Gravis McElroy on Twitter: "The thing that really kills me about the silicon valley hypercapitalist hell spiral...."
15 days ago by jm
Epic shouty thread about modern Silicon Valley software products.
money
funding
capitalism
silicon-valley
internet
web
google
facebook
banks
banking
We know that no company, regardless of size, can be trusted with this information. We KNOW it will not stay private, our photos of our partners genitals and tax documents will become public either deliberately or accidentally.
We know that any company that tries to buck this trend can't be trusted, and even if they are completely, absolutely transparent, it doesn't matter because we will wake up one day to discover they were purchased at 2 AM and the data transfer /already started/
We represent billions in revenue but they hold our info in escrow and that means we don't have enough money to buy their loyalty, because a business considers business money more real than person money.
15 days ago by jm
A quantitive analysis of the impact of arbitrary blockchain content on Bitcoin
5 weeks ago by jm
'People put all sorts of things into the Bitcoin blockchain - some of it objectionable, some of it illegal. Now what?'
blockchain
bitcoin
ledger
immutability
internet
law
crime
papers
5 weeks ago by jm
Tech Leaders Dismayed by Weaponization of Social Media - IEEE Spectrum
propaganda
fake-news
facebook
twitter
social-media
us-politics
brexit
internet
russia
silicon-valley
usa
november 2017 by jm
“We have passed the fail-safe point,” McNamee said. “I don’t think we can get back to the Silicon Valley that I loved. At this point we just have to save America.”
november 2017 by jm
Something is wrong on the internet – James Bridle – Medium
november 2017 by jm
'an essay on YouTube, children's videos, automation, abuse, and violence, which crystallises a lot of my current feelings about the internet through a particularly unpleasant example from it. [...]
What we’re talking about is very young children [..] being deliberately targeted with content which will traumatise and disturb them, via networks which are extremely vulnerable to exactly this form of abuse. It’s not about trolls, but about a kind of violence inherent in the combination of digital systems and capitalist incentives. It’s down to that level of the metal.'
internet
youtube
children
web
automation
violence
horror
4chan
james-bridle
What we’re talking about is very young children [..] being deliberately targeted with content which will traumatise and disturb them, via networks which are extremely vulnerable to exactly this form of abuse. It’s not about trolls, but about a kind of violence inherent in the combination of digital systems and capitalist incentives. It’s down to that level of the metal.'
november 2017 by jm
Internet speed guarantees must be realistic, says Ofcom | Hacker News
october 2017 by jm
Good news from the UK. Hope this comes to Ireland soon, too
marketing
isps
internet
speed
measurement
ofcom
uk
october 2017 by jm
Normietivity: A Review of Angela Nagle's Kill all Normies
angela-nagle
normies
books
reading
transphobia
germaine-greer
milo
alt-right
politics
internet
4chan
september 2017 by jm
Due to a persistent vagueness in targets and refusal to respond to the best arguments presented by those she loosely groups together, Nagle does not provide the thoroughgoing and immanent treatment of the left which would be required to achieve the profound intervention she clearly intended. Nor does she grapple with the difficult implications figures like Greer (with her transphobic campaign against a vulnerable colleague) and Milo (with his direct advocacy for the nativist and carceral state) present for free speech absolutists. And indeed, the blurring their specifically shared transphobia causes for distinguishing between left and right wing social analysis.
In genre terms, Nagle’s writing is best described as travel writing for internet culture. Kill All Normies provides a string of curios and oddities (from neo-nazi cults, to inscrutably gendered teenagers) to an audience expected to find them unfamiliar, and titillating. Nagle attempts to cast herself as an aloof and wry explorer, but at various points her commitments become all too clear. Nagle implicitly casts her reader as the eponymous normies, overlooking those of us who live through lives with transgenders, in the wake of colonialism, despite invisible disabilities (including depression), and all the rest.
This is both a shame and a missed opportunity, because the deadly violence the Alt-Right has proven itself capable of is in urgent need of evaluation, but so too are the very real dysfunctions which afflict the left (both online and IRL). After this book patient, discerning, explanatory, and immanent readings of internet culture remain sorely needed. The best that can be said for Kill All Normies is, as the old meme goes, “An attempt was made.”
september 2017 by jm
"You Can't Stay Here: The Efficacy of Reddit’s 2015 Ban Examined Through Hate Speech"
(Via Anil Dash)
abuse
reddit
research
hate-speech
community
moderation
racism
internet
september 2017 by jm
In 2015, Reddit closed several subreddits—foremost among them r/fatpeoplehate and r/CoonTown—due to violations of Reddit’s anti-harassment policy. However, the effectiveness of banning as a moderation approach remains unclear: banning might diminish hateful behavior, or it may relocate such behavior to different parts of the site.
We study the ban of r/fatpeoplehate and r/CoonTown in terms of its effect on both participating users and affected subreddits. Working from over 100M Reddit posts and comments, we generate hate speech lexicons to examine variations in hate speech usage via causal inference methods. We find that the ban worked for Reddit. More accounts than expected discontinued using the site; those that stayed drastically decreased their hate speech usage—by at least 80%. Though many subreddits saw an influx of r/fatpeoplehate and r/CoonTown “migrants,” those subreddits saw no significant changes in hate speech usage. In other words, other subreddits did not inherit the problem. We conclude by reflecting on the apparent success of the ban, discussing implications for online moderation, Reddit and internet communities more broadly.
(Via Anil Dash)
september 2017 by jm
Godwin repeals Godwin's Law
august 2017 by jm
'By All Means, Compare These Shitheads to the Nazis'
mike-godwin
nazis
shitheads
funny
godwins-law
internet
august 2017 by jm
Mounir Mahjoubi, the 'geek' who saved Macron's campaign: 'We knew we were going to be attacked' | World news | The Guardian
june 2017 by jm
What a great story.
(via Niall Murphy)
france
mounir-mahjoubi
internet
computers
society
macron
politics
security
As a child, he was into maths and geometry, the middle child with one sister 10 years older and another 10 years younger. “I heard about this incredible new thing called the internet,” he says, adding how, aged 12, he saw an advert for the Paris science museum where you could try the internet for free. “There were 15 computers and you queued to have an hour free if you bought an entry ticket. I bought an annual pass to the museum and every Saturday and Sunday I’d travel from one side of Paris to the other to get on the internet and see what it was about. I’d go on Yahoo, chat with people on the other side of the world. I didn’t speak great English then so it wasn’t brilliant chat ...”
(via Niall Murphy)
june 2017 by jm
Build a Better Monster: Morality, Machine Learning, and Mass Surveillance
advertising
facebook
google
internet
politics
surveillance
democracy
maciej-ceglowski
talks
morality
machine-learning
april 2017 by jm
We built the commercial internet by mastering techniques of persuasion and surveillance that we’ve extended to billions of people, including essentially the entire population of the Western democracies. But admitting that this tool of social control might be conducive to authoritarianism is not something we’re ready to face. After all, we're good people. We like freedom. How could we have built tools that subvert it?
As Upton Sinclair said, “It is difficult to get a man to understand something, when his salary depends on his not understanding it.”
I contend that there are structural reasons to worry about the role of the tech industry in American political life, and that we have only a brief window of time in which to fix this.
april 2017 by jm
Cloudflare Reverse Proxies are Dumping Uninitialized Memory
february 2017 by jm
This is a massive bug. C considered harmful!
