ickwabe | 8 years ago | on: Three quarters of Android apps track users with third party tools
ickwabe's comments
ickwabe | 8 years ago | on: Hidden Cameras in AirBnBs
And other restrictions apply in other states: https://www.rcfp.org/first-amendment-handbook/introduction-r...
ickwabe | 8 years ago | on: Skype Vanishes from App Stores in China, Including Apple’s
ickwabe | 8 years ago | on: Skype Vanishes from App Stores in China, Including Apple’s
ickwabe | 8 years ago | on: Skype Vanishes from App Stores in China, Including Apple’s
ickwabe | 8 years ago | on: Skype Vanishes from App Stores in China, Including Apple’s
I expect Apple and any other company to have to comply with local laws in various countries. It's unavoidable. What else could they do? Refuse and loose access to that population?
But right now, as regards device encryption and back doors, there is a sort of mutually assured destruction. A MAD that the US law enforcement (e.g. FBI et al) are constantly trying to undermine. Right now Apple claims the iPhone is designed such that they cannot unencrypt it. The FBI wants to force them to create a method.
Regardless of the technique used that then will make every similar device world wide subject to the whims of local law as regards allow that country access.
What would stop any country from then demanding blanket access to devices? But at the moment this doesn't seem happen because there's an unspoken detente among adversarial countries to not demand such back-doors.
This situation reminds me of that. Since it is possible for Apple and others to block things on their app stores, countries demand it.
It's a cautionary tale of why it's important for companies to design certain things from the bottom up to prevent bad behavior.
ickwabe | 8 years ago | on: More Than 100 Universities and Colleges Included in Offshore Leaks Database
https://www.nytimes.com/2017/11/08/world/universities-offsho...
ickwabe | 8 years ago | on: US Court Grants ISPs and Search Engine Blockade of Sci-Hub
Setting aside ego,etc. I would think result in faster real-world discoveries and applicitions for the good of all.
[1]https://www.icij.org/blog/2016/12/radical-sharing-breaking-p...
[2]International Consortium of Investigative Journalists
ickwabe | 8 years ago | on: How Fear and Outrage Are Sold for Profit
This Is Water: Some Thoughts, Delivered on a Significant Occasion, about Living a Compassionate Life
ickwabe | 8 years ago | on: Android Encryption Demystified
ickwabe | 9 years ago | on: Losing a dog can be harder than losing a relative or friend
ickwabe | 9 years ago | on: Say hello to Google Allo: a smarter messaging app
http://www.androidpolice.com/2016/08/16/google-planning-focu...
ickwabe | 9 years ago | on: FBI chief Comey: “We have never had absolute privacy”
ickwabe | 9 years ago | on: Revealed: US spy operation that manipulates social media (2011)
ickwabe | 10 years ago | on: Our 2016 Open Source Donations
ickwabe | 10 years ago | on: Security of critical phone database called into question
This may seem a small thing and may be somewhat conceptually similar to DNS. But in reality it is an entire ecosystem of it's own with complexities that are not readily apparent. The incumbent (Neustar) has no obligation to share it's IP with Telcordia.
"The database is significant because it tracks nearly every phone number in North America, making it a key tool for law enforcement agencies seeking to monitor criminal or espionage targets."
This statement is potentially very misleading. The NPAC does not "live" route telephone calls. The NPAC is the database of ported phone number and various characteristics about them. The database is replicated to LSMS databases at the service providers. When you make a call it does not route through the NPAC. It routes through the service providers, period.
While the NPAC could be helpful to law enforcement for knowing which SP manages a particular number and various other characteristics about that number, it would not be helpful as some sort of one-stop shop for wire tapping.
From the NPAC site: "LSMS (Local Service Management System): The system owned by a service provider and which receives data broadcast from the NPAC/SMS. The LSMS provisions the service provider's downstream systems, such as its LNP call routing database. The LSMS is a mechanized system used (primarily) to receive data broadcasts from the NPAC/SMS."
ickwabe | 10 years ago | on: Colorful Image Colorization
ickwabe | 10 years ago | on: Colorful Image Colorization
I shudder when I see someone/something colorize the works of masters of black-and-white like Ansel Adams or Henri Cartier-Bresson. Just a horrible mangling of their work.
Adams for example could have used color, and did take many hundreds of color photos[1]. But in his work for display he deliberately and consciously chose black-and-white and put in much effort in the lab to get the final images just they way he wanted them.
So while I truly appreciate the technological achievement here, I still cringe at the what I see as distorting the artists' work.
[1]http://www.smithsonianmag.com/arts-culture/ansel-adams-in-co...
ickwabe | 10 years ago | on: Microsoft demos 'holoportation' 3D presence tech with HoloLens
ickwabe | 10 years ago | on: The Next Front in the New Crypto Wars: WhatsApp
http://www.reuters.com/article/us-apple-encryption-obama-idU...
http://thehill.com/policy/cybersecurity/262658-feinstein-vow...
https://github.com/exodus-privacy/exodus
https://github.com/YalePrivacyLab/tracker-profiles