more on Internet history on this IMS blog
more on Internet history on this IMS blog
What is Web 1.0
What is Web 2.0
What is Web 3.0
24 December 2019
“Increasingly, authoritarian countries which want to control what citizens see are looking at what Iran and China have already done.
“It means people will not have access to dialogue about what is going on in their own country, they will be kept within their own bubble.”
a “sovereign Runet”?
In Iran, the National Information Network allows access to web services while policing all content on the network and limiting external information. It is run by the state-owned Telecommunication Company of Iran.
One of the benefits of effectively turning all internet access into a government-controlled walled garden, is that virtual private networks (VPNs), often used to circumvent blocks, would not work.
Another example of this is the so-called Great Firewall of China. It blocks access to many foreign internet services, which in turn has helped several domestic tech giants establish themselves.
Russia already tech champions of its own, such as Yandex and Mail.Ru, but other local firms might also benefit.
The country plans to create its own Wikipedia and politicians have passed a bill that bans the sale of smartphones that do not have Russian software pre-installed.
February 11, 20194:50 PM ET SASHA INGBER
Russia is considering a plan to temporarily disconnect from the Internet as a way to gauge how the country’s cyberdefenses would fare in the face of foreign aggression, according to Russian media.
It was introduced after the White House published its 2018 National Security Strategy, which attributed cyberattacks on the United States to Russia, China, Iran and North Korea.
Russia’s Communications Ministry also simulated a switching-off exercise of global Internet services in 2014, according to Russian outlet RT.
Russia’s State Duma will meet Tuesday to consider the bill, according to RIA Novosti.
Roskomnadzor has also exerted pressure on Google to remove certain sites on Russian searches.
Director of National Intelligence Dan Coats told Congress last month that Russia, as well as other foreign actors, will increasingly use cyber operations to “threaten both minds and machines in an expanding number of ways—to steal information, to influence our citizens, or to disrupt critical infrastructure.”
My note: In the past, the US actions prompted other countries to consider the same:
Germanty – http://blog.stcloudstate.edu/ims/2014/07/01/privacy-and-surveillance-obama-advisor-john-podesta-every-country-has-a-history-of-going-over-the-line/
more on cybersecurity in this IMS blog
more on surveillance in this IMS blog
Leo Berane, native of Solon, Iowa, passed away Oct. 10 at the age of 10.
The same year that Neil Armstrong first walked on the moon and the Beatles gave their last live performance, the ARPANET was born.
“I never dreamed the internet would come into such widespread use, because the first users of the Arpanet were large mainframe computer owners,” said Beranek in the New York Times interview.
more on Internet history in this IMS blog:
Antiquated phone networks and corporate monopolies do not produce fast Internet.
By Rick Paulas
AT&T, Comcast, Verizon, and Time Warner have a “natural monopoly” since they’ve simply been at it the longest. While the Telecommunications Act of 1996 attempted to incentivize competition to upset these established businesses, it didn’t take into account the near impossibility of doing so. As Howard Zinn wrote in A People’s History of the United States, the Telecommunications Act of 1996 simply “enabled the handful of corporations dominating the airwaves to expand their power further.”
Chattanooga has somewhat famously installed its own. Santa Monica also has its own fiber network. The reason these communities have been successful is because they don’t look at these networks as a luxury, but as a mode of self sustainability.
The 19th century’s ghost towns exist because the gold ran out. The 21st century’s ghost towns might materialize because the Internet never showed up.
more on Internet access in this IMS blog
Volume, Velocity, Variety
Internet of Things
privacy, security, intellectual property
Instead of a no-spy deal, the US has begun a Cyber Dialogue with Germany. In a SPIEGEL interview, John Podesta, a special adviser to President Barack Obama, speaks of the balance between alliances and security and says that changes are being made to NSA espionage practices.