See also jgc's blog post: https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/
internet
security
cloudflare
caching
coding
buffer-overflows
c
data-leak
leaks
See also jgc's blog post: https://blog.cloudflare.com/incident-report-on-memory-leak-caused-by-cloudflare-parser-bug/
february 2017 by jm
4chan: The Skeleton Key to the Rise of Trump
february 2017 by jm
This is the best article on chan culture and how it's taken over
4chan
8chan
somethingawful
boards
history
internet
trump
alt-right
february 2017 by jm
Riot Games Seek Court Justice After Internet Provider Deliberately Causes In-Game Lag
february 2017 by jm
Pretty damning for Time-Warner Cable:
ftc
fcc
twc
time-warner
cable
isps
network-neutrality
league-of-legends
internet
When it seemed that the service provider couldn’t sink any lower, they opted to hold Riot to a ‘lag ransom’. Following Riot’s complaints regarding the inexplicable lag the player base were experiencing, TWC offered to magically solve the issue, a hardball tactic to which Riot finally admitted defeat in August of 2015. Before the deal was finalised, lag and data-packet loss for League of Legends players were far above the standards Riot was aiming for. Miraculously, after the two tech companies reached an unpleasant deal, the numbers improved.
february 2017 by jm
The hidden cost of QUIC and TOU
quic
tou
protocols
http
tls
security
internet
crypto
privacy
firewalls
debugging
operability
december 2016 by jm
The recent movement to get all traffic encrypted has of course been great for the Internet. But the use of encryption in these protocols is different than in TLS. In TLS, the goal was to ensure the privacy and integrity of the payload. It's almost axiomatic that third parties should not be able to read or modify the web page you're loading over HTTPS. QUIC and TOU go further. They encrypt the control information, not just the payload. This provides no meaningful privacy or security benefits.
Instead the apparent goal is to break the back of middleboxes [0]. The idea is that TCP can't evolve due to middleboxes and is pretty much fully ossified. They interfere with connections in all kinds of ways, like stripping away unknown TCP options or dropping packets with unknown TCP options or with specific rare TCP flags set. The possibilities for breakage are endless, and any protocol extensions have to jump through a lot of hoops to try to minimize the damage.
december 2016 by jm
mjg59 | Fixing the IoT isn't going to be easy
iot
security
internet
isps
devices
october 2016 by jm
We can't easily fix the already broken devices, we can't easily stop more broken devices from being shipped and we can't easily guarantee that we can fix future devices that end up broken. The only solution I see working at all is to require ISPs to cut people off, and that's going to involve a great deal of pain. The harsh reality is that this is almost certainly just the tip of the iceberg, and things are going to get much worse before they get any better.
october 2016 by jm
Brian Krebs - The Democratization of Censorship
brian-krebs
censorship
ddos
internet
web
politics
crime
security
iot
september 2016 by jm
Events of the past week have convinced me that one of the fastest-growing censorship threats on the Internet today comes not from nation-states, but from super-empowered individuals who have been quietly building extremely potent cyber weapons with transnational reach. More than 20 years after Gilmore first coined [his] turn of phrase, his most notable quotable has effectively been inverted — “Censorship can in fact route around the Internet.” The Internet can’t route around censorship when the censorship is all-pervasive and armed with, for all practical purposes, near-infinite reach and capacity.
september 2016 by jm
How Internet Trolls Won the 2016 Presidential Election
internet
journalism
politics
4chan
8chan
channers
trolls
nazis
racism
pepe-the-frog
trump
september 2016 by jm
Because this was a novel iteration of online anti-Semitic culture, to the normie media it was worthy of deeply concerned coverage that likely gave a bunch of anti-Semites, trolls, and anti-Semitic trolls exactly the attention and visibility they craved. All without any of them having to prove they were actually involved, meaningfully, in anti-Semitic politics. That’s just a lot of power to give to a group of anonymous online idiots without at least knowing how many of them are 15-year-old dweebs rather than, you know, actual Nazis. [...]
In the long run, as journalistic coverage of the internet is increasingly done by people with at least a baseline understanding of web culture, that coverage will improve. For now, though, things are grim: It’s hard not to feel like journalists and politicos are effectively being led around on a leash by a group of anonymous online idiots, many of whom don’t really believe in anything.
september 2016 by jm
Law to allow snooping on social media defies European court ruling
july 2016 by jm
Karlin on fire:
surveillance
ireland
whatsapp
viber
snowden
snooping
karlin-lillington
facebook
internet
data-retention
But there’s lots in this legislation that should scare the public far more. For example, the proposal that the legislation should allow the retention of “superfluous data” gathered in the course of an investigation, which is a direct contravention of the ECJ’s demand that surveillance must be targeted and data held must be specifically relevant, not a trawl to be stored for later perusal “just in case”.
Or the claim that interception and retention of data, and access to it, will only be in cases of the most serious crime or terrorism threats. Oh, please. This was, and remains, the supposed basis for our existing, ECJ-invalidated legislation. Yet, as last year’s Gsoc investigation into Garda leaks revealed, it turns out a number of interconnected pieces of national legislation allow at least 10 different agencies access to retained data, including Gsoc, the Competition Authority, local authorities and the Irish Medicines Board.
july 2016 by jm
E-Voting in Estonia needs to be discontinued
internet
technology
e-voting
voting
security
via:mattblaze
estonia
i-voting
russia
cybercrime
june 2016 by jm
After studying other e-voting systems around the world, the team was particularly alarmed by the Estonian I-voting system. It has serious design weaknesses that are exacerbated by weak operational management. It has been built on assumptions which are outdated and do not reflect the contemporary reality of state-level attacks and sophisticated cybercrime. These problems stem from fundamental architectural problems that cannot be resolved with quick fixes or interim steps. While we believe e-government has many promising uses, the Estonian I-voting system carries grave risks — elections could be stolen, disrupted, or cast into disrepute. In light of these problems, our urgent recommendation is that to maintain the integrity of the Estonian electoral process, use of the Estonian I-voting system should be immediately discontinued.
june 2016 by jm
Terrorism and internet blocking – is this the most ridiculous amendment ever? - EDRi
edri
blocking
internet
censorship
eu
ep
june 2016 by jm
So, there you have it: Blocking is necessary, except it is not. Safeguards need to be implemented, except they don’t need to be. This approach is legal, except it isn’t. The text is based on the Child Exploitation Directive, except it isn’t. Is this really how we are going to create credible legislation on terrorism?
june 2016 by jm
The History of the Irish Internet
niallm
internet
ireland
history
networking
heanet
ieunet
june 2016 by jm
This site is a companion effort to the techarchives website, except it is less well-researched, and is primarily a personal view of the development of the Internet in Ireland by your humble author, Niall Murphy.
june 2016 by jm
TechArchives
june 2016 by jm
I need to get in touch about the early days of the Irish web!
web
ireland
history
internet
www
an online home for stories from Ireland – stories about the country’s long and convoluted relationship with information technology. It aims to gather information on the most significant aspects of this relationship, to compile archives on the selected themes, and to store the assembled records for the benefit of future generations.
june 2016 by jm
The Irish Internet in the 1980s
june 2016 by jm
from Dr Mark Humphrys in DCU:
mark-humphrys
dcu
history
tcd
bitnet
ireland
internet
web
www
1980s
A collection of bits and pieces of Internet history. Focusing somewhat (but not exclusively) on: (a) the 1980s, when I first started using the Internet, and: (b) Ireland.
june 2016 by jm
Amazon S3 Transfer Acceleration
aws
s3
networking
infrastructure
ops
internet
cdn
april 2016 by jm
The AWS edge network has points of presence in more than 50 locations. Today, it is used to distribute content via Amazon CloudFront and to provide rapid responses to DNS queries made to Amazon Route 53. With today’s announcement, the edge network also helps to accelerate data transfers in to and out of Amazon S3. It will be of particular benefit to you if you are transferring data across or between continents, have a fast Internet connection, use large objects, or have a lot of content to upload.
