There’s a new game in town
Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
Stick’em with the pointy end
Virtual and not so Virtual Space
Be Still my Bleeding Heart …
The Never-ending Privacy Battle
The Many Sides of Bitcoin
Cyber Jihadists
Hacker Gangs
The New Old War
The Sacred Executioner
Scripting Aphrodites
There’s a new game in town My first foray into role playing games (RPGs) wasn’t actually an RPG at all. Rather, it was a computer based word puzzle, “The Colossal Cave” aka “Adventure.” I stumbled upon this game during a computer job back in the late 1970s. The game was written in Basic and ran on a PDP-11. I spent hours […]
Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI I recently purchased the Cirago USB Bluetooth/Wifi combo to use with my raspberry pi. All things considered, I am quite pleased. Being reasonably versed in google-fu, helped, of course. Since I want the freedom to do some mobile tinkering, I need to access the pi sans a lan. That, and my latest wild hair project […]
Stick’em with the pointy end Since I have been spending a great deal of my time playing in the field of 3D design and printing, I have only recently stumbled upon, and had time to read, “Privacy for Me and Not for Thee,” penned by Catherine A. Fitzpatrick, a human rights activist whom I first encountered in the virtual world […]
Virtual and not so Virtual Space Not long ago, someone asked if I liked 3D printing better than virtual worlds. The short answer is, equally but differently.
Be Still my Bleeding Heart … “Secure web servers are the equivalent of heavy armored cars. The problem is, they are being used to transfer rolls of coins and checks written in crayon by people on park benches to merchants doing business in cardboard boxes from beneath highway bridges. Further, the roads are subject to random detours, anyone with a screwdriver […]
The Never-ending Privacy Battle This brings me back to the Hundredpercent American. To some extent he is a pet of mine. I have always rather liked him, because he has some promising qualities. For instance, he has enormous hospitality. I used to feel personally complimented by the amazing warm-hearted hospitality showered on me by Americans. […] When I realized […]
The Many Sides of Bitcoin Pariah, darling, or somewhere in between. Bitcoin has continued to linger in the daily media spotlight since the shuttering of darknet’s black-market drug bazaar, Silk Road, and the subsequent announcement of the arrest of its alleged owner, Ross William Ulbricht (aka DPR), on October 2, 2013. Media mavens have long cast bitcoin as a sort […]
Cyber Jihadists “We’re facing a very great threat of loosely-coupled, organizational networks that increasingly rely on IT infrastructure to coordinate their movements and recruit young disenfranchised, apathetic guys as suicidal pawns in a sophisticated, dispersed movement. (…)” (AHM, Usenet, September 21, 2001)
Hacker Gangs Meet Jim Script Kiddie (skiddie). He is the guy (usually in his early to mid teens) who comes into a hacker forum, asking inane questions like, “how can I be a hacker?” He also tends to over-indulge in “hacker speak” making him look pretty much like a moron to seasoned (and not so) computer netizens.
The New Old War In 1956, FBI Director, J. Edgar Hoover initiated a program, code-named COINTELPRO (counter intelligence program) ushering in what would become the mainstay for how intelligence communities dealt with domesitic affairs. The sole directive of this program was “to expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of various dissidents and their leaders.
The Sacred Executioner In his book, “The Sacred Executioner,” Hyam Maccoby notes: “A figure in mythology that has received little attention is that of the Sacred Executioner. […] By taking the blame for the slaying, he is performing a great service to society, for not only does he perform the deed, but he takes upon himself the blame […]
Scripting Aphrodites On Wednesday, April 13, 2006, 10-year-old Jamie Rose Bolin was reported missing by her father. Investigators thought she may have been abducted by someone she met online. Oklahoma law enforcement suspected her abductor might be heading just across the border to Texas and requested Texas issue an Amber alert.
image There’s a new game in town
image Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
image Stick’em with the pointy end
image Virtual and not so Virtual Space
image Be Still my Bleeding Heart …
image The Never-ending Privacy Battle
image The Many Sides of Bitcoin
image Cyber Jihadists
image Hacker Gangs
image The New Old War
image The Sacred Executioner
image Scripting Aphrodites

Stick’em with the pointy end

Since I have been spending a great deal of my time playing in the field of 3D design and printing, I have only recently stumbled upon, and had time to read, “Privacy for Me and Not for Thee,” penned by , a human rights activist whom I first encountered in the virtual world of Second Life.

In the book, Fitzpatrick weaves an intriguing and thought provoking tale of and those who defend him. Delving into, to my mind, the most interesting part of this particular story, the trajectory of the movement, beginning with their 1992 battle cry and quite unlike its 1986 predecessor.

While I may not always agree with Fitzpatrick’s conclusions… that is, I admittedly tend to lean toward (I’ve worked & played with these sort, and as far as I am concerned, they are, for the most part, bumbling oafs and chest pounders), she raises relevant questions that are worthy of further scrutiny. The least of which involves , and what role, if any, he had to play with regard to Snowden accessing and eventually releasing to the world, NSA classified documents.

While Snowden may be the central character of this book, he is arguably, not the central theme. Rather, he is the catalyst that coheres the author’s thought exercise. And if he was recruited and groomed, as proposed, I would proffer that he is, in this case, the .

Otherwise put, consider this, if you will: a largely unknown “so-called” hacker, uses his sysadmin contract position to access and download NSA classified documents to his thumb drive, and flee. First to Hong Kong, and then to Russia. All of his own accord and purely due to altruistic intentions. Where he began and where he ended, however, begs further investigation. Especially in light of Snowden’s staged and ill-fated Putin Q&A, as well as Putin’s curious response.

And further investigation is what we receive. Replete with links to source material. Even so, conclusions may and do differ. So, while the collective we may never really agree that Snowden is a hero, a traitor, the pawn of darker machinations, or any combination thereof, the backstory covered in this book is in and of itself, fascinating.

As for NSA and their spy games and the wafting vapors fanned by the media machine upon a largely fainting and ignorant public? That anyone is surprised that a spy agency is… well… spying, admittedly boggles this writer’s mind. Moreover, that some who flaunt their personal lives in a very public way on social networks (apparently convincing themselves they are doing so in the privacy of their own homes, behind closed doors and drawn shades), are surprised NSA (and everyone else, especially ad campaigners) is in the business of data collecting, is another mind boggler.

But, I digress.

Fitzpatrick’s book weaves a provocative and believable web of intrigue. One foreshadowed by the
The Crypto Anarchist Manifesto of yesteryear, taking the form of crypto currencies such as bitcoin, and anonymous social networks, such as Twister, that the bitcoin protocol invites.

Now, add to the aforementioned, the heartbleed bug, companies coming together to fund core opensource development, while others fork the original openSSL code, and google ostensibly providing an easier path to encrypted email, and?

Fitzpatrick may very well be onto something.

Even so. Even if you believe we are ever closer to achieving total and complete encryption, and therefore, total and complete privacy. Don’t believe the lie.

Importantly, remember this. Encryption, in the context of inet, only covers the transport layers. Even if you wrap your data in an encrypted envelope and send it on random hops through or a , the data still must be decrypted to be read by the recipient.

Again, encryption, in the context of inet, only covers the transport layers.

Which is the primary “pointy stick” and title of Fitzpatrick’s book.