threats. Oh, please. This was, and remains, the supposed basis for our existing, ECJ-invalidated legislation. Yet, as last year’s Gsoc investigation into Garda leaks revealed, it turns out a number of interconnected pieces of national legislation allow at least 10 different agencies access to retained data, including Gsoc, the Competition Authority, local authorities and the Irish Medicines Board.
surveillance  ireland  whatsapp  viber  snowden  snooping  karlin-lillington  facebook  internet  data-retention 
july 2016 by jm
E-Voting in Estonia needs to be discontinued
After studying other e-voting systems around the world, the team was particularly alarmed by the Estonian I-voting system. It has serious design weaknesses that are exacerbated by weak operational management. It has been built on assumptions which are outdated and do not reflect the contemporary reality of state-level attacks and sophisticated cybercrime. These problems stem from fundamental architectural problems that cannot be resolved with quick fixes or interim steps. While we believe e-government has many promising uses, the Estonian I-voting system carries grave risks — elections could be stolen, disrupted, or cast into disrepute. In light of these problems, our urgent recommendation is that to maintain the integrity of the Estonian electoral process, use of the Estonian I-voting system should be immediately discontinued.
internet  technology  e-voting  voting  security  via:mattblaze  estonia  i-voting  russia  cybercrime 
june 2016 by jm
Terrorism and internet blocking – is this the most ridiculous amendment ever? - EDRi
So, there you have it: Blocking is necessary, except it is not. Safeguards need to be implemented, except they don’t need to be. This approach is legal, except it isn’t. The text is based on the Child Exploitation Directive, except it isn’t. Is this really how we are going to create credible legislation on terrorism?
edri  blocking  internet  censorship  eu  ep 
june 2016 by jm
The History of the Irish Internet
This site is a companion effort to the techarchives website, except it is less well-researched, and is primarily a personal view of the development of the Internet in Ireland by your humble author, Niall Murphy.
niallm  internet  ireland  history  networking  heanet  ieunet 
june 2016 by jm
TechArchives
I need to get in touch about the early days of the Irish web!
an online home for stories from Ireland – stories about the country’s long and convoluted relationship with information technology. It aims to gather information on the most significant aspects of this relationship, to compile archives on the selected themes, and to store the assembled records for the benefit of future generations.
web  ireland  history  internet  www 
june 2016 by jm
The Irish Internet in the 1980s
from Dr Mark Humphrys in DCU:
A collection of bits and pieces of Internet history. Focusing somewhat (but not exclusively) on: (a) the 1980s, when I first started using the Internet, and: (b) Ireland.
mark-humphrys  dcu  history  tcd  bitnet  ireland  internet  web  www  1980s 
june 2016 by jm
Amazon S3 Transfer Acceleration
The AWS edge network has points of presence in more than 50 locations. Today, it is used to distribute content via Amazon CloudFront and to provide rapid responses to DNS queries made to Amazon Route 53. With today’s announcement, the edge network also helps to accelerate data transfers in to and out of Amazon S3. It will be of particular benefit to you if you are transferring data across or between continents, have a fast Internet connection, use large objects, or have a lot of content to upload.

You can think of the edge network as a bridge between your upload point (your desktop or your on-premises data center) and the target bucket. After you enable this feature for a bucket (by checking a checkbox in the AWS Management Console), you simply change the bucket’s endpoint to the form BUCKET_NAME.s3-accelerate.amazonaws.com. No other configuration changes are necessary! After you do this, your TCP connections will be routed to the best AWS edge location based on latency.  Transfer Acceleration will then send your uploads back to S3 over the AWS-managed backbone network using optimized network protocols, persistent connections from edge to origin, fully-open send and receive windows, and so forth.
aws  s3  networking  infrastructure  ops  internet  cdn 
april 2016 by jm
Hungary proposes anti-crypto law
up to 2 years imprisonment for use of apps for encrypted communication
crypto  hungary  laws  internet  crackdown  encryption 
april 2016 by jm
Angola’s Wikipedia Pirates Are Exposing the Problems With Digital Colonialism | Motherboard
Wikimedia and Facebook have given Angolans free access to their websites, but not to the rest of the internet. So, naturally, Angolans have started hiding pirated movies and music in Wikipedia articles and linking to them on closed Facebook groups, creating a totally free and clandestine file sharing network in a country where mobile internet data is extremely expensive.
facebook  piracy  africa  hacks  wikipedia  angola  internet 
march 2016 by jm
RFC 7754 - Technical Considerations for Internet Service Blocking and Filtering
The Internet is structured to be an open communications medium. This
openness is one of the key underpinnings of Internet innovation, but
it can also allow communications that may be viewed as undesirable by
certain parties. Thus, as the Internet has grown, so have mechanisms
to limit the extent and impact of abusive or objectionable
communications. Recently, there has been an increasing emphasis on
"blocking" and "filtering", the active prevention of such
communications. This document examines several technical approaches
to Internet blocking and filtering in terms of their alignment with
the overall Internet architecture. When it is possible to do so, the
approach to blocking and filtering that is most coherent with the
Internet architecture is to inform endpoints about potentially
undesirable services, so that the communicants can avoid engaging in
abusive or objectionable communications. We observe that certain
filtering and blocking approaches can cause unintended consequences
to third parties, and we discuss the limits of efficacy of various
approaches.


