verizon is essentially presenting a fallacy know as argument ad novitam: claiming x is right because it is new.
the opposite is also a fallacy: contending something is right because it's old.
experience is a better basis for evaluating any proposition.
our experience is that monopolies need to be regulated.
cable broadband clearly qualifies,-- we don't want 5 sets of cables handing on the poles.
this is and will continue to be a contentious issue.
Here in Michigan the Title II rule will bring broadband under the purview of the Michigan Public Service Commission -- which will give us a channel in which to resolve service issues -- a bit more effective than getting called an a-hole by some a-hole company.
Torvalds notes (p.95) of "Just for Fun" "If money was to get involved things would get murky. If you don't let money enter the picture you won't have greedy people".
greedy people we got and the lust to get adverts and recons into everyone's computer is stunningly vicious
I ran across this in a blog post today
oldschoolh4ck3r Welcome to the brave new world, where industries and governments collude to dissolve privacy and establish a digital battlefield. Deep-pocketed agencies can fund corporations towards their agendas of tainting technology in their favor, all the while pointing the finger at software 'bugs'. We're in a lot of trouble.
OpenSource and FSF software is the "Last Best Hope" for privacy and security
"dissonance" -- is simply the product of a disagreement
I found this on p.379 &ff of Gab. Coleman's new book THE MANY FACES OF ANONYMOUNS
"What surveillance really is, at its root, is a highly effective form of social control," reads an August Riseup newsletter. "The knowledge of always being watched changes our behavior and stifles dissent. The inability to associate secretly means there is no longer any possibility for free association. The inability to whisper means there is no longer any speech that is truly free of coercion, real or implied. Most profoundly, pervasive surveillance threatens to eliminate the most vital element of both democracy and social movements: the mental space for people to form dissenting and unpopular views."
the same sentiment is also stated in Glen Greenwald's recent NO PLACE TO HIDE ( Snowden story ). On page 3: "and history show the mere exstance of a mass surveillance aparatus, regardless of how it is used, is in itself sufficient to stifle dissent"
"It is error alone which requires the support of government. The truth, can stand on its own." - Thomas Jefferson.
the first step in cleaning up corruption is in exposing the truth. but government will see this as dissonance. this will be equated to "lies" or dis-information -- and suppressed,-- in order to preserve the"ordre public"
commercial pubs server their commercial masters and so also do political pubs serve also their political masters.
you would not expect to get an honest review of a Widget from a pub. which is taking advert. money from the company that makes Widgets.
today pubs often accept comments and such comments may help to shed the proper light on various subjects. and they do, at times. but at times good comments are flagged as "trolling" and trashed by the sys-admins.
the net bottom line is that each of us needs to "be our own man" -- not a "puppet on a string" -- manipulated by whatever public consensus can be blown up by advertisers and propagandists of the times.
this is the strongest reason for reclassifying the carriers under Title II. Here in Michigan you just tell them to cancel. Then if they bill you again you call the Public Service Commission and that *will* end the problem.
="And we wonder why Hollywood seems to have so much trouble learning how to embrace the internet."
throughout history executives will attempt to preserve cash cows at all costs. they all fail.
digital photograph was developed at Kodak. but Kodak was making a fortune on film and processing and chemicals. Can't have this digital crap around. Now, Kodak ain't around much anymore and the same will happen to other idiots who are attempting to save their precious cash cows.
remember what old Frank Roosevelt told us: "Anytime the government does anything you can bet it was carefully planned".
what changes will result from the Snowden leak? it's a puzzle: spooks always make every effort to be sure their accomplishments are not known. if Snowden was allowed to leak then that means what he has leaked -- was generally known to intelligence organizations around the world and all the uproar is is just part of the show.
we have 2 federal judges conflicting on Section 215 -- setting the stage for a SCOTUS decision
will NSA intelligence become admissible in court? no parallel detective work required to acquire evidence by legal means ? the "writ of assistance" noted in the 30c3 keynote?
i looked up "what is patentable",-- the wickedpedia essay states that the idea may not be abstract and must be non-obvious.
to me, for example, scanning a page to .pdf and then sending the .pdf via e/mail is an obvious use of 2 tools . how long did it take people to figure out they could print a page and then fax it ?
slide to unlock? how long have there been slide locks on barn doors? hmmmmm . any simple migration of an existing process to a computer program -- to me -- is "obvious". back in the Days of the Mainframe that's how we came up with all our COBOL programs .
oth, the math used in PGP to construct the public/private keys, I would say, is non-obvious. I read the description of how that is done and to me it was non-obvious.
in this, as in so many laws though, congress writes the laws, then we have a court case to establish precedent and then court tells us how they will enforce it. ( stare decisis.)
NSA probably rates an F for their stated objective. but what is their actual objective? I suspect it is tracking dissidents, and other collateral benefits such as tax-evaders, dead beat parents, or others who can be grabbed and squeezed for cash
there is no point in discussing encryption until the question of un-authorized programming is settled
i don't think there is any point in discussing un-authorized programming unless we are using open-source software ( I'm using Linux/Mint )
i tend to agree with Snowden -- nothing wrong with encryption that we have -- e.g. GnuPG -- implemented properly
he means on a secure host, and don't use "123456" for you password
the existing x.509 and CA structure is a mess: you are trusting everything your browser sends you -- and everything that mess has signed for
the First Thing a computer user should do is generate his key pair . once that's done he is in a position to vet and sign certificates . he won't need to do many of these -- just those that need to be secured -- e.g. NewEgg, Amazon, Credit Union, TurboTax, -- anyplace money is involved. you don't need https on a blog site. but you DO need GnuPG on your e/mail