cover photo

Seth Martin

Seth Martin
  last edited: Sun, 24 Sep 2017 13:19:32 -0500  
#Freedom and #Liberty require #Decentralization

Practically everyone knows a geek. Ask your geeks to share their websites by running decentralization software such as Hubzilla, thereby making centralized social networks irrelevant.

Senatorial Candidate Austin Petersen Receives Controversial Facebook Ban 


Former Libertarian Party Presidential candidate Austin Petersen received a 30-day ban on his personal facebook account yesterday for an unspecified TOS violation. Only one post was removed and it contained a video.  The video breaks down his take on Senator Clair McCaskill‘s anti-gun record, specifically her voting for the Assault Weapon Ban. Petersen is concurrently running a promotion which involves giving away an AR-15 – a weapon which would have been illegal under the ban.

#Politics #Facebook #Social Networking @LibertyPod+
Seth Martin
This bill would make several pieces of software that I use, Illegal. Even the software running the website you're viewing right now would be illegal.

'Leaked' Burr-Feinstein Encryption Bill Is a Threat to American Privacy


Every service, person, human rights worker, protester, reporter, company—the list goes on—will be easier to spy on.

#Privacy #Surveillance #Encryption #Freedom #Liberty @LibertyPod+ @Gadget Guru+
Mike Macgirvin
I don't know that it has been physically introduced, by Feinstein is pretty tenacious. She'll keep refinng it and wait for some high profile event to act as a trigger/catalyst and then ram it through in the aftermath when the opposition is on the defensive. I suspect she also leaks her own bills. That way all the furor erupts way ahead of schedule and by the time the bill is actually introduced, nobody can mobilise opposition because by then it's old news.
Marshall Sutherland
Here is my answer, I guess... They are still beating the drum for this abomination.

The Lawmakers Who Control Your Digital Future Are Clueless About Technology

It is becoming increasingly clear that Senators Dianne Feinstein and Richard Burr, co-chairs of the Senate Intelligence Committee, don’t have the slightest clue about how encryption works. Good thing they’re currently pushing disastrous legislation that would force tech companies to decrypt things for law enforcement!

Today Feinstein and Burr co-authored an op-ed in the Wall Street Journal entitled “Encryption Without Tears,” and wow, it is bad. They have yet again demonstrated a failure to grasp even the most basic principles of technology.
Seth Martin
  last edited: Wed, 15 Oct 2014 22:58:23 -0500  
Free Speech Gets Tricky When ISIS Shows Up


Social networks struggle with open access as terrorists’ account proliferate

It looks like Adam Rawnsley didn't notice the #IS accounts on #diaspora before he finished the article.

#Friendica #RedMatrix #FreeSpeech #Freedom #Liberty #Social Networking #FOSS #FLOSS #Twitter #Social Media #ISIS #Terrorism @LibertyPod+
Seth Martin
  last edited: Sun, 17 Aug 2014 06:34:38 -0500  
It looks like they have found their home in diaspora land.

Going by the new accounts sharing with diaspora* HQ, the majority of people currently signing up to diaspora* are Islamic State jihadists (15-20 yesterday, about 40-50 overnight).
Thomas Willingham
I always thought it'd be gay porn that broke Diaspora.

I posted one SMBC comic once about gay engineers, and overnight, my stream became 99% gay porn posted by random strangers who followed me because of a comic.

Giving head to beheading in three short years.  Well done, Diaspora.
Thomas Willingham
This cartoon:


Seth Martin
  last edited: Wed, 15 Oct 2014 23:00:37 -0500  
Well, that was unpleasant. I had to remove a channel and account from my #RedMatrix website at

The channel name was "Free Speech" which made it even more unpleasant. I sent an e-mail to the address the account holder entered during signup:
I wish to provide a free speech platform for everyone but cannot. I cannot host Islamic State channels because it jeopardizes my safety and the safety of others.