(via Tony Finch)
via:fanf  blocking  censorship  filtering  internet  rfcs  rfc  isps 
march 2016 by jm
TeleGeography Submarine Cable Map 2015
Gorgeously-illustrated retro map of modern-day submarine cables. Prints available for $150 (via Conor Delaney)
via:conor-delaney  data  internet  maps  cables  world  telegeography  mapping  retro 
march 2016 by jm
WebSockets, caution required!
This, so much.
There are very valid technical reasons many of the biggest sites on the Internet have not adopted them. Twitter use HTTP/2 + polling, Facebook and Gmail use Long Polling. Saying WebSockets are the only way and the way of the future, is wrongheaded. HTTP/2 may end up winning this battle due to the huge amount of WebSocket connections web browsers allow, and HTTP/3 may unify the protocols
http  realtime  websockets  long-polling  http2  protocols  transport  web  internet 
january 2016 by jm
League of Legends win-rates vs latency analysed
It appears that more mechanically intensive champions are more affected by latency, while tankier champions or those with point-and-click abilities are less affected by latency.


(via Nelson)
games  league-of-legends  latency  ping  gaming  internet  via:nelson 
december 2015 by jm
Net neutrality: EU votes in favour of Internet fast lanes and slow lanes | Ars Technica UK
:(
In the end, sheer political fatigue may have played a major part in undermining net neutrality in the EU. However, the battle is not quite over. As Anne Jellema, CEO of the Web Foundation, which was established by Berners-Lee in 2009, notes in her response to today's EU vote: "The European Parliament is essentially tossing a hot potato to the Body of European Regulators, national regulators and the courts, who will have to decide how these spectacularly unclear rules will be implemented. The onus is now on these groups to heed the call of hundreds of thousands of concerned citizens and prevent a two-speed Internet."
eu  net-neutrality  internet  europe  ep  politics 
october 2015 by jm
Dublin-traceroute
uses the techniques invented by the authors of Paris-traceroute to enumerate the paths of ECMP flow-based load balancing, but introduces a new technique for NAT detection.


handy. written by AWS SDE Andrea Barberio!
internet  tracing  traceroute  networking  ecmp  nat  ip 
october 2015 by jm
What Happens Next Will Amaze You
Maciej Ceglowski's latest talk, on ads, the web, Silicon Valley and government:
'I went to school with Bill. He's a nice guy. But making him immortal is not going to make life better for anyone in my city. It will just exacerbate the rent crisis.'
talks  slides  funny  ads  advertising  internet  web  privacy  surveillance  maciej  silicon-valley 
september 2015 by jm
India lifts porn ban after widespread outrage - BBC News
After a brief couple of days.
News of the ban caused a furore on Indian social media, with several senior politicians and members of civil society expressing their opposition to the move. The Indian government said that it was merely complying with the Supreme Court order and was committed to the freedom of communication on the Internet. "I reject with contempt the charge that it is a Talibani government, as being said by some of the critics. Our government supports free media, respects communication on social media and has respected freedom of communication always," Mr Prasad told PTI.
india  porn  filtering  isps  internet  web  child-porn  censorship 
august 2015 by jm
How .uk came to be (and why it's not .gb)
WB: By the late 80s the IANA [the Internet Assigned Numbers Authority, set up in 1988 to manage global IP address allocations] was trying to get all those countries that were trying to join the internet to use the ISO 3166 standard for country codes. It was used for all sorts of things — you see it on cars, “GB” for the UK. [...]

At that point, we’re faced with a problem that Jon Postel would like to have changed it to .gb to be consistent with the rest of the world. Whereas .uk had already been established, with a few tens of thousands of domain names with .uk on them. I remember chairing one of the JANET net workshops that were held every year, and the Northern Irish were adamant that they were part of the UK — so the consensus was, we’d try and keep .uk, we’d park .gb and not use it.

