Eldakka’s Techdirt Profile


About EldakkaTechdirt Insider

Eldakka’s Comments comment rss

  • Dec 1st, 2016 @ 2:52pm

    Re: US Border Crossing 101

    Buy a cheap temporary phone, new journal and/or a cheap tablet to do your work on.

    Unfortunately they would claim that any of the above is suspicious.

    Cheap new phone - suspicious.

    New journal that is entirely or mostly empty is suspicious.

    I mean, breathing is suspicious.

    And anyone who is not a US citizen wanting to enter the US is suspicious in the current climate...

  • Nov 29th, 2016 @ 7:53pm

    Where are the international arrest warrants?

    So, let me get this straight.

    Assuming the warrant is upheld, it should give immunity to the FBI agents from US-based legal consequences.

    However, a US-based warrant is not valid in other countries.

    Therefore we have a group of people who are known to have distributed child pornography in 120 foreign countries/territories for 10(?) days. We (or at least the courts/FBI if the actual agents names who were involved has been kept confidential) know who they are. They have admitted in court filings to have distributed child pornography. Therefore there is no question of fact as to who has distributed child pornography to those 120 countries for that period.

    Surely the authorities of those countries should be issuing arrest warrants, international arrest warrants, for those FBI agents/staff who conducted this operation?

    I mean, the Swedish authorities issued an international arrest warrant for questioning on suspicion of rape (Asange), but here we know for a fact of people distributing child pornography to 120 countries, over 8000 IP addresses, for 10 days?

  • Nov 29th, 2016 @ 7:42pm


    I am not condoning the actions of the ATF, however there is a world of difference.

    The legal and moral arguments behind making the distribution of even known, decades old images of child porn is that even tho the act of making the porn has passed, therefore the initial crime has been done, there is continuing harm to the victim even after that initial act. There is continuing emotional distress to the victim of having the porn distributed. It's mere existence is a harm to the victim. And each time it is distributed or re-distributed, another harm is inflicted on the victim.

    However, selling guns only creates a victim if the guns are actually used. Same with drugs. The product can be sold/given to the targets, then re-claimed later in a raid of some sort, and as long as the product hasn't been further distributed or used (the drugs are still there, the weapons are still there and haven't been used etc.), then there has been no harm created.

    So the drugs/guns only potentially creates victims, however there is a chance to re-claim it without creating any victims. But with child porn this cannot be said, distributing it creates or further harms the victims.

  • Nov 29th, 2016 @ 7:26pm

    (untitled comment)

    If Cyrus Vance likes back doors so much, maybe he should drop his pants in a public place, bend over, and let anyone have access.

  • Nov 29th, 2016 @ 7:21pm

    Re: Re: It's all okay, because we posted a public notice

    In a locked filing cabinet.

  • Nov 29th, 2016 @ 7:15pm

    Re: tactical clothing usa

    Tactical Clothing is now on my "never buy from here" list.

    Thanks for playing.

  • Nov 27th, 2016 @ 5:33pm

    Re: Re: Re: Re:

    The Supreme Court, the ones whos' opinion is the only ones' that matters, apparently does not agree with you.

  • Nov 25th, 2016 @ 1:48am

    Re: Re:

    "googol" is the name of a number, 10^100, or written out in full:
    10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 000000.

    Which I'm pretty sure could easily be classified as 'oodles'.

    It has been documented that the founders of Google meant to name it Googol (the number 10^100), but misspelled it (maybe they should have Googled for a dictionary first ! ;) ) as Google instead.

    Hence the above posters comment playing on the number and the intended name 'googol' with the mistakenly named Google.

  • Nov 20th, 2016 @ 11:10pm

    Re: Re: Re:

    Since all the talk about charging him has been in relation to the espionage act, I don't think even the DoJ thinks it could make treason stick.

  • Nov 20th, 2016 @ 11:05pm

    Re: Re:

    There cannot be pardon of a person who was not sentenced.

    Please square that with this:

    And there's a Supreme Court ruling that makes this abundantly clear. 150 years ago, in the ruling on Ex Parte Garland, the Supreme Court stated: The power of pardon conferred by the Constitution upon the President is unlimited except in cases of impeachment. It extends to every offence known to the law, and may be exercised at any time after its commission, either before legal proceedings are taken or during their pendency, or after conviction and judgment. The power is not subject to legislative control.

  • Nov 17th, 2016 @ 4:55pm

    Re: Are any of the ad tracking methods you talked about fooled by a VPN?

    Although a static IP aids data aggregation, the main tracking technologies for advertisers are based on being able to uniquely identify your computer and/or browser and associate it with a login or other information you've given to other sites. The methods include traditional cookies, flash cookies and other persistent identifiers, all of which pass right through a VPN and also allow the VPN IP to be associated with the target.

    There are many technologies that are used for tracking. IP's being one of them. They are all used because if, for example, you delete all your cookies, but they have your IP on record from when you had their cookies, when we re-connect with the same IP but no cookies, they can deduce that you are that person because you are using the same IP .

