Public Databases and Massive Aggregation of Data

This is just a really quick thought that I wanted to toss out.

I perceive a problem associated with the digitization of public records: such digitization allows business interests to gather aggregate data on large collections of people while retaining identifiable characteristics. This allows for a phenomenal sorting potential. At the same time, we might ask, “is there anything we can, or really want to, do about this?”

Paradigm Shift

I hear this a lot – ‘Chris, you have to understand that things are different now. The paradigm is shifting towards transparency, and there’s nothing wrong with that, and you’re being a pain in the ass suggesting that there is anything wrong with transparency. Do you have something to hide, or something like that?’ This particular line bothers the hell out of me, because I shouldn’t have to expose myself without giving my consent, especially when I previously enjoyed a greater degree of privacy as a consequence of obscurity and/or the costs involved with copying, sorting, and analyzing analogue records. I fail to see why I have to give up past nascent rights and expectations just because we can mine data more effectively (hell, that would have been a meaningless statement around the time that I was born…). Efficiency is not the same as superior, better, or (necessarily) wanted.

Continue reading

I See Your DPI and Raise You a SSL

A little while ago I was talking about network neutrality and Deep Packet Inspection (DPI) technologies with a person interested in the issue (shocking, I know), and one of the comments that I made went something like this: given the inability of DPI technologies to effectively crack encrypted payloads, it’s only a matter of time until websites start to move towards secure transactions – in other words, it’s only a matter of time until accessing websites will involve sending encrypted data between client computers and servers.

The Pirate Bay and Beyond

Recently, Sweden passed a bill that allows for the wiretapping of electronic communications without a court order. This caused the Pirates Bay, a well-known BitTorrent index site, to announce that it was adding SSL encryption to their website as well as VPN solutions for native Swedes who wanted to avoid the possibility of having their network traffic surveyed. Recently, isohunt.com has done the same, and other major torrent sites are expected to follow the lead. The groups who are running these websites are technically savvy, allowing them to implement encrypted access rapidly and with little technical difficulty, but as more and more sites move to SSL there will be an increasing demand amongst tech-savvy users that their favorite sites similarly protect them from various corporate and government oversight methods.

Continue reading

Why Lessig is Right (At Least When it Comes to Autobots)

is the founder of the Creative Commons, which effectively allows for a more nuanced (and reasonable) approach to copyright – it establishes particularized rights for different audiences to use your work in different ways. The aim is to allow people to license work so that citizens can use facets of their culture to create new parts of their culture – as an example they can modify images and songs to produce something new, without their modification being labeled a copyright infringement. You’ll note that this blog is under a CC license.

Music, Mashup, and Meaning

There have been a number of particularly stunning documentaries in the past few years that attempt to grapple with the notion of copyright. Of the ones that I’ve seen, Good Copy, Bad Copy(and it’s a free download!) is likely about the best – it examines the role of mashup in music and the role of copyright as it applies to film. Mashups tend to involve taking multiple tracks of music and overlaying them in new and interesting ways – this also tends to act as a method of ‘culture jamming’, insofar as messages are playfully appropriated and modulated in ways that diverge from the cultural direction of the original works of music. As an example, you might hear a song about war with deep and potent lyrics laid atop an electronic dance beat, transforming both of the works in important and substantial ways.

Continue reading

Resetting Windows Vista Media Center

I’ve begun shifting away from using my file server to store media/files to a drive enclosure holding 1TB of storage – I’ve moved over about 600GB of data, which will probably increase to at least 850-900GB by the time that I leave for Victoria. Then it’ll be time to get more file storage space, I guess grin. The shift to a drive enclosure has been brought on by the fact that I need to move my stuff halfway across the country, and don’t want to be bringing any more computers that we need to.

The Problem

In the process of trying to redirect my home theatre PC to the new networked drives in my drive enclosure, I ran into a problem: there is no way to delete all of the file location information in Windows Vista Home Premium’s Media Center (WVHPMC; isn’t that an ugly acronym!). This meant that, when I pointed the Media Center to the new location of all of my files, I was left with duplicate entries of my files, only half of which actually led anywhere (once the server was turned off).

Continue reading

Transparency and *My* Click-Stream

I get strange looks from some of my friends and colleagues sometimes. On the one hand, I strongly advance the idea that people’s privacy should be protected, by default, and at the same time I blog, use social networking sites (though somewhat uncomfortably), own a cell phone, use credit cards, etc. This week I’ve ‘stepped things up’ by syndicating my del.icio.us bookmarks with my blog – you’ll now be treated (or spammed, I guess, depending on how you see things) with the articles that I’ve tagged in the past 24 hours that I think are interesting.

SPAM Ahoy!

I’ll start by stating this: I don’t think that the links you’ll be seeing are Spam. I think that I’m tagging good, solid, helpful links for people that might be interested in surveillance, privacy, and (typically) how either of those topics intersects with technology in some fashion. You’ll note that, for the next little while at least, you’ll see links to articles on Deep Packet Inspection (DPI) and behavioral advertising. I expect some WiMAX stuff as well. There are a couple reasons why I’m syndicating this kind of content:

Continue reading

DPI, Employees, and Proper Inspection

In my last post I alluded to the fact that Deep Packet Inspection (DPI) technologies could be used by businesses to try and reduce the possibility of ‘inappropriate’ employee use of bandwidth and wrongful or accidental transmissions of confidential IP. In that last post I was talking about IT security, and this post will continue to reflect on DPI technologies’ applications and benefits to and for corporate environments.

A Quick Refresher on DPI

From ArsTechnica:

The “deep” in deep packet inspection refers to the fact that these boxes don’t simply look at the header information as packets pass through them. Rather, they move beyond the IP and TCP header information to look at the payload of the packet. The goal is to identify the applications being used on the network, but some of these devices can go much further; those from a company like Narus, for instance, can look inside all traffic from a specific IP address, pick out the HTTP traffic, then drill even further down to capture only traffic headed to and from Gmail, and can even reassemble e-mails as they are typed out by the user. (Source)

For a slightly longer discussion/description of DPI I suggest that you look at the wiki page that I’m gradually putting together on the topic of Deep Packet Inspection.

Continue reading