PK: I didn’t particularly want to change to .gb because I was responsible for Northern Ireland as well. And what’s more, there was a certain question as to whether a research group in the US should be allowed to tell the British what to do. So this argy-bargy continued for a little while and, in the meantime, one of my clients was the Ministry of Defence, and they decided they couldn’t wait this long, and they decided I was going to lose the battle, and so bits of MOD went over to .gb — I didn’t care, as I was running .gb and .uk in any case.
dot-uk  history  internet  dot-gb  britain  uk  northern-ireland  ireland  janet 
july 2015 by jm
Apple now biases towards IPv6 with a 25ms delay on connections
Interestingly, they claim that IPv6 tends to be more reliable and has lower latency now:
Based on our testing, this makes our Happy Eyeballs implementation go from roughly 50/50 IPv4/IPv6 in iOS 8 and Yosemite to ~99% IPv6 in iOS 9 and El Capitan betas. While our previous implementation from four years ago was designed to select the connection with lowest latency no matter what, we agree that the Internet has changed since then and reports indicate that biasing towards IPv6 is now beneficial for our customers: IPv6 is now mainstream instead of being an exception, there are less broken IPv6 tunnels, IPv4 carrier-grade NATs are increasing in numbers, and throughput may even be better on average over IPv6.
apple  ipv6  ip  tcp  networking  internet  happy-eyeballs  ios  osx 
july 2015 by jm
HTTP/2 is here, let's optimize! - Velocity SC 2015 - Google Slides
Changes which server-side developers will need to start considering as HTTP/2 rolls out. Remove domain sharding; stop concatenating resources; stop inlining resources; use server push.
http2  http  protocols  streaming  internet  web  dns  performance 
june 2015 by jm
Internet of 404's
"An archive of the former Internet of Things"
archive  iot  things  internet  nabaztag  startups  acquisitions  tumblr  gadgets  history 
may 2015 by jm
David P. Reed on the history of UDP
'UDP was actually “designed” in 30 minutes on a blackboard when we decided pull the original TCP protocol apart into TCP and IP, and created UDP on top of IP as an alternative for multiplexing and demultiplexing IP datagrams inside a host among the various host processes or tasks. But it was a placeholder that enabled all the non-virtual-circuit protocols since then to be invented, including encapsulation, RTP, DNS, …, without having to negotiate for permission either to define a new protocol or to extend TCP by adding “features”.'
udp  ip  tcp  networking  internet  dpr  history  protocols 
april 2015 by jm
Why We Will Not Be Registering easyDNS.SUCKS - blog.easydns.org
If you're not immersed in the naming business you may find the jargon in it hard to understand. The basic upshot is this: the IPC believes that the mechanisms that were enacted to protect trademark holders during the deluge of new TLD rollouts are being gamed by the .SUCKS TLD operator to extort inflated fees from trademark holders.


(via Nelson)
shakedown  business  internet  domains  dns  easydns  dot-sucks  scams  tlds  trademarks  ip 
april 2015 by jm
China’s Great Cannon
Conducting such a widespread attack clearly demonstrates the weaponization of the Chinese Internet to co-opt arbitrary computers across the web and outside of China to achieve China’s policy ends.  The repurposing of the devices of unwitting users in foreign jurisdictions for covert attacks in the interests of one country’s national priorities is a dangerous precedent — contrary to international norms and in violation of widespread domestic laws prohibiting the unauthorized use of computing and networked systems.
censorship  ddos  internet  security  china  great-cannon  citizen-lab  reports  web 
april 2015 by jm
Russia just made a ton of Internet memes illegal - The Washington Post
In post-Soviet Russia, you don’t make memes. Memes make (or unmake?) you. That is, at least, the only conclusion we can draw from an announcement made this week by Russia’s three-year-old media agency/Internet censor Roskomnadzor, which made it illegal to publish any Internet meme that depicts a public figure in a way that has nothing to do with his “personality.”
memes  photoshop  russia  freedom  web  internet  funny  humour  roskomnadzor  censorship  sad-keanu 
april 2015 by jm
Tim Bray on one year as an xoogler
Seems pretty insightful; particularly "I do think the In­ter­net econ­o­my would be bet­ter and more hu­mane if it didn’t have a sin­gle white-hot highly-overprivileged cen­ter. Al­so, soon­er or lat­er that’ll stop scal­ing. Can’t hap­pen too soon."
google  tim-bray  via:nelson  xoogler  funding  tech  privacy  ads  internet 
march 2015 by jm
Meet the man whose utopian vision for the Internet conquered, and then warped, Silicon Valley - The Washington Post
Thought-provoking article looking back to John Perry Barlow's "A Declaration of the Independence of Cyberspace", published in 1996:
Barlow once wrote that “trusting the government with your privacy is like having a Peeping Tom install your window blinds.” But the Barlovian focus on government overreach leaves its author and other libertarians blind to the same encroachments on our autonomy from the private sector. The bold and romantic techno-utopian ideals of “A Declaration” no longer need to be fought for, because they’re already gone.
john-perry-barlow  1990s  history  cyberspace  internet  surveillance  privacy  data-protection  libertarianism  utopian  manifestos 
march 2015 by jm
Sign up for Privacy International's anti-surveillance campaign
Have you ever made a phone call, sent an email, or, you know, used the internet? Of course you have!