You can think of the edge network as a bridge between your upload point (your desktop or your on-premises data center) and the target bucket. After you enable this feature for a bucket (by checking a checkbox in the AWS Management Console), you simply change the bucket’s endpoint to the form BUCKET_NAME.s3-accelerate.amazonaws.com. No other configuration changes are necessary! After you do this, your TCP connections will be routed to the best AWS edge location based on latency. Transfer Acceleration will then send your uploads back to S3 over the AWS-managed backbone network using optimized network protocols, persistent connections from edge to origin, fully-open send and receive windows, and so forth.
april 2016 by jm
Hungary proposes anti-crypto law
april 2016 by jm
up to 2 years imprisonment for use of apps for encrypted communication
crypto
hungary
laws
internet
crackdown
encryption
april 2016 by jm
Angola’s Wikipedia Pirates Are Exposing the Problems With Digital Colonialism | Motherboard
facebook
piracy
africa
hacks
wikipedia
angola
internet
march 2016 by jm
Wikimedia and Facebook have given Angolans free access to their websites, but not to the rest of the internet. So, naturally, Angolans have started hiding pirated movies and music in Wikipedia articles and linking to them on closed Facebook groups, creating a totally free and clandestine file sharing network in a country where mobile internet data is extremely expensive.
march 2016 by jm
RFC 7754 - Technical Considerations for Internet Service Blocking and Filtering
(via Tony Finch)
via:fanf
blocking
censorship
filtering
internet
rfcs
rfc
isps
march 2016 by jm
The Internet is structured to be an open communications medium. This
openness is one of the key underpinnings of Internet innovation, but
it can also allow communications that may be viewed as undesirable by
certain parties. Thus, as the Internet has grown, so have mechanisms
to limit the extent and impact of abusive or objectionable
communications. Recently, there has been an increasing emphasis on
"blocking" and "filtering", the active prevention of such
communications. This document examines several technical approaches
to Internet blocking and filtering in terms of their alignment with
the overall Internet architecture. When it is possible to do so, the
approach to blocking and filtering that is most coherent with the
Internet architecture is to inform endpoints about potentially
undesirable services, so that the communicants can avoid engaging in
abusive or objectionable communications. We observe that certain
filtering and blocking approaches can cause unintended consequences
to third parties, and we discuss the limits of efficacy of various
approaches.
(via Tony Finch)
march 2016 by jm
TeleGeography Submarine Cable Map 2015
march 2016 by jm
Gorgeously-illustrated retro map of modern-day submarine cables. Prints available for $150 (via Conor Delaney)
via:conor-delaney
data
internet
maps
cables
world
telegeography
mapping
retro
march 2016 by jm
WebSockets, caution required!
january 2016 by jm
This, so much.
http
realtime
websockets
long-polling
http2
protocols
transport
web
internet
There are very valid technical reasons many of the biggest sites on the Internet have not adopted them. Twitter use HTTP/2 + polling, Facebook and Gmail use Long Polling. Saying WebSockets are the only way and the way of the future, is wrongheaded. HTTP/2 may end up winning this battle due to the huge amount of WebSocket connections web browsers allow, and HTTP/3 may unify the protocols
january 2016 by jm
League of Legends win-rates vs latency analysed
(via Nelson)
games
league-of-legends
latency
ping
gaming
internet
via:nelson
december 2015 by jm
It appears that more mechanically intensive champions are more affected by latency, while tankier champions or those with point-and-click abilities are less affected by latency.
(via Nelson)
december 2015 by jm
TJ McIntyre on Twitter: "Here's how Ireland polices computer crime https://t.co/bpHIxtaXZC https://t.co/qez1kJk27N"
december 2015 by jm
"Irish police have no cybercrime unit, and 1/3 of police have no email." ffs!
cybercrime
policing
ireland
gardai
fraud
privacy
phishing
hacking
internet
law
december 2015 by jm
How a group of neighbors created their own Internet service | Ars Technica
november 2015 by jm
Orcas Island, WA. impressive stuff
community
diy
internet
wa
wireless
networking
orcas-island
november 2015 by jm
Net neutrality: EU votes in favour of Internet fast lanes and slow lanes | Ars Technica UK
october 2015 by jm
:(
eu
net-neutrality
internet
europe
ep
politics
In the end, sheer political fatigue may have played a major part in undermining net neutrality in the EU. However, the battle is not quite over. As Anne Jellema, CEO of the Web Foundation, which was established by Berners-Lee in 2009, notes in her response to today's EU vote: "The European Parliament is essentially tossing a hot potato to the Body of European Regulators, national regulators and the courts, who will have to decide how these spectacularly unclear rules will be implemented. The onus is now on these groups to heed the call of hundreds of thousands of concerned citizens and prevent a two-speed Internet."
october 2015 by jm
Dublin-traceroute
handy. written by AWS SDE Andrea Barberio!
internet
tracing
traceroute
networking
ecmp
nat
ip
october 2015 by jm
uses the techniques invented by the authors of Paris-traceroute to enumerate the paths of ECMP flow-based load balancing, but introduces a new technique for NAT detection.
handy. written by AWS SDE Andrea Barberio!
october 2015 by jm
What Happens Next Will Amaze You
september 2015 by jm
Maciej Ceglowski's latest talk, on ads, the web, Silicon Valley and government:
talks
slides
funny
ads
advertising
internet
web
privacy
surveillance
maciej
silicon-valley
'I went to school with Bill. He's a nice guy. But making him immortal is not going to make life better for anyone in my city. It will just exacerbate the rent crisis.'
september 2015 by jm
Kubernetes and AWS VPC Peering – Ben Straub
august 2015 by jm
the perils of overloading 10/8
10/8
ec2
aws
vpc
kubernetes
ops
internet
ip-addresses
august 2015 by jm
India lifts porn ban after widespread outrage - BBC News
august 2015 by jm
After a brief couple of days.
india
porn
filtering
isps
internet
web
child-porn
censorship
News of the ban caused a furore on Indian social media, with several senior politicians and members of civil society expressing their opposition to the move. The Indian government said that it was merely complying with the Supreme Court order and was committed to the freedom of communication on the Internet. "I reject with contempt the charge that it is a Talibani government, as being said by some of the critics. Our government supports free media, respects communication on social media and has respected freedom of communication always," Mr Prasad told PTI.
august 2015 by jm
How .uk came to be (and why it's not .gb)
dot-uk
history
internet
dot-gb
britain
uk
northern-ireland
ireland
janet
july 2015 by jm
WB: By the late 80s the IANA [the Internet Assigned Numbers Authority, set up in 1988 to manage global IP address allocations] was trying to get all those countries that were trying to join the internet to use the ISO 3166 standard for country codes. It was used for all sorts of things — you see it on cars, “GB” for the UK. [...]
