On 06/18/2014 12:36 PM, Brent E Hanner wrote:
Stuart Yeates wrote:

Compared to other contributors to this thread, I appear to be (a) less
worried about state actors than our commercial partners and (b) keener
to see relatively straight forward technical fixes that just work 'for
free' across large classes of library systems. Things like:

* An ILS module that pulls the HTTPS Everywhere ruleset from
https://gitweb.torproject.org/https-everywhere.git/tree/HEAD:/src/chrome/content/rules
and applies those rules as a standard data-cleanup step on all
imported data (MARC, etc).

* A plugin to the CMS that drives the library's websites / blogs /
whatever and uses the same rulesets to default all links to HTTPS.

* An EzProxy plugin (or howto) on silently redirectly users to HTTPS
over HTTP sites.

So let me see if I understand this.  Your concern is that commercial
partners are putting HTTP links in their systems rather than HTTPS.
Because HTTPS only protects from a third party so the partner will still
have access to all the information about what the user read.  IP6 will
improve the HTTPS issue but something like HTTPS Everywhere (
https://www.eff.org/https-everywhere ) is actually the simplest
solution, especially as you can't be sure every link will have HTTPS.

My concern is that by referring users to resources and services via HTTP rather than HTTPS, we are encouraging users to leak more personal information (reading habits, location, language settings, etc) to third parties.

These third parties include our networking providers, our hosting providers, our content providers, the next person who uses the users' public computer, etc., etc.

HTTPS protects in multiple ways. Firstly it protects the data 'on the wire' (but that is rarely a problem in practice). Secondly HTTPS protects from web caching attacks. Thirdly the fact that a connection is HTTPS causes almost all tools and applications to use a more secure set of options and preferences, covering everything from cookie handling, to not remembering passwords, not storing local caches, using shorter timeouts, etc. This last category is where the real protection is.

There are lots of privacy breaches that HTTPS won't deter (a thorough compromise of the users' machine, a thorough compromise of the content provider's machine, etc.), but it raises the bar and protects against a significant number of breaches that become impossible or much, much harder / less likely.

My understanding is that that HTTPS and EzProxy can potentially protect readers identity very effectively (assuming the library systems are secure and no one turns up with a warrant).

And having just read the Freedom to Read Statement, this issue has no
bearing on it.  Freedom to Read is about accessibility to materials, not
privacy.  While no doubt there is some statement somewhere about that,
Freedom to Read is a statement about diversity of materials and not the
ability to read them without anyone knowing about it.

If materials are only available at the cost of personal privacy, are they really available? In repressive regimes all across the world people are actively discriminated against (or worse) for read the wrong book, being in the wrong place or communicating in the wrong language.

How many of us live in countries where currently (or in living memory) people are been derided for speaking a non-English language?

cheers
stuart

Reply via email to