You made the right decision by choosing the Red Matrix for your communications but you need to host it yourself. Instructions are here:

I must now remove your channel(s) from my servers to protect our safety.

Now I look back on that message and wonder if the message is jeopardizing our safety by providing a suggestion.

#Liberty #Freedom #RedMatrix #Free Speech @LibertyPod+
Mike Macgirvin
We provide a network that is relatively free of censorship - providing you follow the rules of the house.

If you're hosting the site - it's your house, you get to set the rules. You're responsible for the content on it, and in most countries you can go to jail if the content is of an illegal nature - no matter who posted it. Therefore as the site owner you must have the right to remove anybody or any content any of your site members post.

The network itself does not have any rules about who can be a site owner and what content is allowed or not - and cannot enforce any rules on anybody. The site owner alone gets to set the rules, and they will usually do so based on the laws in effect in their jurisdiction.

So if you want freedom from censorship, you need to do two things...

1. Host the site yourself or find a site owner who is comfortable with your views
2. Ensure the site is located in a country whose laws are compatible with your views.
Mike Macgirvin
[Between you and me, you can also make your content private. The house usually won't try to remove questionable content that it can't see.]
Thomas Willingham
Well, that was unpleasant. I had to remove a channel and account from my #RedMatrix website at

The channel name was "Free Speech" which made it even more unpleasant

Like I said in the other thread, there's an awful lot to consider here, and a painful decision that'll leave you wondering whether you did the right thing either way - but ultimately, what Mike said.

The network is free.  Individual hubs were never even supposed to be free - in either sense of the word - unless they're your own.
Seth Martin
The Declaration of Independence
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness. — That to secure these rights, Governments are instituted among Men, deriving their just powers from the consent of the governed, — That whenever any Form of Government becomes destructive of these ends, it is the Right of the People to alter or to abolish it, and to institute new Government, laying its foundation on such principles and organizing its powers in such form, as to them shall seem most likely to effect their Safety and Happiness.

#Independence Day #Declaration of Independence #Liberty #Rights #Government @LibertyPod+
Seth Martin
  last edited: Mon, 05 Oct 2015 14:27:11 -0500  
Marshall SutherlandMarshall Sutherland wrote the following post Sat, 03 May 2014 15:49:43 -0500
The Strangest Interview Yet With the Outgoing Head of the NSA

On network television, broadcasters tend to be very deferential when interviewing U.S. officials. This is especially true if they're wearing military dress.  In contrast, comedians who appear on fake news programs affect an adversarial, intentionally disrespectful persona for laughs. And sometimes, as in John Oliver's interview with outgoing NSA head Keith Alexander, the result is a U.S. official getting called on his slipperiness in a way that would never happen on more "serious" programs.

General Keith Alexander Extended Interview: Last Week Tonight With John Oliver (HBO)
by LastWeekTonight on YouTube

#NSA #Surveillance #Privacy #Snowden #Liberty #Spying #Freedom #Privacy #Comedy #Humor #Humour
Seth Martin
Flashing Headlights To Warn of Speed Traps Permanently Protected in Missouri Town


It's the happy conclusion to a free speech battle with potentially broad application: A federal judge says flashing your headlights to warn oncoming drivers of speed traps is protected by the First Amendment. Under a permanent injunction issued in the case, the town of Ellisville, Missouri, will have to stop hassling drivers considerate enough to give fellow motorists a friendly heads-up.

The American Civil Liberties Union of Missouri, which represented Michael Elli, describes the facts of the dispute:

While driving along Kiefer Creek Road [in November 2012], Michael Elli, flashed his headlights to warn oncoming traffic to proceed with caution. He was pulled over by a City of Ellisville police officer and issued a citation for flashing lights to warn of radar ahead. When Elli appeared in municipal court, he was told the standard punishment is a $1,000 fine. The charge against Elli was eventually dismissed.