At that point, we’re faced with a problem that Jon Postel would like to have changed it to .gb to be consistent with the rest of the world. Whereas .uk had already been established, with a few tens of thousands of domain names with .uk on them. I remember chairing one of the JANET net workshops that were held every year, and the Northern Irish were adamant that they were part of the UK — so the consensus was, we’d try and keep .uk, we’d park .gb and not use it.
PK: I didn’t particularly want to change to .gb because I was responsible for Northern Ireland as well. And what’s more, there was a certain question as to whether a research group in the US should be allowed to tell the British what to do. So this argy-bargy continued for a little while and, in the meantime, one of my clients was the Ministry of Defence, and they decided they couldn’t wait this long, and they decided I was going to lose the battle, and so bits of MOD went over to .gb — I didn’t care, as I was running .gb and .uk in any case.
july 2015 by jm
Apple now biases towards IPv6 with a 25ms delay on connections
july 2015 by jm
Interestingly, they claim that IPv6 tends to be more reliable and has lower latency now:
apple
ipv6
ip
tcp
networking
internet
happy-eyeballs
ios
osx
Based on our testing, this makes our Happy Eyeballs implementation go from roughly 50/50 IPv4/IPv6 in iOS 8 and Yosemite to ~99% IPv6 in iOS 9 and El Capitan betas. While our previous implementation from four years ago was designed to select the connection with lowest latency no matter what, we agree that the Internet has changed since then and reports indicate that biasing towards IPv6 is now beneficial for our customers: IPv6 is now mainstream instead of being an exception, there are less broken IPv6 tunnels, IPv4 carrier-grade NATs are increasing in numbers, and throughput may even be better on average over IPv6.
july 2015 by jm
HTTP/2 is here, let's optimize! - Velocity SC 2015 - Google Slides
june 2015 by jm
Changes which server-side developers will need to start considering as HTTP/2 rolls out. Remove domain sharding; stop concatenating resources; stop inlining resources; use server push.
http2
http
protocols
streaming
internet
web
dns
performance
june 2015 by jm
Emojineering Part 1: Machine Learning for Emoji Trends - Instagram Engineering
may 2015 by jm
Instagram figuring out meanings from Emoji usage contexts using ML. 😮
instagram
emoji
cool
language
text
internet
web
speech
communication
trends
machine-learning
analysis
may 2015 by jm
David P. Reed on the history of UDP
april 2015 by jm
'UDP was actually “designed” in 30 minutes on a blackboard when we decided pull the original TCP protocol apart into TCP and IP, and created UDP on top of IP as an alternative for multiplexing and demultiplexing IP datagrams inside a host among the various host processes or tasks. But it was a placeholder that enabled all the non-virtual-circuit protocols since then to be invented, including encapsulation, RTP, DNS, …, without having to negotiate for permission either to define a new protocol or to extend TCP by adding “features”.'
udp
ip
tcp
networking
internet
dpr
history
protocols
april 2015 by jm
Why We Will Not Be Registering easyDNS.SUCKS - blog.easydns.org
(via Nelson)
shakedown
business
internet
domains
dns
easydns
dot-sucks
scams
tlds
trademarks
ip
april 2015 by jm
If you're not immersed in the naming business you may find the jargon in it hard to understand. The basic upshot is this: the IPC believes that the mechanisms that were enacted to protect trademark holders during the deluge of new TLD rollouts are being gamed by the .SUCKS TLD operator to extort inflated fees from trademark holders.
(via Nelson)
april 2015 by jm
China’s Great Cannon
censorship
ddos
internet
security
china
great-cannon
citizen-lab
reports
web
april 2015 by jm
Conducting such a widespread attack clearly demonstrates the weaponization of the Chinese Internet to co-opt arbitrary computers across the web and outside of China to achieve China’s policy ends. The repurposing of the devices of unwitting users in foreign jurisdictions for covert attacks in the interests of one country’s national priorities is a dangerous precedent — contrary to international norms and in violation of widespread domestic laws prohibiting the unauthorized use of computing and networked systems.
april 2015 by jm
Russia just made a ton of Internet memes illegal - The Washington Post
memes
photoshop
russia
freedom
web
internet
funny
humour
roskomnadzor
censorship
sad-keanu
april 2015 by jm
In post-Soviet Russia, you don’t make memes. Memes make (or unmake?) you. That is, at least, the only conclusion we can draw from an announcement made this week by Russia’s three-year-old media agency/Internet censor Roskomnadzor, which made it illegal to publish any Internet meme that depicts a public figure in a way that has nothing to do with his “personality.”
april 2015 by jm
Tim Bray on one year as an xoogler
march 2015 by jm
Seems pretty insightful; particularly "I do think the Internet economy would be better and more humane if it didn’t have a single white-hot highly-overprivileged center. Also, sooner or later that’ll stop scaling. Can’t happen too soon."
google
tim-bray
via:nelson
xoogler
funding
tech
privacy
ads
internet
march 2015 by jm
Meet the man whose utopian vision for the Internet conquered, and then warped, Silicon Valley - The Washington Post
march 2015 by jm
Thought-provoking article looking back to John Perry Barlow's "A Declaration of the Independence of Cyberspace", published in 1996:
john-perry-barlow
1990s
history
cyberspace
internet
surveillance
privacy
data-protection
libertarianism
utopian
manifestos
Barlow once wrote that “trusting the government with your privacy is like having a Peeping Tom install your window blinds.” But the Barlovian focus on government overreach leaves its author and other libertarians blind to the same encroachments on our autonomy from the private sector. The bold and romantic techno-utopian ideals of “A Declaration” no longer need to be fought for, because they’re already gone.
march 2015 by jm
Sign up for Privacy International's anti-surveillance campaign
gchq
nsa
spying
surveillance
internet
phone
uk
law
campaign
privacy-international
february 2015 by jm
Have you ever made a phone call, sent an email, or, you know, used the internet? Of course you have!
Chances are, at some point over the past decade, your communications were swept up by the U.S. National Security Agency. The NSA then shares information with the UK Government's intelligence agency GCHQ by default. A recent court ruling found that this sharing was unlawful. But no one could find out if their records were collected and then illegally shared between these two agencies… until now!
Because of our recent victory against the UK intelligence agency in court, now anyone in the world — yes, ANYONE, including you — can find out if GCHQ illegally received information about you from the NSA. Join our campaign by entering your details below to find out if GCHQ illegally spied on you, and confirm via the email we send you. We'll then go to court demanding that they finally come clean on unlawful surveillance.
february 2015 by jm
NA Server Roadmap Update: PoPs, Peering, and the North Bridge
january 2015 by jm
League of Legends has set up private network links to a variety of major US ISPs to avoid internet weather (via Nelson)
via:nelson
peering
games
networks
internet
ops
networking
january 2015 by jm
David Cameron in 'cloud cuckoo land' over encrypted messaging apps ban | Technology | The Guardian
business
guardian
david-cameron
uk-politics
crypto
ripa
messaging
internet
privacy
january 2015 by jm
One insider at a major US technology firm told the Guardian that “politicians are fond of asking why it is that tech companies don’t base themselves in the UK” ... “I think if you’re saying that encryption is the problem, at a time when consumers and businesses see encryption as a very necessary part of trust online, that’s a very indicative point of view.”
january 2015 by jm
Schneier on Security: Why Data Mining Won't Stop Terror
january 2015 by jm
A good reference URL to cut-and-paste when "scanning internet traffic for terrorist plots" rears its head:
Also, Ben Goldacre saying the same thing: http://www.badscience.net/2009/02/datamining-would-be-lovely-if-it-worked/
internet
scanning
filtering
specificity
statistics
data-mining
terrorism
law
nsa
gchq
false-positives
false-negatives
This unrealistically accurate system will generate 1 billion false alarms for every real terrorist plot it uncovers. Every day of every year, the police will have to investigate 27 million potential plots in order to find the one real terrorist plot per month. Raise that false-positive accuracy to an absurd 99.9999 percent and you're still chasing 2,750 false alarms per day -- but that will inevitably raise your false negatives, and you're going to miss some of those 10 real plots.
Also, Ben Goldacre saying the same thing: http://www.badscience.net/2009/02/datamining-would-be-lovely-if-it-worked/
january 2015 by jm
Richard Tynan on Twitter: "GCHQ Tapping Eircom owned cable"
november 2014 by jm
Cable listed as owned by Eircom and Cable and Wireless (now Vodafone?)
vodafone
cables
tapping
surveillance
eircom
internet
uk
november 2014 by jm
IAB Statement on Internet Confidentiality
Wow. so much for IPSec
ipsec
iab
ietf
snowden
surveillance
crypto
protocols
internet
november 2014 by jm
Newly designed protocols should prefer encryption to cleartext operation. There may be exceptions to this default, but it is important to recognize that protocols do not operate in isolation. Information leaked by one protocol can be made part of a more substantial body of information by cross-correlation of traffic observation. There are protocols which may as a result require encryption on the Internet even when it would not be a requirement for that protocol operating in isolation.
We recommend that encryption be deployed throughout the protocol stack since there is not a single place within the stack where all kinds of communication can be protected.
Wow. so much for IPSec
november 2014 by jm
Eircom have run out of network capacity
Guess this is what happens when Amazon poach your IP network engineers. doh!
More seriously though, if you're marketing eFibre heavily, shouldn't you be investing in the upstream capacity to go with it?
eircom
fail
internet
capacity
forecasting
networking
november 2014 by jm
This is due in part to huge growth in the data volumes and data traffic that is transported over our network, which has exceeded our forecasted growth. We are making a number of improvements to our international connectivity which will add significant capacity and this work will be completed in the next two or three weeks.
Guess this is what happens when Amazon poach your IP network engineers. doh!
More seriously though, if you're marketing eFibre heavily, shouldn't you be investing in the upstream capacity to go with it?
november 2014 by jm
The man who made a game to change the world
october 2014 by jm
An interview with Richard Bartle, the creator of MUD, back in 1978.
mmo
mud
gaming
history
internet
richard-bartle
Perceiving the different ways in which players approached the game led Bartle to consider whether MMO players could be classified according to type. "A group of admins was having an argument about what people wanted out of a MUD in about 1990," he recalls. "This began a 200-long email chain over a period of six months. Eventually I went through everybody's answers and categorised them. I discovered there were four types of MMO player. I published some short versions of them then, when the journal of MUD research came out I wrote it up as a paper."
The so-called Bartle test, which classifies MMO players as Achievers, Explorers, Socialisers or Killers (or a mixture thereof) according to their play-style remains in widespread use today. Bartle believes that you need a healthy mix of all dominant types in order to maintain a successful MMO ecosystem. "If you have a game full of Achievers (players for whom advancement through a game is the primary goal) the people who arrive at the bottom level won't continue to play because everyone is better than them," he explains. "This removes the bottom tier and, over time, all of the bottom tiers leave through irritation. But if you have Socialisers in the mix they don't care about levelling up and all of that. So the lowest Achievers can look down on the Socialisers and the Socialisers don't care. If you're just making the game for Achievers it will corrode from the bottom. All MMOs have this insulating layer, even if the developers don't understand why it's there."
october 2014 by jm
Hungary plans new tax on Internet traffic, public calls for rally
october 2014 by jm
37p (EUR0.46) per GB -- that's a lot of money! bloody hell
via:bela
hungary
bandwidth
isps
tax
networking
internet
october 2014 by jm
webrtcH4cKS: ~ coTURN: the open-source multi-tenant TURN/STUN server you were looking for
webrtc
turn
sturn
rfc-5766
push
nat
stun
firewalls
voip
servers
internet
october 2014 by jm
Last year we interviewed Oleg Moskalenko and presented the rfc5766-turn-server project, which is a free open source and extremely popular implementation of TURN and STURN server. A few months later we even discovered Amazon is using this project to power its Mayday service. Since then, a number of features beyond the original RFC 5766 have been defined at the IETF and a new open-source project was born: the coTURN project.
october 2014 by jm
how King Cormac predicted Arguing On The Internet
october 2014 by jm
From <a href='http://www.maryjones.us/ctexts/cormac3.html'>The Wisdom of King Cormac</a>:
internet
arguing
history
ireland
king-cormac
hair-splitting
shouting
reddit
"O Cormac, grandson of Conn", said Carbery, "What is the worst pleading and arguing?" "Not hard to tell", said Cormac. "Contending against knowledge, contending without proofs, taking refuge in bad language, a stiff delivery, a muttering speech, hair-splitting, uncertain proofs, despising books, turning against custom, shifting one's pleading, inciting the mob, blowing one's own trumpet, shouting at the top of one's voice."
october 2014 by jm
Belkin Router Apocalypse
october 2014 by jm
Many Belkin routers attempt to determine if they're connected to the internet by pinging 'heartbeat.belkin.com', in a classic amateur fail move. Good reason not to run Belkin firmware if that's the level of code quality to expect
belkin
fail
ping
icmp
funny
internet
dailywtf
broken
october 2014 by jm
How do I keep my children safe online? What the security experts tell their kids | Technology | theguardian.com
september 2014 by jm
Lots of good advice for parents here
kids
online
social-media
internet
web
facebook
privacy
security
september 2014 by jm
Moving Big Data into the Cloud with Tsunami UDP - AWS Big Data Blog
august 2014 by jm
Pretty serious speedup. 81 MB/sec with Tsunami UDP, compared to 9 MB/sec with plain old scp. Probably kills internet performance for everyone else though!
tsunami-udp
udp
scp
copying
transfers
internet
long-distance
performance
speed
august 2014 by jm
NTP's days are numbered for consumer devices
august 2014 by jm
An accurate clock is required to negotiate SSL/TLS, so clock sync is important for internet-of-things usage. but:
tlsdate
ntp
clocks
time
sync
iot
via:gwire
ddos
isps
internet
protocols
security
Unfortunately for us, the traditional and most widespread method for clock synchronisation (NTP) has been caught up in a DDoS issue which has recently caused some ISPs to start blocking all NTP communication. [....] Because the DDoS attacks are so widespread, and the lack of obvious commercial pressure to fix the issue, it’s possible that the days of using NTP as a mechanism for setting clocks may well be numbered. Luckily for us there is a small but growing project that replaces it.
tlsdate was started by Jacob Appelbaum of the Tor project in 2012, making use of the SSL handshake in order to extract time from a remote server, and its usage is on the rise. [....] Since we started encountering these problems, we’ve incorporated tlsdate into an over-the-air update, and have successfully started using this in situations where NTP is blocked.