Chances are, at some point over the past decade, your communications were swept up by the U.S. National Security Agency. The NSA then shares information with the UK Government's intelligence agency GCHQ by default. A recent court ruling found that this sharing was unlawful. But no one could find out if their records were collected and then illegally shared between these two agencies… until now!

Because of our recent victory against the UK intelligence agency in court, now anyone in the world — yes, ANYONE, including you — can find out if GCHQ illegally received information about you from the NSA. Join our campaign by entering your details below to find out if GCHQ illegally spied on you, and confirm via the email we send you. We'll then go to court demanding that they finally come clean on unlawful surveillance.
gchq  nsa  spying  surveillance  internet  phone  uk  law  campaign  privacy-international 
february 2015 by jm
NA Server Roadmap Update: PoPs, Peering, and the North Bridge
League of Legends has set up private network links to a variety of major US ISPs to avoid internet weather (via Nelson)
via:nelson  peering  games  networks  internet  ops  networking 
january 2015 by jm
David Cameron in 'cloud cuckoo land' over encrypted messaging apps ban | Technology | The Guardian
One insider at a major US technology firm told the Guardian that “politicians are fond of asking why it is that tech companies don’t base themselves in the UK” ... “I think if you’re saying that encryption is the problem, at a time when consumers and businesses see encryption as a very necessary part of trust online, that’s a very indicative point of view.”
business  guardian  david-cameron  uk-politics  crypto  ripa  messaging  internet  privacy 
january 2015 by jm
Schneier on Security: Why Data Mining Won't Stop Terror
A good reference URL to cut-and-paste when "scanning internet traffic for terrorist plots" rears its head:
This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you're still chasing 2,750 false alarms per day -- but that will inevitably raise your false negatives, and you're going to miss some of those 10 real plots.


Also, Ben Goldacre saying the same thing: http://www.badscience.net/2009/02/datamining-would-be-lovely-if-it-worked/
internet  scanning  filtering  specificity  statistics  data-mining  terrorism  law  nsa  gchq  false-positives  false-negatives 
january 2015 by jm
Richard Tynan on Twitter: "GCHQ Tapping Eircom owned cable"
Cable listed as owned by Eircom and Cable and Wireless (now Vodafone?)
vodafone  cables  tapping  surveillance  eircom  internet  uk 
november 2014 by jm
IAB Statement on Internet Confidentiality
Newly designed protocols should prefer encryption to cleartext operation. There may be exceptions to this default, but it is important to recognize that protocols do not operate in isolation.  Information leaked by one protocol can be made part of a more substantial body of information by cross-correlation of traffic observation.  There are protocols which may as a result require encryption on the Internet even when it would not be a requirement for that protocol operating in isolation.

We recommend that encryption be deployed throughout the protocol stack since there is not a single place within the stack where all kinds of communication can be protected.


Wow. so much for IPSec
ipsec  iab  ietf  snowden  surveillance  crypto  protocols  internet 
november 2014 by jm
Eircom have run out of network capacity
This is due in part to huge growth in the data volumes and data traffic that is transported over our network, which has exceeded our forecasted growth. We are making a number of improvements to our international connectivity which will add significant capacity and this work will be completed in the next two or three weeks.


Guess this is what happens when Amazon poach your IP network engineers. doh!

More seriously though, if you're marketing eFibre heavily, shouldn't you be investing in the upstream capacity to go with it?
eircom  fail  internet  capacity  forecasting  networking 
november 2014 by jm
The man who made a game to change the world
An interview with Richard Bartle, the creator of MUD, back in 1978.
Perceiving the different ways in which players approached the game led Bartle to consider whether MMO players could be classified according to type. "A group of admins was having an argument about what people wanted out of a MUD in about 1990," he recalls. "This began a 200-long email chain over a period of six months. Eventually I went through everybody's answers and categorised them. I discovered there were four types of MMO player. I published some short versions of them then, when the journal of MUD research came out I wrote it up as a paper."