A pro-speech outcome seemed certain early on. When issuing a preliminary injunction against Ellisville, U.S. District Court Judge Henry E. Autrey pointed out in his decision that Ellisville's ordinance forbidding any sort of flashing of lights by vehicles other than buses directly contradicts Missouri Department of Revenue advice that lightsshould be flashed to signal emergencies.

Autrey also noted that using headlights to communicate makes the act speech, which is protected on First Amendment grounds. He also dismissed officials' promises that they would behave better in the future if only they were allowed to keep the ordinance on the books.

With the deck stacked against, city officials folded. They entered a joint agreement with Elli to make the preliminary injunction permanent. Autrey obliged them[pdf]:

It is now the order and judgment of this Court that the preliminary injunction entered on February 23, 2014, be made permanent. Defendant City of Ellisville and its police officers are permanently enjoined from detaining, seizing, citing, or prosecuting any individual within the City of Ellisville for communicating by flashing his or her automobile headlamps.

Chalk one up for free speech in Missouri.

Flashing headlights to warn other motorists of speed traps remains subject to a hodgepodge of laws across the United States—protected in some places, forbidden in others, and punished by cops under creative interpretations of local rules in many jurisdictions.

It's also good manners.

#Free Speech #Constitution #Rights #Freedom #Liberty @LibertyPod
Mike Macgirvin
Around here people always flash their lights whenever something "out of the ordinary" or "unexpected" is on the road. There aren't any cops out here in the bush so seeing a police car anywhere doing anything is out of the ordinary.

Seth Martin
  last edited: Mon, 31 Mar 2014 13:15:51 -0500  
The U.S. National Security Agency managed to have security firm RSA adopt not just one, but two security tools, further facilitating NSA eavesdropping on Internet communications. The newly discovered software is dubbed 'Extended Random', and is intended to facilitate the use of the already known 'Dual Elliptic Curve' encryption software's back door. Researchers from several U.S. universities discovered Extended Random and assert it could help crack Dual Elliptic Curve encrypted communications 'tens of thousands of times faster'.

Exclusive: NSA infiltrated RSA security more deeply than thought - study


SAN FRANCISCO (Reuters) - Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.

#NSA #Spying #Snooping #Liberty #Infiltration #Privacy #RSA #Encryption #Security #Surveillance #Computer Security @LibertyPod
Mike Macgirvin
The general concensus was that dual elliptic curve was dead the second the first revelations came out.
Seth Martin
  last edited: Mon, 05 Oct 2015 13:07:48 -0500  
A Skyped interview by Roger Cohen with Glenn Greenwald of The Intercept, Laura Poitras, filmmaker and Barton Gellman of The Washington Post.

Recorded: 03-21-2014

Sources and Secrets: The Snowden Revelations
by cunytv75 on YouTube
#Privacy #Rights #Journalism #Liberty #Greenwald #Snowden #Poitras #National Security #NSA #Surveillance #Freedom @LibertyPod+
Seth Martin
  last edited: Mon, 10 Feb 2014 04:16:12 -0600  
I never knew that it was illegal to sell vehicles on Sunday here in Missouri.

Push to change the Missouri Blue Law


KANSAS CITY, Mo. -- Recently there has been a push to change the law on the Sunday sales of motorcycles in Missouri. Worth Harley Davidson gets a big chunk of its business on Saturdays. Sundays, on...

#Missouri #Blue Law #Freedom #Liberty @LibertyPod

Seth Martin
  last edited: Mon, 30 Dec 2013 13:45:47 -0600  
Der Spiegel has released more NSA documents detailing the agency's hacking efforts around the globe. The so-called Tailored Access Operations (TAO) is the NSA's group of tech masterminds, deployed to insert the agency into worldwide communications. TAO uses a variety of exploits and backdoors to achieve this access, much of which is detailed in a 50-page document that Der Spiegel likens to a "mail-order catalog."

Another team (ANT -- Advanced or Access Network Technology) creates the exploits and "sells" them to the agency, providing access to communications and data that TAO can't achieve on its own.

