Re: The US government has betrayed the Internet. We need to take it back
----- Forwarded message from "John S. Quarterman" <jsqnanog@quarterman.com> ----- Date: Fri, 06 Sep 2013 06:47:26 -0400 From: "John S. Quarterman" <jsqnanog@quarterman.com> To: sam@circlenet.us, "John S. Quarterman" <jsq@quarterman.com>, nanog@nanog.org Subject: Re: The US government has betrayed the Internet. We need to take it back
On 2013-09-06 05:57, Roland Dobbins wrote:
There are no purely technical solutions to social ills. Schneier of all people should know this.
Schneier does know this, and explicitly said this. -jsq http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-int... Three, we can influence governance. I have resisted saying this up to now, and I am saddened to say it, but the US has proved to be an unethical steward of the internet. The UK is no better. The NSA's actions are legitimizing the internet abuses by China, Russia, Iran and others. We need to figure out new means of internet governance, ones that makes it harder for powerful tech countries to monitor everything. For example, we need to demand transparency, oversight, and accountability from our governments and corporations. Unfortunately, this is going play directly into the hands of totalitarian governments that want to control their country's internet for even more extreme forms of surveillance. We need to figure out how to prevent that, too. We need to avoid the mistakes of the International Telecommunications Union, which has become a forum to legitimize bad government behavior, and create truly international governance that can't be dominated or abused by any one country. Generations from now, when people look back on these early decades of the internet, I hope they will not be disappointed in us. We can ensure that they don't only if each of us makes this a priority, and engages in the debate. We have a moral duty to do this, and we have no time to lose. Dismantling the surveillance state won't be easy. Has any country that engaged in mass surveillance of its own citizens voluntarily given up that capability? Has any mass surveillance country avoided becoming totalitarian? Whatever happens, we're going to be breaking new ground. Again, the politics of this is a bigger task than the engineering, but the engineering is critical. We need to demand that real technologists be involved in any key government decision making on these issues. We've had enough of lawyers and politicians not fully understanding technology; we need technologists at the table when we build tech policy. To the engineers, I say this: we built the internet, and some of us have helped to subvert it. Now, those of us who love liberty have to fix it. ----- End forwarded message ----- -- Eugen* Leitl <a href="http://leitl.org">leitl</a> http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 http://ativel.com http://postbiota.org AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5
An understated response to the NSA and unidentifed friends treachery: http://blog.cryptographyengineering.com/2013/09/on-nsa.html More of these expected, many. But who knows, as Green says, all could go back to swell comsec business as usual.
On 9/6/13, John Young <jya@pipeline.com> wrote:
An understated response to the NSA and unidentifed friends treachery:
http://blog.cryptographyengineering.com/2013/09/on-nsa.html
More of these expected, many. But who knows, as Green says, all could go back to swell comsec business as usual.
Linked from said blog... http://software.intel.com/en-us/blogs/2012/05/14/what-is-intelr-secure-key-t... Bull Mountain Technology ... BULLRUN. Bullshit naming coincidence or genuine cooperative wordplay? ;)
Feels like naming coincidence, particularly given that the GCHQ analogue is named similarly. From The Guardian[0]: "The NSA's codeword for its decryption program, Bullrun, is taken from a major battle of the American civil war. Its British counterpart, Edgehill, is named after the first major engagement of the English civil war, more than 200 years earlier." [0]: http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-secur... On Fri, Sep 6, 2013 at 2:11 PM, grarpamp <grarpamp@gmail.com> wrote:
On 9/6/13, John Young <jya@pipeline.com> wrote:
An understated response to the NSA and unidentifed friends treachery:
http://blog.cryptographyengineering.com/2013/09/on-nsa.html
More of these expected, many. But who knows, as Green says, all could go back to swell comsec business as usual.
Linked from said blog... http://software.intel.com/en-us/blogs/2012/05/14/what-is-intelr-secure-key-t...
Bull Mountain Technology ... BULLRUN.
Bullshit naming coincidence or genuine cooperative wordplay? ;) _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography
-- @kylemaxwell
participants (4)
-
Eugen Leitl
-
grarpamp
-
John Young
-
Kyle Maxwell