The so-called Bartle test, which classifies MMO players as Achievers, Explorers, Socialisers or Killers (or a mixture thereof) according to their play-style remains in widespread use today. Bartle believes that you need a healthy mix of all dominant types in order to maintain a successful MMO ecosystem. "If you have a game full of Achievers (players for whom advancement through a game is the primary goal) the people who arrive at the bottom level won't continue to play because everyone is better than them," he explains. "This removes the bottom tier and, over time, all of the bottom tiers leave through irritation. But if you have Socialisers in the mix they don't care about levelling up and all of that. So the lowest Achievers can look down on the Socialisers and the Socialisers don't care. If you're just making the game for Achievers it will corrode from the bottom. All MMOs have this insulating layer, even if the developers don't understand why it's there."
mmo  mud  gaming  history  internet  richard-bartle 
october 2014 by jm
webrtcH4cKS: ~ coTURN: the open-source multi-tenant TURN/STUN server you were looking for
Last year we interviewed Oleg Moskalenko and presented the rfc5766-turn-server project, which is a free open source and extremely popular implementation of TURN and STURN server. A few months later we even discovered Amazon is using this project to power its Mayday service. Since then, a number of features beyond the original RFC 5766 have been defined at the IETF and a new open-source project was born: the coTURN project.
webrtc  turn  sturn  rfc-5766  push  nat  stun  firewalls  voip  servers  internet 
october 2014 by jm
how King Cormac predicted Arguing On The Internet
From <a href='http://www.maryjones.us/ctexts/cormac3.html'>The Wisdom of King Cormac</a>:

"O Cormac, grandson of Conn", said Carbery, "What is the worst pleading and arguing?" "Not hard to tell", said Cormac. "Contending against knowledge, contending without proofs, taking refuge in bad language, a stiff delivery, a muttering speech, hair-splitting, uncertain proofs, despising books, turning against custom, shifting one's pleading, inciting the mob, blowing one's own trumpet, shouting at the top of one's voice."
internet  arguing  history  ireland  king-cormac  hair-splitting  shouting  reddit 
october 2014 by jm
Belkin Router Apocalypse
Many Belkin routers attempt to determine if they're connected to the internet by pinging 'heartbeat.belkin.com', in a classic amateur fail move. Good reason not to run Belkin firmware if that's the level of code quality to expect
belkin  fail  ping  icmp  funny  internet  dailywtf  broken 
october 2014 by jm
Moving Big Data into the Cloud with Tsunami UDP - AWS Big Data Blog
Pretty serious speedup. 81 MB/sec with Tsunami UDP, compared to 9 MB/sec with plain old scp. Probably kills internet performance for everyone else though!
tsunami-udp  udp  scp  copying  transfers  internet  long-distance  performance  speed 
august 2014 by jm
NTP's days are numbered for consumer devices
An accurate clock is required to negotiate SSL/TLS, so clock sync is important for internet-of-things usage. but:
Unfortunately for us, the traditional and most widespread method for clock synchronisation (NTP) has been caught up in a DDoS issue which has recently caused some ISPs to start blocking all NTP communication. [....] Because the DDoS attacks are so widespread, and the lack of obvious commercial pressure to fix the issue, it’s possible that the days of using NTP as a mechanism for setting clocks may well be numbered. Luckily for us there is a small but growing project that replaces it.

tlsdate was started by Jacob Appelbaum of the Tor project in 2012, making use of the SSL handshake in order to extract time from a remote server, and its usage is on the rise. [....] Since we started encountering these problems, we’ve incorporated tlsdate into an over-the-air update, and have successfully started using this in situations where NTP is blocked.
tlsdate  ntp  clocks  time  sync  iot  via:gwire  ddos  isps  internet  protocols  security 
august 2014 by jm
The Internet's Original Sin - The Atlantic
Ethan Zuckerberg: 'It's not too late to ditch the ad-based business model and build a better web.'
advertising  business  internet  ads  business-models  the-atlantic  ethan-zuckerberg  via:anildash  web  privacy  surveillance  google 
august 2014 by jm
Syria's 2012 internet disconnection wasn't on purpose
According to Edward Snowden, it was a side-effect of the NSA attempting to install an exploit in one of the core routers at a major Syrian ISP, and accidentally bricking the router
routers  exploits  hacking  software  tao  nsa  edward-snowden  syria  internet  privacy 
august 2014 by jm
Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins | Threat Level | WIRED
'The attacker specifically targeted a collection of bitcoin mining “pools”–bitcoin-producing cooperatives in which users contribute their computers’ processing power and are rewarded with a cut of the resulting cryptocurrency the pool produces. The redirection technique tricked the pools’ participants into continuing to devote their processors to bitcoin mining while allowing the hacker to keep the proceeds. At its peak, according to the researchers’ measurements, the hacker’s scam was pocketing a flow of bitcoins and other digital currencies including dogecoin and worldcoin worth close to $9,000 a day. “With this kind of hijacking, you can quite easily grab a large collection of clients,” says Pat Litke, one of the Dell researchers. “It takes less than a minute, and you end up with a lot of mining traffic under your control.”'