In cases where TAO's usual hacking and data-skimming methods don't suffice, ANT workers step in with their special tools, penetrating networking equipment, monitoring mobile phones and computers and diverting or even modifying data. Such "implants," as they are referred to in NSA parlance, have played a considerable role in the intelligence agency's ability to establish a global covert network that operates alongside the Internet.

Some of the equipment available is quite inexpensive. A rigged monitor cable that allows "TAO personnel to see what is displayed on the targeted monitor," for example, is available for just $30. But an "active GSM base station" -- a tool that makes it possible to mimic a mobile phone tower and thus monitor cell phones -- costs a full $40,000. Computer bugging devices disguised as normal USB plugs, capable of sending and receiving data via radio undetected, are available in packs of 50 for over $1 million.

Between TAO and ANT, vast amounts of computer hardware have been compromised. Der Spiegel notes that ANT prefers to deploy its exploits at the BIOS level where they can remain undetected by most security and anti-virus programs. Other programs it creates hitch a ride in device firmware, including that of major American hard drive manufacturers like Western Digital, Seagate and Maxtor. (Apparently, Samsung and Huawei are similarly compromised, making them the only non-American companies listed in the documents.)

ANT also targets communications by compromising network equipment.

Other ANT programs target Internet routers meant for professional use or hardware firewalls intended to protect company networks from online attacks. Many digital attack weapons are "remotely installable" -- in other words, over the Internet. Others require a direct attack on an end-user device -- an "interdiction," as it is known in NSA jargon -- in order to install malware or bugging equipment.

It's unclear whether ANT provides exploits to other agencies, but the fact that a catalog exists suggests ANT isn't solely supplying the NSA. (If it is, one wonders why prices are listed. If it's internal development and deployment only, cost wouldn't be an issue.)

Security researcher Jacob Appelbaum, one of the contributors to the Der Spiegel article, addressed the Chaos Communication Congress over the weekend, delivering more details on ANT's exploits, including exploits affecting iOS devices and any phone using GSM connections. Most surprising perhaps was this exploit-in-a-box device that can deliver its compromising payload from up to eight miles away.


None of this should be taken to imply the TAO isn't perfectly capable of creating its own high-level exploits and backdoors. If anything, TAO is the more physical and aggressive counterpart to ANT, executing raids to achieve physical access to devices and networks (often with the assistance of the FBI -- or at least its vehicles).

An internal description of TAO's responsibilities makes clear that aggressive attacks are an explicit part of the unit's tasks. In other words, the NSA's hackers have been given a government mandate for their work. During the middle part of the last decade, the special unit succeeded in gaining access to 258 targets in 89 countries -- nearly everywhere in the world. In 2010, it conducted 279 operations worldwide…

To conduct those types of operations, the NSA works together with other intelligence agencies such as the CIA and FBI, which in turn maintain informants on location who are available to help with sensitive missions. This enables TAO to attack even isolated networks that aren't connected to the Internet. If necessary, the FBI can even make an agency-owned jet available to ferry the high-tech plumbers to their target. This gets them to their destination at the right time and can help them to disappear again undetected after as little as a half hour's work.

Even more disturbing, the NSA's TAO operation waylays purchased hardware en route to customers in order to install exploits.

If a target person, agency or company orders a new computer or related accessories, for example, TAO can divert the shipping delivery to its own secret workshops. The NSA calls this method interdiction. At these so-called "load stations," agents carefully open the package in order to load malware onto the electronics, or even install hardware components that can provide backdoor access for the intelligence agencies. All subsequent steps can then be conducted from the comfort of a remote computer.

The NSA's programs continue to make the world less safefor computer users under the guise of "security." Exploits go undiscovered and unpatched. Handcrafted exploits and backdoors are deployed without affected companies' knowledge. TAO has manipulated one of the most infamous Windows error messages in order to gain passive access to computers around the world.

