On Mon, April 16, 2007 5:13 pm, kelsey hudson wrote:
> Andrew Lentvorski wrote:
>> It appears that there are some TOR nodes doing some nasty things in
>> Washington, DC.
>>
>> http://jadeserpent.i2p.tin0.de/tor-dc-nodes-2.txt
>
> And herein lies the reason why services like this are useless. If you
> want privacy, get off the internet, plain and simple. Any time you
> connect yourself (your computer?) to a public network, you open up
> yourself to scrutiny. If you can't deal with that, then don't
> participate. If the risks outweigh the benefits, then stop being
> paranoid and do the same thing the rest of us do: deal with it and move
> on.
>
> -Kelsey
>
It's not really paranoia, Kelsey. It's a sense of history. There is a
reason that the 4th Amendment was written and that there are federal laws
protecting 1st class mail from federal scrutiny. All of that came way
before the internet. And there is an asymtopic trend in abuse and
disregard for these rights and laws.
Remember that the FBI just copped to issuing 50,000 demands for personal
data that could not even get over the ridiculously low bar set by the
Patriot Act. And their response when they admitted to this avalanche of
abuse? "Don't worry, we were wrong but we promise it won't happen (on this
scale) again. But we can't tell you because it's SECRET."
I agree with you that people need to realize that what goes over the net
is open and forever, including (apparently) government officials who used
private email accounts and deleted millions of emails to circumvent the
Presidential Records Act <click "oops" click "oops" click "oops" click
"oops">. It's gonna be fun when the ISP backup tapes are subpoenaed.
I've often wondered if an email list could be set up that automatically
used GPG at both ends. The server could have its own public key, and could
then decrypt and reencrypt using the public key of every subscriber. Of
course, it would be easy for intelligence gatherers to penetrate by
signing up ("Yes, comrade, I too get off by exchanging secret salad
dressing recipes"). So the content wouldn't be secret for long, especially
if new members were being admitted.
Maybe the server could also strip the headers and signatures so that if
the list was penetrated, you couldn't track the content back. Hmm ...
you'd really have to put that server in a hardened bunker in a country
that lets you do just about anything. With maybe a thermite charge on top
of the HD that triggers if anyone opens the door without a combination.
OK, I'm the idea guy. The rest of you are the development team.
--
Lan Barnes
SCM Analyst Linux Guy
Tcl/Tk Enthusiast Biodiesel Brewer
--
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list