'In total, Stewart and Litke were able to measure $83,000 worth of cryptocurrency stolen in the BGP attack [...] but the total haul could be larger'
bitcoin  mining  fraud  internet  bgp  routing  security  attacks  hacking 
august 2014 by jm
AWS Speed Test: What are the Fastest EC2 and S3 Regions?
My god, this test is awful -- this is how NOT to test networked infrastructure. (1) testing from a single EC2 instance in each region; (2) uploading to a single test bucket for each test; (3) results don't include min/max or percentiles, just an averaged measurement for each test. FAIL
fail  testing  networking  performance  ec2  aws  s3  internet 
august 2014 by jm
Obama administration says the world’s servers are ours | Ars Technica
In its briefs filed last week, the US government said that content stored online doesn't enjoy the same type of Fourth Amendment protections as data stored in the physical world. The government cited (PDF) the Stored Communications Act (SCA), a President Ronald Reagan-era regulation.


Michael McDowell has filed a declaration in support of MS' position (attached to that article a couple of paras down) suggesting that the MLAT between the US and Ireland is the correct avenue.
privacy  eu  us-politics  microsoft  michael-mcdowell  law  surveillance  servers  sca  internet 
july 2014 by jm
New Russian Law To Forbid Storing Russians' Data Outside the Country - Slashdot
On Friday Russia's parliament passed a law "which bans online businesses from storing personal data of Russian citizens on servers located abroad[.] ... According to ITAR-TASS, the changes to existing legislation will come into effect in September 2016, and apply to email services, social networks and search engines, including the likes of Facebook and Google. Domain names or net addresses not complying with regulations will be put on a blacklist maintained by Roskomnadzor (the Federal Supervision Agency for Information Technologies and Communications), the organisation which already has the powers to take down websites suspected of copyright infringement without a court order. In the case of non-compliance, Roskomnadzor will be able to impose 'sanctions,' and even instruct local Internet Service Providers (ISPs) to cut off access to the offending resource."
russia  privacy  nsa  censorship  protectionism  internet  web 
july 2014 by jm
Tor exit node operator prosecuted in Austria
'The operator of an exit node is guilty of complicity, because he enabled others to transmit content of an illegal nature through the service.'

Via Tony Finch.
austria  tor  security  law  liability  internet  tunnelling  eu  via:fanf 
july 2014 by jm
Report of the Internet Content Governance Advisory Group
looking at the summary, looks broadly sensible; no government-mandated filtering/blocking I can spot quickly
internet  filtering  safety  kids  porn  blocking  ireland  pegi  ratings  reports  pdf 
june 2014 by jm
Moquette MQTT
a Java implementation of an MQTT 3.1 broker. Its code base is small. At its core, Moquette is an events processor; this lets the code base be simple, avoiding thread sharing issues. The Moquette broker is lightweight and easy to understand so it could be embedded in other projects.
mqtt  moquette  netty  messaging  queueing  push-notifications  iot  internet  push  eclipse 
may 2014 by jm
The leaked New York Times innovation report is one of the key documents of this media age » Nieman Journalism Lab
one of the world’s leading news organizations giving itself a rigorous self-examination. I’ve spoken with multiple digital-savvy Times staffers in recent days who described the report with words like “transformative” and “incredibly important” and “a big big moment for the future of the Times.” One admitted crying while reading it because it surfaced so many issues about Times culture that digital types have been struggling to overcome for years.


via Antoin. This is pretty insightful -- the death of the homepage is notable
nytimes  publishing  media  journalism  tech  internet  web  news  leaks  via:antoin 
may 2014 by jm
Observations of an Internet Middleman
That leaves the remaining six [consumer ISPs peering with Level3] with congestion on almost all of the interconnect ports between us. Congestion that is permanent, has been in place for well over a year and where our peer refuses to augment capacity. They are deliberately harming the service they deliver to their paying customers. They are not allowing us to fulfil the requests their customers make for content. Five of those congested peers are in the United States and one is in Europe. There are none in any other part of the world. All six are large Broadband consumer networks with a dominant or exclusive market share in their local market. In countries or markets where consumers have multiple Broadband choices (like the UK) there are no congested peers.


Amazing that L3 are happy to publish this -- that's where big monopoly ISPs have led their industry.
net-neutrality  networking  internet  level3  congestion  isps  us-politics 
may 2014 by jm
Flood IO Offering Network Emulation
Performance-testing-as-a-service company Flood.IO now offering emulation of various crappy end-user networks: GSM, DSL, GPRS, 3G, 4G etc. Great idea.
flood.io  performance  networking  internet  load-testing  testing  jmeter  gatling  tests  gsm  3g  mobile  simulation 
april 2014 by jm
Russia passes bill requiring bloggers to register with government
A bill passed by the Russian parliament on Tuesday says that any blogger read by at least 3,000 people a day has to register with the government telecom watchdog and follow the same rules as those imposed by Russian law on mass media. These include privacy safeguards, the obligation to check all facts, silent days before elections and loose but threatening injunctions against "abetting terrorism" and "extremism."


