Spying on Web Mail

Spying on Web Mail

I and others have written about the spy’s pursuit of meta data. It’s not a problem, it’s not the content you know. This is an image from voice comms; once known as telephone conversations.  If you believe this, I suggest you watch “The Wire”. Meta data means “about data”, and consists of the from where, to whom, at what time. With mobile phones, your location can be tracked whether making a call or not. This is meant to be fine, because they don’t review content, i.e. what was said; so that’s OK then. However, the spies think that meta data is the person. An important and wilfully forgotten fact is that with email you can’t separate meta data from content. With web mail, the real meta data is all about the mail provider and maybe the mail client, which is a piece of software; again the meta data they want doesn’t exist as meta data, it is content!  …

pictfor: democracy 2.0

pictfor: democracy 2.0

Last night I went up to Westminster for a Pictfor meeting; this time, Parliament 2.0: How can the internet revolutionise British Democracy. The panel speakers were, Jaan Priisalu, Director General of the Estonian Information System’s Authority, Katie Ghose, CEO, Electoral Reform Society & Ruth Fox, Director, Hansard Society, while the meeting was chaired by Stephen Mosley MP, it was kicked off by the John Bercow MP, the Speaker. The centre piece of Bercow’s speech was an introduction, for me at least, to the Speaker’s Commission on Digital Democracy which is reviewing Representation, Scrutiny and the legislative process. Jaan Priisalu talked about Estonia’s e-voting paltform, while Ghose and Fox spoke about democratic engagement.  …

Was NO2ID wrong!

Was NO2ID wrong!

Was NO2ID a cul-de-sac? Who should be the identity assurers in the internet age? Today it’s code, that code is owned by someone and run by someone. Once we thought banks might run it, they don’t seem interested. The NO2ID campaign polarised the debate. We seem to be in a place that either the state does so on behalf of the public or private companies do so on behalf of their shareholders. Do we need a third way? Co-ops or P2P code?

  …

Is a DDOS attack the twenty first century equivalent of a picket line?

Is a DDOS attack the twenty first century equivalent of a picket line?

On Tuesday, the Labour Party’s preferred web hosting site, nationbuilder suffered a DDOS attack. It seems UKIP was the target and while Nationbuilder state that a botnet was used, other’s accuse a ‘lone nut’.  Obviously a sign of things to come, but it’s the second thing I’d think of in designing infrastructure for a political party. The first would be defence against a graffiti attack. These plans are often left till later as everyone concerned concentrates on functional requirements, Having said all this, I hope that my hosting provider is good enough. …

An internet accountable to private contract

An internet accountable to private contract

The BBC ran a story yesterday about the impending agreement between the UK based industrial content and the ISPs to adopt a warning system whereby the top four ISPs, will on notification from the industry trade associations write and warn their customers who allegedly download potentially copyright infringing material. The BBC covered this scoop in the morning on the Radio 4 today program and later in the evening on News Night.  …

Policy for Labour on the Digital Economy

Policy for Labour on the Digital Economy

The Labour Party’s proposed policy programme only mentions the digital economy once, and this is to promise more speed, everywhere it can go. There are two internal pressure group style swarms/groups/initiatives looking to do better.  The first is launched by the front bench incubated if not commissioned by the impressive Chi Onawaruh MP, currently shadow spokesperson for the Cabinet Office. This has it’s home at this site, Chi publicised the initiative at in an article at Labour List called How can we make Digital Government work better for everyone?. A great deal of thought has been undertaken in launching this initiative. The second initiative is @LabourDigital,  …

Time to move on from XP

Time to move on from XP

Microsoft have just ended support for XP; there are to be no more updates which means it’s a growing security threat! Not all organisations have moved forward yet, and probably even less home user including me. Microsoft’s behaviour over the last two years has not been helpful to consumers. Firstly, the ‘upgrade’ to the new look and feel of Windows 8 trashes consumer’s self administration skills. Making new systems do what they want and knew how to do on XP is hard. Secondly, moving forward using virtualisation technology as advised by this article at hongkiat remains difficult, partly because of Microsoft’s aggressive digital rights enforcement . Microsoft’s behaviour is not unusual, nor illegal, but there’s a lot of people who aren’t happy and Microsoft’s historic success is based on consumer adoption. They’re changing up, we probably need to also. …

Remediating the Internet’s outstanding SPOFs

Remediating the Internet’s outstanding SPOFs

Mike Masnick writes a little article forecasting the engineers re-writing the single points of failure out of the internet. He entitles his article, Building A More Decentralized Internet: It’s Happening Faster Than People Realize. He cross references to two articles written by himself back in 2010, Operation Payback And Wikileaks Show The Battle Lines Are About Distributed & Open vs. Centralized & Closed and The Revolution Will Be Distributed: Wikileaks, Anonymous And How Little The Old Guard Realizes What’s Going On in which he, more accurately, recognises the current and future power of distributed and private networks. It should be remembered that these predictions all occurred before the Arab spring and the recent protests in Turkey and the state responses to the use of networks. One of the key initiatives proposed in my mind, is to develop a P2P name service resolver, while others propose a P2P file system.

I wrote a wiki article, called “Ruggedising the Internet” which points at several further resources and projects. I might even join in. … …

Privacy and Big Data

I read Privacy and Big Data by Craig and Ludloff towards the end of 2013. The first chapter is called “The Perfect Storm”. The book lists a number of consumer and corporate computing trends, from Google’s search solution and their clustered file systems, the consumer adoption of cloud storage and the realisation of parallel computing models. There is no question that data is growing at an explosive rate and that new computational models are being developed to use these new volumes of data in timescales appropriate to the human. These new models are of interest to both the new internet companies and to Governments yet because of both social media and the distributed nature of modern computing raise questions of privacy. …

pictfor: the European Debate

pictfor: the European Debate

The Parliamentary Internet Communications and Technology Forum held a meeting entitled “The Europe Debate” and headlined it by inviting Bill Cash MP, not some one who I’d identify as an expert on ICT nor on the European Union. The three speakers were Julian David of “tech UK“, Graham Hobbs and Bill Cash MP, Chairman of the European Scrutiny Committee .  The key questions asked, were to be, Do UK technology companies benefit from EU membership? Is the Digital Single Market good for UK business? They also produced a Briefing Paper for delegates. …