The automated crash reports are a "neat way" to gain "passive access" to a machine, the presentation continues. [via XKEYSCORE, most likely.] Passive access means that, initially, only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer.

While not as directly useful as TAO and ANT's other tools, it still deployed frequently enough that the dialog box itself has become an agency inside joke.

[The altered text reads: "This information may be intercepted by a foreign SIGINT system to gather detailed information and better exploit your machine."]

These new revelations will only give foreign customers even more reasons to distrust American hardware. Der Spiegel's article notes that Samsung and Huawei hardware may be similarly compromised, but by and large, most of the "damage" seems to be domestic. Estimates have suggested American companies will potentially lose $150+ billion as a result of the NSA's actions. This should push that number even higher.

The question that needs to be asked is if this damage is worth it. The agency likely believes it is -- or at least believes it shouldn't be held responsible for tanking the overseas prospects of American tech companies. According to its defenders, the real problem here is the leaks, not the exploitation of every piece of hardware and software it can get its hands on. After all, if Snowden hadn't taken those documents, this would still be a secret and foreign companies will still be purchasing compromised goods from US companies.

The NSA has never seriously considered the consequences of its activities being exposed. This should have been factored in when considering the "costs" of programs like these. Nothing operates in a vacuum, not even the most secretive of agencies. Frankly, the level of exploitation exposed here verges on inconceivable. Any crying agency spokespersons have done about methods being exposed now looks like nothing more than diversionary noises delivered with poker faces. The agency has "root access." The rest is just skimming the surface.


#TAO #ANT #NSA #Surveillance #Snowden #Privacy #Spying #Spy #Snooping #Exploits #Backdoors #Freedom #Liberty @LibertyPod
Marshall Sutherland
It's pretty sad that I feel safer using a router from a former Soviet-block country then I do using one from an American company.

Seth Martin
Exclusive: Secret contract tied NSA and security industry pioneer


SAN FRANCISCO (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

#RSA #Bsafe #Backdoor #Encryption #NSA #Spying #Snooping #Snowden #Computer Security #Privacy #Freedom #Liberty #Security @LibertyPod

Seth Martin
We've seen it argued that privacy is a bad thing. People like former DHS official Stewart Baker have argued that the privacy-protecting efforts of civil liberties activists are the reason we're forced to be fondled and de-shod at TSA checkpoints. Not only that, he's tried to blame the 9/11 attacks on "rise of civil libertarianism." Unbelievably, we've also had a politician recently claim that your privacy isn't violated if you don't notice the violation.

We've also seen attacks on anonymity by (anonymous) police officers and a whole slew of pundits and politicians who believe the only thing online anonymity does is provide a shield for trolls, bullies and pirates to hide behind. Efforts have been made to outlaw online anonymity, but fortunately, very few laws have been passed.

Now, try wrapping your mind around this argument being made by Art Coviello, executive chairman of RSA Security and the head of EMC's security division. According to him, anonymity and privacy are at odds with each other.

A dogmatic allegiance to anonymity is threatening privacy, according to Art Coviello, executive chairman of RSA.

Coviello cast anonymity as the "enemy of privacy" because it gives "free reign to our networks to adversaries" with "no risk of discovery or prosecution."

On one hand, anonymity is slowing down the pursuit of online criminals. On the other hand, companies are increasingly wary of subjecting their employees to intrusive security software.

Customers are caught in a Catch-22. They're afraid to deploy technology for fear of violating workers' privacy" even though security intelligence tools are ultimately the best way to protect personal information, Coviello argued.

How Coviello arrives at the conclusion that anonymity is damaging privacy isn't exactly clear. It may be the enemy to security (or at least, unhelpful to retributive actions), but the online anonymity shielding crooks doesn't threaten users' privacy, at least not directly. Indirectly it could, but it wouldn't be anonymity's "fault." If Coviello wants attackers to be stripped of anonymity, there's little doubt he'd like to see clients' employees stripped of their privacy. Both would make his companies' jobs easier. Attackers would be easily identified and clients would received (arguably) better protection (thanks to more, non-anonymized data gathering). Win-win for security. Not so much for those who cherish privacy and anonymity.