Russian blogging platforms have responded by changing view-counter tickers to display "2500+" as a max.
russia  blogs  blogging  terrorism  extremism  internet  regulation  chilling-effects  censorship 
april 2014 by jm
Meet Ireland’s first bitcoin politician
Ossian Smyth -- Green Party internet spokesman and representative for communications, energy, and natural resources, with a top wheeze:

“I think it is one of the most transparent ways of receiving donations. No one would know how much money can be donated into a bank account, but with bitcoin anyone can go to the block chain and look at the wallet."

excellent ;)
ossian-smyth  bitcoin  fundraising  greens  politics  ireland  dublin  green-party  internet 
april 2014 by jm
Syria's lethal Facebook checkpoints
An anonymous tip from a highly reliable source: "There are checkpoints in Syria where your Facebook is checked for affiliation with the rebellious groups or individuals aligned with the rebellion. People are then disappeared or killed if they are found to be connected. Drivers are literally forced to load their Facebook/Twitter accounts and then they are riffled through. It's happening daily, and has been for a year at least."
boing-boing  war  facebook  social-media  twitter  internet  checkpoints  syria 
april 2014 by jm
« earlier      
per page:    204080120160

related tags

3-strikes  3g  4chan  4g  8chan  10/8  1980s  1990s  abuse  acquisitions  activism  adrian-weckler  ads  advertising  advice  afp  africa  alexis-petridish  aliases  alt-right  amazon  amesys  analysis  angela-nagle  angola  anonymity  anonymous  anti-phishing  anti-piracy-group  anti-spam  antisemitism  antisocial  ap  aphorisms  apple  appliances  architecture  archive  arguing  art  as-34109  asf  asia  attacks  australia  austria  authentication  authoritarianism  automation  aws  az  b3ta  backoff  bandwidth  bandwidth-caps  belkin  benchmarks  bgp  billing  bitcoin  bitnet  bittorrent  blocking  blocklists  blogging  blogs  boards  boing-boing  books  brexit  brian-krebs  britain  broadband  broken  bruce-schneier  buffer-overflows  bufferbloat  buffering  bull-sa  bullying  business  business-models  c  cable  cables  caching  cam  campaign  canada  capacity  cb3rob  ccc  cdn  censorship  censorware  channers  checkip  checkpoints  child-porn  children  chilling-effects  china  cisco  citizen-lab  civil-liberties  cjeu  claire-perry  clocks  cloud-computing  cloudflare  codel  coding  cogent  comcast  comments  communication  community  computers  conferences  congestion  consultations  consume  consumer  content  content-blocking  cool  copyfight  copying  copyright  cory-doctorow  coverage  crackdown  crap-code  crime  crls  crypto  cryptography  culture  cutbacks  cyber-bullying  cyberbullying  cybercrime  cyberpunk  cyberspace  cyberstalking  daily-mail  dailywtf  data  data-leak  data-mining  data-protection  data-retention  datamining  david-cameron  dcenr  dcu  ddos  debate  debugging  default-on  democracy  denmark  design  devices  dhs  digiweb  disruption  diy  dmca  dns  dnsbls  doge  doh  domains  dot-gb  dot-sucks  dot-uk  downloading  dpi  dpr  dri  dublin  dvr  e-voting  east-texas  easydns  ebooks  ec2  ecj  eclipse  ecmp  ecommerce  edri  edward-snowden  eff  eircom  email  embedded-software  emi  emoji  emusic  encryption  english  ep  estonia  ethan-zuckerberg  eu  euromaidan  europe  exploits  exponential-backoff  extremism  facebook  fail  fair-use  fake-news  false-negatives  false-positives  fame  family  fcc  feudal-internet  filesharing  filtering  firewalls  firmware  flood.io  forecasting  fps  fq_codel  france  fraud  free-speech  freedom  fridges  ftc  funding  fundraising  funny  future  futurism  gadgets  gadhafi  games  gaming  gardai  gatling  gchq  geodns  germaine-greer  gezi-park  gizmodo  global  globalisation  godwins-law  google  governance  government  grauniad  great-cannon  great-firewall  green-party  greens  gsm  guardian  hackernews  hackerspace  hacking  hacks  hadopi  hair-splitting  handshake  happy-eyeballs  harassment  hardware  hate-speech  heanet  heartbleed  hijacking  history  holland  home  horror  horse_ebooks  hosting  hotels  hsdpa  http  http2  https  human-rights  humour  hungary  hyperlinks  