Do you want a computer that will only install US Government authorized applications? That’s what the NSA wants for you, so they’ll have a front-door to every device.
I have a Snapchat account. I’ve not used it in years because it was making my cell phone too full. Imagine if Hillary Clinton had a Snapchat account too, for government business? Her’s would be used for an illegal purpose, like her personal email was. You may recall Sarah Palin got into trouble (without apparent consequence) for this sort of thing too.
MP for north shore Montreal, Charmaine Borg, made a presentation at the UofR this morning.
Of the things she noted was that cell phones are tracking devices, and Canadians have no way to follow their information to know who has it.
Charmaine met Erin and said she had an important question for him. She instantly asked him the question Hoback did; it was funny.
Privacy contracts are not decipherable by some lawyers let alone teens.
Borg: it’s “extremely problematic” the Conservatives scrap a census as a “#privacy violation”, while using cyber back door to violate us.
Your passwords used on the Internet are likely known to bad people if you’ve recently logged into Yahoo, the CRA, or other popular websites. You should consider changing all of your passwords next week if you’ve used them on the Internet, in case they were exposed by an attack using the “heartbleed” bug. This flaw in OpenSSL security allows attackers to get a “heartbeat” response from affected servers, including your password in an unencrypted form.
With computer security, if you have high convenience, you’re likely experiencing a low level of security. So throw away those old passwords, and pick some new ones to use with different websites. The more passwords you have, the fewer sites you’ll lose access to if one password is learned by an attacker.
I noticed another person with a CIBC 2-factor authentication fob on their key chain last week. It displays a seemingly random number that actually only a special server knows, so if a password is stolen, so too must the fob containing the random number code that changes every minute. Without both the password, and the fob, a thief is unable to log into a stolen account.
Passwords make the Web work, so we can have ‘our’ stuff, and keep unwanted and very unwelcome people from viewing it and changing our own information. So a title like “Kill the Password: Why a String of Characters Can’t Protect Us Anymore” should be very, very concerning to people and businesses depending upon computers alike.
This Forbes headline caught my eye recently, and I have mixed feelings about it. “Kill the Password: Why a String of Characters Can’t Protect Us Anymore”. Is it going to work to keep computer information secure? My scepticism is sky-high following the Snowden leaks of NSA and related world spying agencies overstepping their constitutional bounds. Could we really design a technology where it’s secure enough to trust the government to implement it for us? I’d trust it only after an intelligent group of individuals who understand encryption very well, give it a thumbs-up. Someone who has worked with WikiLeaks, and works on an anonymous Web system called Tor is Jacob Appelbaum. If Jacob gave a system the thumbs up, or a thumbs down, I’d take his word for it. Even better, he could explain why a system works, or does not.
Is another security technology on the horizon going to change the Web almost overnight in a very drastic or revolutionary way? I wish I had the answers. Maybe the NSA has the answer already? We can’t trust them, however.
With the Robocalls trial under way, some newer information is becoming public. That’s no thanks to the judge who has imposed a partial publication ban on investigative documents.
One person with a legitimate account to make robocalls at RackNine, was Andrew Prescott. On Thursday he wrote me to bring to my attention a new detail other than Rogers’ IP mistake brought up in court. Apparently Matt Meier of RackNine made an error initially in linking Prescott’s RackNine robocall account to a proxy server in Saskatchewan. The same proxy server was used by Pierre Poutine to order illegal robocalls for Guelph’s non-Conservative electors.
[Investigator] Mathews had traced the misleading calls in Guelph to an account with RackNine, a company that provides clients the ability to make automated phone calls to thousands of people at once. The account, under the pseudonym “Pierre Jones,” accessed RackNine using a specific IP address,
“The true subscriber for [the IP address] during the timeframe requested was ‘The Marty Burke Campaign,'” Mathews said.
ADDED: Catch additional details to this timeline in an update.
All times ET.
April 30, 2011 5:30 p.m.
Andrew Prescott, the campaign staffer who dealt with RackNine for voice broadcasts, or robocalls, replies to an email by Ken Morgan, the campaign manager, and Sona. Morgan and Sona had asked Prescott to provide the contact information for RackNine. RackNine President Matt Meier only provides his direct line to current clients.