    It's the combination of information that they use. IPs, cookies, logins, tracking 'gifs', browser user-agent strings, what software you have installed on your computer (yes, some browser scripts can pull information directly from your computer, check out ThreatMetrix), hardware serial numbers, and more. They collect it all, so if a few elements go missing from your next session, say cookies deleted, or IP changed, or using a different username, they can use the remaining info that you haven't changed to fill in the gaps and still know who you are.

    Therefore it requires defense in depth. Changing IPs regualrly, using VPNs, ad-blocking, script blocking, URL blocking, plugins such as Ghostery, Ad-Block, uMatrix, uBlock Origin, Policeman, NoScript, and others.

    And also note, that in many ways the biggest threat to general online tracking is your own ISP. Look what the various ISP's have tried - putting unique identifiers on all your outbound packets, and so on. A VPN (as long as they are independent and not in cahoots with your ISP) will strip that (if it's at TCP/IP level) from your packets so the destination won't have that tracking information.

  • Nov 17th, 2016 @ 4:36pm

    Re: Re:

    Couldn't agree more.

    This is a blog, not a news site. I expect a lot more personal opinions, emotion, and a more conversational style on a blog site. In a conversation, people drop the occasional 'light' curse word, damn, shit, bugger, bloody hell, bullshit. Well, everyone except maybe the Queen. And, depending on the audience (e.g. not in a conversation with my mum), and how passionate one feels about the topic, the odd f-bomb or other stronger curses may be used.

    If I want the dry, sanitized news, I'll go to a news site with their army of editors. Style editors, newsworthiness editors, fact checkers, topic-specific editors (sports, entertainment, et al.), editors-in-chief. All answering to corporate masters (CIOs, Boards, owners of the conglomerates that owns the company that owns the news site).

  • Nov 17th, 2016 @ 4:21pm

    Re: You still need to test your connection

    How do you do such tests? Are there sites you can hit (via the VPN) that display detailed information of the TCP/IP and HTTP/S (or other protocol, FTP, etc.) information being exchanged?

    Or have you created your own site you can bounce back to to extract the information from logs etc.?

  • Nov 17th, 2016 @ 4:15pm


    Not only is that comment misleading but it's also self serving, coming from Mike Masnick. First, Techdirt directly benefits financially.

    You really need to pickup your level of reading comprehension from kindergarten to at least high-school level.

    For example, if you include the sentence directly following what you quoted:

    That's why we have this ongoing partnership with Private Internet Access, the popular and excellent VPN service that helps stop companies from tracking you so carefully. And that's why we'll do things like make money off of affiliate fees from helping protect your privacy, instead of selling out any good will and trust by treating you "as the product" (as the slightly ridiculous saying goes).

    From that second sentence, they are acknowledging that they take a kickback ('affiliate fees') from referring purchasers to PIA.

    And further down in the article, again an acknowledgement that they make money from PIA and their own Insider Shop:

    And, again, picking up your Private Internet Access VPN from us is one great way to support Techdirt (and help you protect your privacy). You can also buy stuff from our Deals Store or support us directly via our Insider Shop.

  • Nov 17th, 2016 @ 3:41pm


    Impeached? I'd think a visit to Gitmo would be on the cards.

  • Nov 13th, 2016 @ 7:32am

    (untitled comment)

    is the Screen Actors Guild's heavy lobbying

    I thought it was Film Actors Guild (at least according to Team America).


  • Nov 13th, 2016 @ 6:37am

    Re: Re:

    This is true...well except for the remote phone exploits that allow phones (both mobile and landline) mic's to be surreptitiously turned on to turn the phone into a bug even tho it's not being actively used.

    Or maybe you've got Siri or hello google on, which means the mic's has to always be on (to detect the spoken keywords) therefore available for eavesdropping.

    Or smart TV's or games consoles with embedded cameras and mic's also potentially always on by design listening in (or watching) any conversation in their pickup range. Tablets and laptops the same.

    Or hell, maybe they'll start putting mic's into smart light bulbs or toasters so you can voice control even more.

    Unless you consciously take steps to ensure there are no mic's in the vicinity, it can be pretty hard to actually have a completely private conversation these days even if you aren't specifically under surveillance (in which case there are bugs and shotgun/laser mic's to also content with...tho the latter are pretty easy to defeat if you are paranoid to be concerned about them).

  • Nov 10th, 2016 @ 9:07pm

    Re: Re:

    OMG my spelling sucks and no way to edit it...

  • Nov 10th, 2016 @ 9:05pm


    Considering that the most intrusive mass surveillance is done under direct personal presedential authorisation, e.g. EO 12333 amongst others, then there are no impediements, such as the legislature, or committees, or the cabinet, in the way at all. It has mostly been authorised via direct personal presedential decree, therefore can be removed by the presedent personally withdrawing that decree (Executive Order).

  • Nov 9th, 2016 @ 4:02pm

    Re: Re:

    The first "Dingo" President eh?

    So he does eat babies?

More comments from Eldakka >>