i-voting  iab  ice  icmp  ietf  ieunet  ifpi  ikydz  ilya-grigorik  imagine  india  infrastructure  instagram  intelligence  internet  interview  iona-technologies  ios  iot  ip  ip-addresses  ipsec  iptables  ipv6  ireland  irelandoffline  irish-times  ispai  isps  james-bridle  james-casey  james-hamilton  janet  javascript  jim-gettys  jmeter  johan-schluter  john-perry-barlow  journalism  jquery  karlin-lillington  kids  king-cormac  kubernetes  l2tp  labour  language  latency  law  laws  lawyers  league-of-legends  leaks  lecool  legal  level3  lex-ferenda  liability  libertarianism  liberty  libya  linguist  linking  links  linx  load-testing  long-distance  long-polling  low-latency  maawg  machine-learning  maciej  maciej-ceglowski  macron  malcolm-hutty  manifestos  mapping  maps  mark-humphrys  mark-mcsharry  marketing  markov-chains  massive-interception  measurement  measurements  media  medicine  meetings  memes  mesh  mesh-networks  messaging  michael-mcdowell  michelangelo  microsoft  mike-godwin  milo  mining  mitm  mmo  mmorpgs  mmos  mobile  mobile-internet  moderation  money  moquette  morality  morons  mounir-mahjoubi  mp3  mqtt  mud  music  music-industry  nabaztag  nat  nazis  neil-young  net-neutrality  netflix  netty  network  network-neutrality  networking  networks  news  nginx  niallm  normies  northern-ireland  not-the-onion  nsa  ntp  nudity  nytimes  o2  occupy  ofcom  omgwtfbbq  online  open-rights-group  open-source  openssl  operability  opportunistic  ops  oracle  orcas-island  org  organisation  osce  ossian-smyth  osx  overblocking  p2p  packet-loss  packets  papers  pat-rabbitte  pathetic  payg  payment  pdf  peering  pegi  pepe-the-frog  performance  peter-flynn  phish  phishing  phone  phones  photoshop  ping  piracy  pirate-bay  pki  policing  policy  politics  politics.ie  porn  presentations  press-releases  pricing  prism  privacy  privacy-international  propaganda  protectionism  protocols  proxies  public  publishing  push  push-notifications  pypi  python  queueing  quic  racism  ratings  reading  real-names  realtime  recession  reddit  regulation  reliability  remote-disabling  reports  repression  research  retransmit  retries  retro  review  reviews  revocation  rfc  rfc-5766  rfcs  richard-bartle  rick-falkvinge  rights  ripa  rob-manuel  roskomnadzor  round-trip  routers  routing  rst  rtt  russia  s3  sad-keanu  safety  samsung  satellite  sca  scaling  scams  scanning  scp  sculpture  sean-sherlock  seanad  secret  security  seizure  servers  services  sf  shakedown  sherblock  shitheads  shouting  silicon-valley  simulation  sky  skype  slides  smart-tv  smc8014  snooping  snowden  social-media  society  software  somethingawful  sonic.net  sopa  space  spam  spamhaus  specificity  speech  speed  spending  spy  spying  ssl  startups  state  state-control  statistics  stock-markets  stocks  stories  streaming  stun  stupid  sturn  subversion  surveillance  surveys  svensson  sweden  swpats  sync  synchronization  syria  t-mobile  tahrir-square  talk-talk  talks  tao  tapping  tax  taxes  tcd  tcp  tcpcrypt  tech  techcrunch  technology  teens  telecoms  telegeography  terrorism  testing  tests  text  the-atlantic  the-onion  things  think-of-the-children  three  tim-berners-lee  tim-bray  timbl  time  time-warner  tlds  tls  tlsdate  tor  totalitarianism  tou  tpb  traceroute  tracing  trademarks  trading  traffic  tragedy  trains  transfers  transphobia  transport  travel  trends  trolling  trolls  trump  tsunami-udp  tumblr  tunneling  tunnelling  turkey  turn  tutorials  tv  twc  twitter  udp  uk  uk-politics  unhrc  upc  us-politics  usa  utopian  vdsl  verisign  verizon  via:anildash  via:antoin  via:bela  via:conor-delaney  via:fanf  via:glen-gray  via:gwire  via:ip  via:irr  via:jimcarroll  via:joshea  via:kragen  via:mala  via:mattblaze  via:micktwomey  via:nelson  via:oisin  via:reddit  via:tieguy  via:tjmcintyre  via:walter  via:waxy  via:yoz  viber  violence  vodafone  voip  voting  vpc  vpn  wa  war  web  web-services  web-we-want  webrtc  websockets  whats-my-ip  whatsapp  wifi  wikipedia  windows  wireless  wisps  wordpress  world  www  wyoming  xelerance  xl2tpd  xml  xoogler  youtube 

Copy this bookmark:



description:


tags: