remember what old Frank Roosevelt told us: "Anytime the government does anything you can bet it was carefully planned".
what changes will result from the Snowden leak? it's a puzzle: spooks always make every effort to be sure their accomplishments are not known. if Snowden was allowed to leak then that means what he has leaked -- was generally known to intelligence organizations around the world and all the uproar is is just part of the show.
we have 2 federal judges conflicting on Section 215 -- setting the stage for a SCOTUS decision
will NSA intelligence become admissible in court? no parallel detective work required to acquire evidence by legal means ? the "writ of assistance" noted in the 30c3 keynote?
i looked up "what is patentable",-- the wickedpedia essay states that the idea may not be abstract and must be non-obvious.
to me, for example, scanning a page to .pdf and then sending the .pdf via e/mail is an obvious use of 2 tools . how long did it take people to figure out they could print a page and then fax it ?
slide to unlock? how long have there been slide locks on barn doors? hmmmmm . any simple migration of an existing process to a computer program -- to me -- is "obvious". back in the Days of the Mainframe that's how we came up with all our COBOL programs .
oth, the math used in PGP to construct the public/private keys, I would say, is non-obvious. I read the description of how that is done and to me it was non-obvious.
in this, as in so many laws though, congress writes the laws, then we have a court case to establish precedent and then court tells us how they will enforce it. ( stare decisis.)
NSA probably rates an F for their stated objective. but what is their actual objective? I suspect it is tracking dissidents, and other collateral benefits such as tax-evaders, dead beat parents, or others who can be grabbed and squeezed for cash
there is no point in discussing encryption until the question of un-authorized programming is settled
i don't think there is any point in discussing un-authorized programming unless we are using open-source software ( I'm using Linux/Mint )
i tend to agree with Snowden -- nothing wrong with encryption that we have -- e.g. GnuPG -- implemented properly
he means on a secure host, and don't use "123456" for you password
the existing x.509 and CA structure is a mess: you are trusting everything your browser sends you -- and everything that mess has signed for
the First Thing a computer user should do is generate his key pair . once that's done he is in a position to vet and sign certificates . he won't need to do many of these -- just those that need to be secured -- e.g. NewEgg, Amazon, Credit Union, TurboTax, -- anyplace money is involved. you don't need https on a blog site. but you DO need GnuPG on your e/mail
I think this comes under the heading "Predatory Litigation".
"Predatory Litigation" would include the article on a_cademic a_dvantage which appears also in today's clips
The crap about a_cademic a_dvantage I am guessing was derived from using a "Reputation Defender" type scan and then processed using a robot.
If this sort of process is allowed to continue the New Rules to the Net will become: "Post a comment: Get Sued". It will effectively suppress free speech on the Net. There will be cheering from certain areas