Pls consider the following additional resources on the topic:
Merkel calls for separate EU internet
The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)
By Stephen Spengler 06/01/17
Family Online Safety Institute recommends that parents engage in “7 Steps to Good Digital Parenting”
1. Talk with your children.
2. Educate yourself.
3. Use parental controls. Check the safety controls on all of the Android and Apple devices that your family uses. On the iPhone, you can tap SETTINGS > GENERAL> RESTRICTIONS and you can create a password that allows you enable/disable apps and phone functions. On Android devices, you can turn on Google Play Parental Controls by going into the Google Play Store settings
parental monitoring software such as NetNanny, PhoneSherriff, Norton Family Premier and Qustodio.
4. Friend and follow your children on social media. Whether it’s musical.ly, Instagram or Twitter, chances are that your children use some form of social media. If you have not already, then create an account and get on their friends list.
5. Explore, share and celebrate.
6. Be a good digital role model.
7. Set ground rules and apply sanctions. Just like chore charts or family job lists, consider using a family social media or internet safety contract. These contracts establish ground rules for when devices are to be used; what they should and should not be doing on them; and to establish sanctions based on breaches of the family contract. A simple internet search for “family internet contract” or “family technology contract” will produce a wealth of available ideas and resources to help you implement rules and sanctions revolving around your family’s technology use. A good example of a social media contract for children can be found at imom.com/printable/social-media-contract-for-kids/.
Managing Your Digital Footprint
Your digital footprint, according to dictionary.com, is “one’s unique set of digital activities, actions, and communications that leave a data trace on the internet or on a computer or other digital device and can identify the particular user or device.” Digital footprints can be either passive or active. The passive digital footprint is created without your consent and is driven by the sites and apps that you visit. The data from a passive digital footprint could reveal one’s internet history, IP address, location and is all stored in files on your device without you knowing it. An active digital footprint is more easily managed by the user. Data from an active digital footprint shows social media postings, information sharing, online purchases and activity usage.
Keep These Apps on Your Radar
Isaiah Gonzalez, 15, found hanging from his closet after an apparent suicide, as allegedly instructed by macabre online game
Nationally, the Associated Press reports that educators, law enforcement officers and parents have raised concerns about the challenge, though these two back-to-back deaths mark the first allegations in the United States about deaths directly linked to the online game. Internationally, suicides in Russia, Brazil, and half a dozen other countries have already been linked to the challenge.
more on social media in education in this IMS blog
ANYA SCHIFFRIN JANUARY 21, 2019
more on the issues of digital world and democracy in this IMS blog
The most secure and anonymous communication tools available
David Koff August 27 2018
These tools are used not only to lock down your security and anonymity on the known internet, but also to access the portions of the internet that are normally hidden — “The Dark Web.”
most of us don’t need the same high-privacy, high-security tools that confidential informants, journalists, and whistleblowers use, we should all know about these tools in case the time comes when we actually need them.
It’s also worth reminding everyone there’s no such thing as perfect digital security on the internet.
TAILS is an acronym for “The Amnesic Incognito Live System.”
TAILS is a highly-secure operating system (and a host of cool applications) designed to be booted off of a DVD or USB thumb drive. This not only makes TAILS easy to transport, but also ensures that TAILS can be booted and instantly useful from nearly any PC, Mac, or Chromebook. TAILS is built on Linux, a name you might recognize because it’s a popular, free, and open-source operating system that’s been available since 1991. TAILS, in particular, runs on a variant of Linux known as “Debian,” which became available in 1996.
Third and most importantly, when setup correctly, TAILS helps ensure that all of your communications — email, web browsing, chat, and more — are encrypted, made anonymous, and then routed in such a way that it’s extremely difficult to detect or trace them.
If you’re wondering just how powerful these tools really are, many of them are known by the NSA to be difficult or impossible to break. This includes:
TAILS even published a page of possible ways that its own security can be compromised.
Whonix (pronounced “HOOnix”) is an OS focused on anonymity, privacy, and security. Like TAILS, it is built on the open source Debian Linux OS and on TOR, the decentralized network which randomizes and segments your data transmissions.
Its unique approach to offering such well-regarded security is the creative use of two virtual machines (or VMs) running in tandem on one host computer. One of these VMs is known as the Gateway while the other is known as the Workstation.
Compared to TAILS, Whonix only provides a few free, open-source applications and those need to be set up fairly extensively. The list includes:
1 2 3 4 Next