This isn't exactly new ground for Coviello. He did some complaining about privacy at last year's RSA conference as well.

RSA executive chairman Art Coviello has criticised privacy advocates for basing their arguments on “dangerous reasoning”, comments that have already earned him a tongue lashing from Big Brother Watch and the Open Rights Group.

Coviello, whilst noting the need for privacy, lambasted privacy groups’ “knee jerk” reactions to public and private sector attempts to improve people’s security, pointing to the “insanity” of the situation, in a keynote to open the RSA 2012 conference in London this morning.
In Coviello’s view, privacy advocates are over-reacting to measures designed to protect online identities, preferring to live in a world of danger: “Because privacy advocates don’t realise that safeguards can be implemented, they think we must expect reasonable danger to protect our freedoms,” Coviello said.

“But this is based on dangerous reasoning, a knee jerk reaction, without understanding the severity and scope of the problem.

“Where is it written that cyber criminals can steal our identities but any industry action to protect us invites cries of Big Brother.”

Not for nothing has someone noted that RSA is only a letter away from the United States' most notorious intelligence agency.

Coviello's arguments here aren't that much different than the government's opinions on the "liberty vs. security" balance. And like other defenders of intrusive programs, Coviello refers to the statements of critics as an "over-reaction." But is it? He bristles at being compared to Big Brother but his thought processes roughly align with the government's foremost proponents of intrusive programs. According to both, people just don't understand how bad things actually are, and in our unenlightened state, we're making the wrong choice between security and liberty.

Additionally, the "knee jerk reaction" he sees in privacy activists is, in reality, no different than the knee jerk reactions he fails to see in security and intelligence entities. While privacy activists are focused on retaining what's remaining and make small pushes for more, security/intelligence agencies leverage every tragedy or attack to expand their scope and dial back privacy protections.

But where his argument against privacy (and anonymity) ultimately falls apart is in his belief that collecting and storing large amounts of private data is the best solution for all involved.

To “suggest the only way to protect against cyber crime is to sacrifice privacy and civil liberties is absurd,” Nick Pickles, director of privacy campaign group Big Brother Watch, told TechWeekEurope. “It is a simple fact that if data has not been collected, it cannot be stolen, lost or misused. The best safeguard for consumers and businesses is for data not to be collected unless it is absolutely essential, and then deleted as soon as it is no longer required.”

As for his complaints about anonymity? It's pretty much all or nothing. You can't whip up statutes and laws that allow anonymity and their privacy protections unless you're a criminal. Either you take the good with the bad or you eliminate it for everybody. No one's going to agree with that last one, so security groups and companies will just have to deal with the fact that their adversaries will be cloaking their identities. Cops may wish robbers wouldn't wear masks when committing crime, but that's the way it goes. You can't ban the sale of masks simply because someone holds up a bank wearing one.

I'm sure he understands this, but he's in a field where security is valued over privacy. But that's the expected mindset for someone is his position. The problem is that those with his mindset expect others to come to the same conclusion -- and when they don't, they're portrayed as part of the problem.

To be fair, Coviello at least had this to say about the jargon being deployed by government security officials and advisors.

"I absolutely hate the term 'Cyber Pearl Harbor'," he said. "I just think it's a poor metaphor to describe the state we are really in. What do I do differently once I've heard it? And I've been hearing it for 10 years now. To trigger a physically destructive event solely from the internet might not be impossible, but it is still, as of today, highly unlikely."

Coviello may not like this particular FUD, but claiming anonymity and privacy are standing in the way of security isn't that far removed from the panicky assertions of the "cyber Pearl Harbor" types.


#Anonymity #Privacy #Freedom #Liberty #RSA #Encryption #Security #Intelligence @LibertyPod
Sean Tilley
Seth Martin
OliverOliver wrote the following post Thu, 31 Oct 2013 05:38:41 -0500

Dark Mail Alliance


Privacy Innovators
Silent Circle and Lavabit are developing a new way to do email with end-to-end encryption. We welcome like-minded organizations to join our alliance.

Our Mission
To bring the world our unique end-to-end encrypted protocol and architecture that is the 'next-generation' of private and secure email. As founding partners of The Dark Mail Alliance, both Silent Circle and Lavabit will work to bring other members into the alliance, assist them in implementing the new protocol and jointly work to proliferate the worlds first end-to-end encrypted 'Email 3.0' throughout the world's email providers. Our goal is to open source the protocol and architecture and help others implement this new technology to address privacy concerns against surveillance and back door threats of any kind.

(Piwik is running in background, no OptOut?)

#Privacy #Lavabit #Silent Circle #Dark Mail Alliance #Liberty #Freedom #E-Mail #Communication #Encryption @LibertyPod
Mike Macgirvin
It's only ISPs who draw a distinction between clients and servers. But realistically if you want to provide web resources, you probably want them served from the "wild west" side of your home router and not the side that's locked down. You also probably want to keep this machine turned on so your photo albums are available to friends in Australia that are awake when you're sleeping (if you have any of these). SIP and XMPP are solving different problems. We want to share web resources. That's what we're providing. Photos, files, events, *and* conversations. If it was just text comments about what we had for dinner with one or two people that are always online when we are, one might make different protocol decisions.
Seth Martin
  last edited: Tue, 05 Nov 2013 13:52:08 -0600  
Dark Mail Initiative is on Kickstarter now.

The goal is to cleanup and release the source code that was used to power Lavabit as a f/oss project with support for dark mail added.
  last edited: Wed, 06 Nov 2013 02:03:45 -0600  
Moxie Marlinspike >> Blog >> A Critique Of Lavabit

In August of this year, Ladar Levison shut down his email service, Lavabit, in an attempt to avoid complying with a US government request for his users’ emails. To defy the US government’s gag order and shut down his service took great courage, and I believe that Ladar deserves our support in his legal defense of that decision. There is now an ...
Seth Martin
Ladar Levison's legal fight against the federal government is still ongoing.

In September, Campaign for Liberty was proud to feature Ladar as a speaker at the 2013 Liberty Political Action Conference.

So please take a moment to watch this EXCLUSIVE video presentation of Ladar Levison at LPAC 2013 talking about the need for trust when using technology and some of the challenges posed by out-of-control government spying.

Ladar Levison Statement of Support!


Ladar Levison: Statement of Support...

#Ladar Levison #Lavabit #Government #Privacy #FISA #NSA #Surveillance #Spying #Spy #Constitution #Law #Freedom #LPAC #Campaign for Liberty #Liberty @LibertyPod @Laissez-Faire Capitalism

Seth Martin
Americans Have Lost VIRTUALLY ALL of Our Constitutional Rights | Zero Hedge


This post explains the liberties guaranteed in the Bill of Rights – the first 10 amendments to the United States Constitution – and provides a scorecard on the extent of the loss of each right.  (This is an updated version of an essay we wrote in February.  Unfortunately, a lot of information has come out since then.)

#United States #Constitution #Rights #Freedom #Liberty #Tyranny #Declaration of Independence #Free Speech #Whistleblower #Activism #Protest #Gun Control #Gun Rights #Wealth Redistribution #Fraud #Cronyism #Corporatism #Federal Reserve #Power #USA #NSA #Surveillance #Spying #Spy #Search #Seizure #National Security #Terrorism #Unusual Punishment #Indefinite Detention #Jury Trial #Due Process #Protection #Law @LibertyPod @Laissez-Faire Capitalism
  last edited: Thu, 17 Oct 2013 10:25:20 -0500  
This article does a good job outlining the dangers caused by the modern State, aligned with Big Business.