A $75 pre-paid Visa card is purchased at the Shoppers Drug Mart on Scottsdale Drive in Guelph.
A pre-paid cell phone, or burner phone, is bought at Future Shop on Stone Road West in Guelph for $45.30. The buyer pays cash and activates the phone under the name “Pierre Poutine,” using the same gmail address that later communicates with Meier. Mathews says in the affidavit that he has driven between the Shoppers and the Future Shop, and they are 1.3 kilometres apart, nearly in a straight line.
The email@example.com account is created. Mathews says in his affidavit that Google has confirmed the email account was created at the same IP address used by the Burke Conservative campaign.
Below is the information Prescott asked me to share with my readers. (His first email is at the bottom.)
Date: Fri, 30 Aug 2013 09:23:02 -0600
Subject: Re: EC’s correction RE: Proxy Servers
From: andrew christianconservative.ca
To: saskboy hotmail.com
Because EC finally “officially” verified my side of things re: the proxy server. Not much point trying to wave my hands in the air screaming “BUT IT WASN’T ME!” when the printed “evidence” looked pretty convincing.
Again, no hard feelings… You were going only on what info was out there, and you didn’t know me well enough to know any better. A number of prominent Libs and CPC bloggers have reached out to me in private to offer their support, but that’s only cause they know the integrity of my character.
All the best,
On Friday, August 30, 2013, Saskboy From SK wrote:
May I ask why you waited until now to contact me to ask me to reveal your version of what happened? That article is nearly a year old.
I wrote it, of course, assuming that you would… Thanks for asking though. ;-)
Be nice. ;-)
On Friday, August 30, 2013, Saskboy From SK wrote:
Do you mind if I post this email to my blog?
Sent from my unlocked iPad
On 2013-08-29, at 5:26 PM, “Andrew Prescott” wrote:
You went pretty hard at me back in December, over the issue of proxy server use. (https://saskboy.wordpress.com/2012/12/12/concalls-proxy-investigation-robocon/)
Yesterday, EC corrected the record… they confirmed what I’ve said all along, that I in fact never used a proxy server. (http://news.nationalpost.com/2013/08/29/robocalls-investigator-suspected-that-others-were-involved-elections-canada-sworn-statement-reveals/)
While I don’t expect that I’ll ever be able to convince you of my innocence, it’s the truth.
That being said, no hard feelings… based on the information that was printed, I can see why you jumped to the conclusions you did. Heck, as an IT guy myself, even I’d think that I must have done it.
But my moral code would never let me do anything like that.
Just hoping to appeal to your sense of right, and see if you’d like to correct the record on your blog.
Thanks for your time,
Here’s the last of the CBC timeline as learned from court.
May 2, 2011, 4:54 p.m.
“Pierre Jones’s” account accesses RackNine but the access is stored in internal RackNine logs as Prescott’s user number. The session is left logged in as Prescott’s user ID.
The Conservative Party has been giving Elections Canada a hard time during the investigation.
Last night I fixed a Vista laptop (It wouldn’t finish booting into Windows normally because I’d installed another hard drive, and ran ClamAV which possibly changed a file it was depending on after I removed the other hard drive. I ran startup repair, and then the system restore option, and that fixed it, easily.)
This evening I noticed an old barcode scanner that Dad got in some online deal, and it never worked. It had DRM built into it, and wouldn’t read barcodes as plain text as they should be. Instead it encrypted the text and relied upon decryption software from a spyware server to give useful output. I learned this (again) tonight, trying to find out if plugging the USB device into Ubuntu would just work, since it’s the future, 2013. I had the hardest time figuring out the proper name for the scanner, but the Cat. No. 68-1966 on the bottom finally helped. It’s a CueCat. The IBM.com/eserver branding on the side was useless.
CueCats can be bought on eBay still for about $10.
This hacking project is about 8 years behind cutting edge, but now Dad has a working bar-code scanner for his desktop computer. And defeating DRM is a good way to pass the time.