august 2014 by jm
The Internet's Original Sin - The Atlantic
august 2014 by jm
Ethan Zuckerberg: 'It's not too late to ditch the ad-based business model and build a better web.'
advertising
business
internet
ads
business-models
the-atlantic
ethan-zuckerberg
via:anildash
web
privacy
surveillance
google
august 2014 by jm
Syria's 2012 internet disconnection wasn't on purpose
august 2014 by jm
According to Edward Snowden, it was a side-effect of the NSA attempting to install an exploit in one of the core routers at a major Syrian ISP, and accidentally bricking the router
routers
exploits
hacking
software
tao
nsa
edward-snowden
syria
internet
privacy
august 2014 by jm
Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins | Threat Level | WIRED
august 2014 by jm
'The attacker specifically targeted a collection of bitcoin mining “pools”–bitcoin-producing cooperatives in which users contribute their computers’ processing power and are rewarded with a cut of the resulting cryptocurrency the pool produces. The redirection technique tricked the pools’ participants into continuing to devote their processors to bitcoin mining while allowing the hacker to keep the proceeds. At its peak, according to the researchers’ measurements, the hacker’s scam was pocketing a flow of bitcoins and other digital currencies including dogecoin and worldcoin worth close to $9,000 a day. “With this kind of hijacking, you can quite easily grab a large collection of clients,” says Pat Litke, one of the Dell researchers. “It takes less than a minute, and you end up with a lot of mining traffic under your control.”'
'In total, Stewart and Litke were able to measure $83,000 worth of cryptocurrency stolen in the BGP attack [...] but the total haul could be larger'
bitcoin
mining
fraud
internet
bgp
routing
security
attacks
hacking
'In total, Stewart and Litke were able to measure $83,000 worth of cryptocurrency stolen in the BGP attack [...] but the total haul could be larger'
august 2014 by jm
AWS Speed Test: What are the Fastest EC2 and S3 Regions?
august 2014 by jm
My god, this test is awful -- this is how NOT to test networked infrastructure. (1) testing from a single EC2 instance in each region; (2) uploading to a single test bucket for each test; (3) results don't include min/max or percentiles, just an averaged measurement for each test. FAIL
fail
testing
networking
performance
ec2
aws
s3
internet
august 2014 by jm
Obama administration says the world’s servers are ours | Ars Technica
Michael McDowell has filed a declaration in support of MS' position (attached to that article a couple of paras down) suggesting that the MLAT between the US and Ireland is the correct avenue.
privacy
eu
us-politics
microsoft
michael-mcdowell
law
surveillance
servers
sca
internet
july 2014 by jm
In its briefs filed last week, the US government said that content stored online doesn't enjoy the same type of Fourth Amendment protections as data stored in the physical world. The government cited (PDF) the Stored Communications Act (SCA), a President Ronald Reagan-era regulation.
Michael McDowell has filed a declaration in support of MS' position (attached to that article a couple of paras down) suggesting that the MLAT between the US and Ireland is the correct avenue.
july 2014 by jm
New Russian Law To Forbid Storing Russians' Data Outside the Country - Slashdot
russia
privacy
nsa
censorship
protectionism
internet
web
july 2014 by jm
On Friday Russia's parliament passed a law "which bans online businesses from storing personal data of Russian citizens on servers located abroad[.] ... According to ITAR-TASS, the changes to existing legislation will come into effect in September 2016, and apply to email services, social networks and search engines, including the likes of Facebook and Google. Domain names or net addresses not complying with regulations will be put on a blacklist maintained by Roskomnadzor (the Federal Supervision Agency for Information Technologies and Communications), the organisation which already has the powers to take down websites suspected of copyright infringement without a court order. In the case of non-compliance, Roskomnadzor will be able to impose 'sanctions,' and even instruct local Internet Service Providers (ISPs) to cut off access to the offending resource."
july 2014 by jm
Moquette MQTT
mqtt
moquette
netty
messaging
queueing
push-notifications
iot
internet
push
eclipse
may 2014 by jm
a Java implementation of an MQTT 3.1 broker. Its code base is small. At its core, Moquette is an events processor; this lets the code base be simple, avoiding thread sharing issues. The Moquette broker is lightweight and easy to understand so it could be embedded in other projects.
may 2014 by jm
The leaked New York Times innovation report is one of the key documents of this media age » Nieman Journalism Lab
via Antoin. This is pretty insightful -- the death of the homepage is notable
nytimes
publishing
media
journalism
tech
internet
web
news
leaks
via:antoin
may 2014 by jm
one of the world’s leading news organizations giving itself a rigorous self-examination. I’ve spoken with multiple digital-savvy Times staffers in recent days who described the report with words like “transformative” and “incredibly important” and “a big big moment for the future of the Times.” One admitted crying while reading it because it surfaced so many issues about Times culture that digital types have been struggling to overcome for years.
via Antoin. This is pretty insightful -- the death of the homepage is notable
may 2014 by jm
Observations of an Internet Middleman
Amazing that L3 are happy to publish this -- that's where big monopoly ISPs have led their industry.
net-neutrality
networking
internet
level3
congestion
isps
us-politics
may 2014 by jm
That leaves the remaining six [consumer ISPs peering with Level3] with congestion on almost all of the interconnect ports between us. Congestion that is permanent, has been in place for well over a year and where our peer refuses to augment capacity. They are deliberately harming the service they deliver to their paying customers. They are not allowing us to fulfil the requests their customers make for content. Five of those congested peers are in the United States and one is in Europe. There are none in any other part of the world. All six are large Broadband consumer networks with a dominant or exclusive market share in their local market. In countries or markets where consumers have multiple Broadband choices (like the UK) there are no congested peers.
Amazing that L3 are happy to publish this -- that's where big monopoly ISPs have led their industry.
may 2014 by jm
Flood IO Offering Network Emulation
april 2014 by jm
Performance-testing-as-a-service company Flood.IO now offering emulation of various crappy end-user networks: GSM, DSL, GPRS, 3G, 4G etc. Great idea.
flood.io
performance
networking
internet
load-testing
testing
jmeter
gatling
tests
gsm
3g
mobile
simulation
april 2014 by jm
Russia passes bill requiring bloggers to register with government
Russian blogging platforms have responded by changing view-counter tickers to display "2500+" as a max.
russia
blogs
blogging
terrorism
extremism
internet
regulation
chilling-effects
censorship
april 2014 by jm
A bill passed by the Russian parliament on Tuesday says that any blogger read by at least 3,000 people a day has to register with the government telecom watchdog and follow the same rules as those imposed by Russian law on mass media. These include privacy safeguards, the obligation to check all facts, silent days before elections and loose but threatening injunctions against "abetting terrorism" and "extremism."