I especially dug the list of abuses related to the First Amendment.

You know, I suppose this relates to that original debate about the U.S. political system, between Jefferson on one side, and people like Madison and the big plantation owners (Big Business of the time).

To me, Jefferson had the better instincts, encouraging the country to be a society of small property owners, who had equal political rights.  Of course, his ideas had problems too, but I think his approach, had it won, would have caused a different trajectory in U.S. politics (at least from the point of view of classical liberalism).

Seth Martin
The Washington Post reports that the EFF has filed suit against the NSA in Federal Court in San Francisco, on behalf of multiple groups (court filing). Those groups include, 'Rights activists, church leaders and drug and gun rights advocates.' EFF Legal Director Cindy Cohn said, 'The First Amendment protects the freedom to associate and express political views as a group, but the NSA's mass, untargeted collection of Americans' phone records violates that right by giving the government a dramatically detailed picture into our associational ties. Who we call, how often we call them, and how long we speak shows the government what groups we belong to or associate with, which political issues concern us, and our religious affiliation. Exposing this information – especially in a massive, untargeted way over a long period of time – violates the Constitution and the basic First Amendment tests that have been in place for over 50 years.' Apparently, not everyone out there is believing the 'If you have nothing to hide' excuses being offered up from various government quarters.

Unitarian Church, Gun Groups Join EFF to Sue NSA Over Illegal Surveillance


San Francisco - Nineteen organizations including Unitarian church groups, gun ownership advocates, and a broad coalition of membership and political advocacy organizations filed suit against the National Security Agency (NSA) today for violating their First Amendment right of association by illegally collecting their call records. The coalition is represented by the Electronic Frontier Foundation (EFF), a group with years of experience fighting illegal government surveillance in the courts.

#EFF #NSA #FBI #FISA #Government #Spy #Suveillance #Constitution #Rights #Lawsuit #Privacy #Freedom #Liberty #Whitleblower #Snowden

Seth Martin
I have noticed lots of people claiming that it's bad to use DuckDuckGo because it's not "NSA-Proof" or affiliated with Bing. I really don't care if there is any affiliation with Bing, so long as it improves search results without compromising my privacy.
My counter argument to the 'not NSA-Proof' claims has been the same as CEO Gabriel Weinberg's in this video. What say you?

'NSA-Proof' Web Surfing?


DuckDuckGo CEO Gabriel Weinberg on the company's promise that it won't track users or their searches.

#NSA #FISA #PRISM #Upstream #Spy #Government #Intelligence #Surveillance #Law #Whistleblower #Snowden #Justice #Privacy #Liberty #Freedom
Thomas Willingham
 last edited: Sat, 13 Jul 2013 17:31:45 -0500  
There's no such thing as an NSA proof search engine.  They're all centralised.  Centralisation is inherently bad for privacy.

The only potential alternative is YaCy.  

Like Friendica, and now Red, they're really impressive when you realise they're mostly one guy with a few other people who help out when they can - but like us, they too could really use some more proper devs.

(That's not to diminish the other devs, hell, I am one of the other devs - it's just a fact of life that the main developers of both are much better than the rest of us).
Seth Martin
YaCy is great! Unfortunately I still have to rely on alternative solutions since it doesn't provide the necessary results every time.
When YaCy doesn't provide what I need, I usually use DuckDuckGo, Ixquick, Startpage.
Thomas Willingham
It's indexes aren't great because it's buggy.  In particular, it's buggy with memory leaks - that's not a bug you can just put up with when you're running on a low end not many people run it, so the indexes don't improve much, because the indexes don't improve much, they don't attract new developers, so the memory leaks remain...viscous circle.

But still, it's the only search engine in the world that even tries to be decentralised.  Until something else comes along, it's the only hope.

(And it doesn't help when things like seeks come along, use Google, and pretend they offer decentralised search to take all the attention away from YaCy...)