Tech at Night

Again, I’m sympathetic to the idea behind the new California ban in ‘revenge porn’, but ultimately this isn’t going to work, and it’s just going to give a false sense of security to the recklessly promiscuous. Just like the ‘eraser button’ for minors California passed, it’s a dangerously ineffective idea.

Big news: even as some people try to build a new distributed secure chat network, the old distributed secure communications network is continuing to fall apart. Tor has not protected Silk Road, whose creator is going to jail. It will be interesting to see if Bitcoin’s price falls as a result of the end of a major Bitcoin hub of illegal activity.

Continue reading »

Tech at Night

Good news! California Democrats think you can erase stuff from the global Internet just because you really really want to. This is magical thinking in law form. Telling kids they should run amok online because they can just erase it later, is insane. The Internet is dangerous and not for kids.

Again, the core problem with patent troll litigation isn’t with the court system, it’s with too many patents being issued. So the patent-holding tech industry may have a conflict in what it recommends to fix this. But seriously, the only reason patent trolling works is that so many bad patents get issued to begin with.

Continue reading »

Tagged with:
 
Tech at Night

Why on Earth would we need Do Not Track legislation when many forms of tracking would be hard to define, but also when Tracker #1 is as popular as ever? This is yet another example where privacy is being treated as a morality issue, where legislators are scolding the public.

I mean look. Microsoft talked about making Do Not Track the default setting, but the public didn’t care. Only advertisers did.

It’s kind of hard to have a rational debate about Net Neutrality when the radical left keeps lying, and lying, and lying. They have to demonize Verizon because they don’t have the facts or the law on their side.

Continue reading »

Tech at Night

If you’re really that worried about Dropbox “opening your files” as these guys on a wild goose chase were, then why exactly are you uploading them unencrypted to Dropbox to begin with? This is what I’m talking about when I say people don’t actually act like they care about privacy. If people did care, they’d act differently.

Once again, the FCC is looking to reduce competition by picking winners and losers int he marketplace, this time in attacking owners of UHF stations. The guy who owns channel 56 doesn’t even have the same market power as the guy who owns channel 4, so why try to make UHF owners divest? That just reduces competition.

Continue reading »

Tagged with:
 
Tech at Night

Are the Europeans looking to censor the Internet with the NSA as pretext? Cameron Kerry seems to think so. I don’t know how serious or likely any proposals were, but it bears looking at if you’re a European.

Meanwhile here in the US, the Internet control pretext is Net Neutrality, which ought to be struck down. The Communications Act never gave them that power, and the Telecommunications Act was pretty clear on an open Internet. The FCC has acted illegally.

Continue reading »

Tagged with:
 

Tech at Night: The Grand Return

On August 20, 2013, in General, by Neil Stevens
Tech at Night

So I’ve been gone a while. Sorry about that. After Summer Games Done Quick and the Redstate Gathering, I was supposed to be back in action. But a case of the shingles took me down fast. I was a sleepless zombie in pain for a week. No fun. Was actually alright on Friday, but I had so much reading to do I couldn’t catch up in time to post on Friday, so here we are. Hang on.

So let’s start with Time-Warner and CBS. The two had their negotiations fall through with respect to carrying CBS on Cable, and so a blackout began. The left wants this as the pretext to more government, but let’s be clear about this. Government created this pickle. The way out of it was proposed way back when, and backed in Tech at Night, when Jim DeMint and Steve Scalise proposed legislation. It’s still the right answer.

Continue reading »

Tech at Night

I’d have signed a letter against IRFA, the Pandora-backed regulatory bailout.

Government is trying to give advice on security online, including advice on how to deal with breakins. Information exchange is truly a proper cybersecurity role for government. Also important is prosecuting private offenders, and dealing with state offenders.

Though it gets tricky when state offenders include firms selling goods while pretending to be private firms, such as Chinese firms like Lenovo or Huawei.

ECPA reform is being held in the Senate. Leaky Leahy says it’s a Republican doing it. I wonder who? Lindsey Graham? John McCain? I’m not entirely convinced that the bill is necessary, but I don’t think it’s a particularly idea as long as we preserve something along the lines of FISA.

If you really want your email to be private, don’t have it all run through Google.

Turns out Snowden’s final decision to pledge allegiance to United Russia has encouraged a child pornographer in Ireland to follow suit.

Continue reading »

Tagged with:
 
Tech at Night

This will bet he only edition of Tech at Night this week. I was out of it Monday night, and this weekend I’m traveling to Denver for SGDQ 2013. I will be there to give live on stream commentary for the Legend of Zelda and Zelda II runs, so watch and donate if you care to.

House Democrats, together with a few libertarians, tried to restrict the NSA, and failed. I’m fine with this.

In other news, Google is accused of Net Neutrality violations for trying to restrict servers on Google Fiber. Heh. If people can run servers on Google Fiber then they’re going to have problems quickly. So this is a very interesting case.

Continue reading »

Tech at Night

Update on ECPA reform: Last time I commented that it was problematic to give such strong protections to terrorist emails on American corporate-run servers. Well, it turns out ECPA reform backers are listening, and have pointed out to me that FISA will work just fine in those cases. Fair point. I still don’t think the law makes sense, but at least it’s not too terribly harmful.

This tutorial to “NSA-proof your email” is all wrong. All wrong. You NSA-proof your email by using end-to-end encryption, not by using transport level encryption. Hosing your own email is a great idea, mind you (it makes the ECPA-related issues moot), but NSA can still spy on you all they want if you follow that webpage’s instructions.

Continue reading »

Tech at Night

Russia is reacting to Snowden’s leaks. One wonders what he’s telling them.

Here we go again. Having failed to pass the preferred bill of Joe Lieberman’s and Jay Rockefeller’s last time, Senate leaders are trying again on a cybersecurity bill. Any bill Senate Democrat leaders support is suspect, given their history of the Internet Kill Switch.

There’s room for legislation, but by default I oppose their plans to expand the scope of government online.

Continue reading »

Nima Jooyandeh facts.