Russian blogging platforms have responded by changing view-counter tickers to display "2500+" as a max.
april 2014 by jm
related tags
3-strikes ⊕ 3g ⊕ 4chan ⊕ 4g ⊕ 8chan ⊕ 10/8 ⊕ 1980s ⊕ 1990s ⊕ abuse ⊕ acquisitions ⊕ activism ⊕ adrian-weckler ⊕ ads ⊕ advertising ⊕ advice ⊕ afp ⊕ africa ⊕ alexis-petridish ⊕ aliases ⊕ alt-right ⊕ amazon ⊕ amesys ⊕ analysis ⊕ angela-nagle ⊕ angola ⊕ anonymity ⊕ anonymous ⊕ anti-phishing ⊕ anti-piracy-group ⊕ anti-spam ⊕ antisemitism ⊕ antisocial ⊕ ap ⊕ aphorisms ⊕ apple ⊕ appliances ⊕ architecture ⊕ archive ⊕ arguing ⊕ art ⊕ as-34109 ⊕ asf ⊕ asia ⊕ attacks ⊕ australia ⊕ austria ⊕ authentication ⊕ authoritarianism ⊕ automation ⊕ aws ⊕ az ⊕ b3ta ⊕ backoff ⊕ bandwidth ⊕ bandwidth-caps ⊕ banking ⊕ banks ⊕ belkin ⊕ benchmarks ⊕ bgp ⊕ billing ⊕ bitcoin ⊕ bitnet ⊕ bittorrent ⊕ blockchain ⊕ blocking ⊕ blocklists ⊕ blogging ⊕ blogs ⊕ boards ⊕ boing-boing ⊕ books ⊕ brexit ⊕ brian-krebs ⊕ britain ⊕ broadband ⊕ broken ⊕ bruce-schneier ⊕ buffer-overflows ⊕ bufferbloat ⊕ buffering ⊕ bull-sa ⊕ bullying ⊕ business ⊕ business-models ⊕ c ⊕ cable ⊕ cables ⊕ caching ⊕ cam ⊕ campaign ⊕ canada ⊕ capacity ⊕ capitalism ⊕ cb3rob ⊕ ccc ⊕ cdn ⊕ censorship ⊕ censorware ⊕ channers ⊕ checkip ⊕ checkpoints ⊕ child-porn ⊕ children ⊕ chilling-effects ⊕ china ⊕ cisco ⊕ citizen-lab ⊕ civil-liberties ⊕ cjeu ⊕ claire-perry ⊕ clocks ⊕ cloud-computing ⊕ cloudflare ⊕ codel ⊕ coding ⊕ cogent ⊕ comcast ⊕ comments ⊕ communication ⊕ community ⊕ computers ⊕ conferences ⊕ congestion ⊕ consultations ⊕ consume ⊕ consumer ⊕ content ⊕ content-blocking ⊕ cool ⊕ copyfight ⊕ copying ⊕ copyright ⊕ cory-doctorow ⊕ coverage ⊕ crackdown ⊕ crap-code ⊕ crime ⊕ crls ⊕ crypto ⊕ cryptography ⊕ culture ⊕ cutbacks ⊕ cyber-bullying ⊕ cyberbullying ⊕ cybercrime ⊕ cyberpunk ⊕ cyberspace ⊕ cyberstalking ⊕ daily-mail ⊕ dailywtf ⊕ data ⊕ data-leak ⊕ data-mining ⊕ data-protection ⊕ data-retention ⊕ datamining ⊕ david-cameron ⊕ dcenr ⊕ dcu ⊕ ddos ⊕ debate ⊕ debugging ⊕ default-on ⊕ democracy ⊕ denmark ⊕ design ⊕ devices ⊕ dhs ⊕ digiweb ⊕ disruption ⊕ diy ⊕ dmca ⊕ dns ⊕ dnsbls ⊕ doge ⊕ doh ⊕ domains ⊕ dot-gb ⊕ dot-sucks ⊕ dot-uk ⊕ downloading ⊕ dpi ⊕ dpr ⊕ dri ⊕ dublin ⊕ dvr ⊕ e-voting ⊕ east-texas ⊕ easydns ⊕ ebooks ⊕ ec2 ⊕ ecj ⊕ eclipse ⊕ ecmp ⊕ ecommerce ⊕ edri ⊕ edward-snowden ⊕ eff ⊕ eircom ⊕ email ⊕ embedded-software ⊕ emi ⊕ emoji ⊕ emusic ⊕ encryption ⊕ english ⊕ ep ⊕ estonia ⊕ ethan-zuckerberg ⊕ eu ⊕ euromaidan ⊕ europe ⊕ exploits ⊕ exponential-backoff ⊕ extremism ⊕ facebook ⊕ fail ⊕ fair-use ⊕ fake-news ⊕ false-negatives ⊕ false-positives ⊕ fame ⊕ family ⊕ fcc ⊕ feudal-internet ⊕ filesharing ⊕ filtering ⊕ firewalls ⊕ firmware ⊕ flood.io ⊕ forecasting ⊕ fps ⊕ fq_codel ⊕ france ⊕ fraud ⊕ free-speech ⊕ freedom ⊕ fridges ⊕ ftc ⊕ funding ⊕ fundraising ⊕ funny ⊕ future ⊕ futurism ⊕ gadgets ⊕ gadhafi ⊕ games ⊕ gaming ⊕ gardai ⊕ gatling ⊕ gchq ⊕ geodns ⊕ germaine-greer ⊕ gezi-park ⊕ gizmodo ⊕ global ⊕ globalisation ⊕ godwins-law ⊕ google ⊕ governance ⊕ government ⊕ grauniad ⊕ great-cannon ⊕ great-firewall ⊕ green-party ⊕ greens ⊕ gsm ⊕ guardian ⊕ hackernews ⊕ hackerspace ⊕ hacking ⊕ hacks ⊕ hadopi ⊕ hair-splitting ⊕ handshake ⊕ happy-eyeballs ⊕ harassment ⊕ hardware ⊕ hate-speech ⊕ heanet ⊕ heartbleed ⊕ hijacking ⊕ history ⊕ holland ⊕ home ⊕ horror ⊕ horse_ebooks ⊕ hosting ⊕ hotels ⊕ hsdpa ⊕ http ⊕ http2 ⊕ https ⊕ human-rights ⊕ humour ⊕ hungary ⊕ hyperlinks ⊕ i-voting ⊕ iab ⊕ ice ⊕ icmp ⊕ ietf ⊕ ieunet ⊕ ifpi ⊕ ikydz ⊕ ilya-grigorik ⊕ imagine ⊕ immutability ⊕ india ⊕ infrastructure ⊕ instagram ⊕ intelligence ⊕ internet ⊖ interview ⊕ iona-technologies ⊕ ios ⊕ iot ⊕ ip ⊕ ip-addresses ⊕ ipsec ⊕ iptables ⊕ ipv6 ⊕ ireland ⊕ irelandoffline ⊕ irish-times ⊕ ispai ⊕ isps ⊕ james-bridle ⊕ james-casey ⊕ james-hamilton ⊕ janet ⊕ javascript ⊕ jim-gettys ⊕ jmeter ⊕ johan-schluter ⊕ john-perry-barlow ⊕ journalism ⊕ jquery ⊕ karlin-lillington ⊕ kids ⊕ king-cormac ⊕ kubernetes ⊕ l2tp ⊕ labour ⊕ language ⊕ latency ⊕ law ⊕ laws ⊕ lawyers ⊕ league-of-legends ⊕ leaks ⊕ lecool ⊕ ledger ⊕ legal ⊕ level3 ⊕ lex-ferenda ⊕ liability ⊕ libertarianism ⊕ liberty ⊕ libya ⊕ linguist ⊕ linking ⊕ links ⊕ linx ⊕ load-testing ⊕ long-distance ⊕ long-polling ⊕ low-latency ⊕ maawg ⊕ machine-learning ⊕ maciej ⊕ maciej-ceglowski ⊕ macron ⊕ malcolm-hutty ⊕ manifestos ⊕ mapping ⊕ maps ⊕ mark-humphrys ⊕ mark-mcsharry ⊕ marketing ⊕ markov-chains ⊕ massive-interception ⊕ measurement ⊕ measurements ⊕ media ⊕ medicine ⊕ meetings ⊕ memes ⊕ mesh ⊕ mesh-networks ⊕ messaging ⊕ michael-mcdowell ⊕ michelangelo ⊕ microsoft ⊕ mike-godwin ⊕ milo ⊕ mining ⊕ mitm ⊕ mmo ⊕ mmorpgs ⊕ mmos ⊕ mobile ⊕ mobile-internet ⊕ moderation ⊕ money ⊕ moquette ⊕ morality ⊕ morons ⊕ mounir-mahjoubi ⊕ mp3 ⊕ mqtt ⊕ mud ⊕ music ⊕ music-industry ⊕ nabaztag ⊕ nat ⊕ nazis ⊕ neil-young ⊕ net-neutrality ⊕ netflix ⊕ netty ⊕ network ⊕ network-neutrality ⊕ networking ⊕ networks ⊕ news ⊕ nginx ⊕ niallm ⊕ normies ⊕ northern-ireland ⊕ not-the-onion ⊕ nsa ⊕ ntp ⊕ nudity ⊕ nytimes ⊕ o2 ⊕ occupy ⊕ ofcom ⊕ omgwtfbbq ⊕ online ⊕ open-rights-group ⊕ open-source ⊕ openssl ⊕ operability ⊕ opportunistic ⊕ ops ⊕ oracle ⊕ orcas-island ⊕ org ⊕ organisation ⊕ osce ⊕ ossian-smyth ⊕ osx ⊕ overblocking ⊕ p2p ⊕ packet-loss ⊕ packets ⊕ papers ⊕ pat-rabbitte ⊕ pathetic ⊕ payg ⊕ payment ⊕ pdf ⊕ peering ⊕ pegi ⊕ pepe-the-frog ⊕ performance ⊕ peter-flynn ⊕ phish ⊕ phishing ⊕ phone ⊕ phones ⊕ photoshop ⊕ ping ⊕ piracy ⊕ pirate-bay ⊕ pki ⊕ policing ⊕ policy ⊕ politics ⊕ politics.ie ⊕ porn ⊕ presentations ⊕ press-releases ⊕ pricing ⊕ prism ⊕ privacy ⊕ privacy-international ⊕ propaganda ⊕ protectionism ⊕ protocols ⊕ proxies ⊕ public ⊕ publishing ⊕ push ⊕ push-notifications ⊕ pypi ⊕ python ⊕ queueing ⊕ quic ⊕ racism ⊕ ratings ⊕ reading ⊕ real-names ⊕ realtime ⊕ recession ⊕ reddit ⊕ regulation ⊕ reliability ⊕ remote-disabling ⊕ reports ⊕ repression ⊕ research ⊕ retransmit ⊕ retries ⊕ retro ⊕ review ⊕ reviews ⊕ revocation ⊕ rfc ⊕ rfc-5766 ⊕ rfcs ⊕ richard-bartle ⊕ rick-falkvinge ⊕ rights ⊕ ripa ⊕ rob-manuel ⊕ roskomnadzor ⊕ round-trip ⊕ routers ⊕ routing ⊕ rst ⊕ rtt ⊕ russia ⊕ s3 ⊕ sad-keanu ⊕ safety ⊕ samsung ⊕ satellite ⊕ sca ⊕ scaling ⊕ scams ⊕ scanning ⊕ scp ⊕ sculpture ⊕ sean-sherlock ⊕ seanad ⊕ secret ⊕ security ⊕ seizure ⊕ servers ⊕ services ⊕ sf ⊕ shakedown ⊕ sherblock ⊕ shitheads ⊕ shouting ⊕ silicon-valley ⊕ simulation ⊕ sky ⊕ skype ⊕ slides ⊕ smart-tv ⊕ smc8014 ⊕ snooping ⊕ snowden ⊕ social-media ⊕ society ⊕ software ⊕ somethingawful ⊕ sonic.net ⊕ sopa ⊕ space ⊕ spam ⊕ spamhaus ⊕ specificity ⊕ speech ⊕ speed ⊕ spending ⊕ spy ⊕ spying ⊕ ssl ⊕ startups ⊕ state ⊕ state-control ⊕ statistics ⊕ stock-markets ⊕ stocks ⊕ stories ⊕ streaming ⊕ stun ⊕ stupid ⊕ sturn ⊕ subversion ⊕ surveillance ⊕ surveys ⊕ svensson ⊕ sweden ⊕ swpats ⊕ sync ⊕ synchronization ⊕ syria ⊕ t-mobile ⊕ tahrir-square ⊕ talk-talk ⊕ talks ⊕ tao ⊕ tapping ⊕ tax ⊕ taxes ⊕ tcd ⊕ tcp ⊕ tcpcrypt ⊕ tech ⊕ techcrunch ⊕ technology ⊕ teens ⊕ telecoms ⊕ telegeography ⊕ terrorism ⊕ testing ⊕ tests ⊕ text ⊕ the-atlantic ⊕ the-onion ⊕ things ⊕ think-of-the-children ⊕ three ⊕ tim-berners-lee ⊕ tim-bray ⊕ timbl ⊕ time ⊕ time-warner ⊕ tlds ⊕ tls ⊕ tlsdate ⊕ tor ⊕ totalitarianism ⊕ tou ⊕ tpb ⊕ traceroute ⊕ tracing ⊕ trademarks ⊕ trading ⊕ traffic ⊕ tragedy ⊕ trains ⊕ transfers ⊕ transphobia ⊕ transport ⊕ travel ⊕ trends ⊕ trolling ⊕ trolls ⊕ trump ⊕ tsunami-udp ⊕ tumblr ⊕ tunneling ⊕ tunnelling ⊕ turkey ⊕ turn ⊕ tutorials ⊕ tv ⊕ twc ⊕ twitter ⊕ udp ⊕ uk ⊕ uk-politics ⊕ unhrc ⊕ upc ⊕ us-politics ⊕ usa ⊕ utopian ⊕ vdsl ⊕ verisign ⊕ verizon ⊕ via:anildash ⊕ via:antoin ⊕ via:bela ⊕ via:conor-delaney ⊕ via:fanf ⊕ via:glen-gray ⊕ via:gwire ⊕ via:ip ⊕ via:irr ⊕ via:jimcarroll ⊕ via:joshea ⊕ via:kragen ⊕ via:mala ⊕ via:mattblaze ⊕ via:micktwomey ⊕ via:nelson ⊕ via:oisin ⊕ via:reddit ⊕ via:tieguy ⊕ via:tjmcintyre ⊕ via:walter ⊕ via:waxy ⊕ via:yoz ⊕ viber ⊕ violence ⊕ vodafone ⊕ voip ⊕ voting ⊕ vpc ⊕ vpn ⊕ wa ⊕ war ⊕ web ⊕ web-services ⊕ web-we-want ⊕ webrtc ⊕ websockets ⊕ whats-my-ip ⊕ whatsapp ⊕ wifi ⊕ wikipedia ⊕ windows ⊕ wireless ⊕ wisps ⊕ wordpress ⊕ world ⊕ www ⊕ wyoming ⊕ xelerance ⊕ xl2tpd ⊕ xml ⊕ xoogler ⊕ youtube ⊕Copy this bookmark: