EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.16.13

NSA Roundup: New Evidence of Crimes, Greenwald Moves Towards Independence, and More

Posted in Action at 11:29 am by Dr. Roy Schestowitz

Summary: Newest stories about the NSA and its allies

THE NSA saga is far from over. There are new revelations all the time and the corporate press is trying to distract us by speaking about China [1] and Russia [2]. Don’t take this hypocritical bait.

As an MI5 whistleblower puts it, “US/UK spy chiefs cover up NSA surveillance scandal” [3] while Glenn Greenwald, a US citizen living in Brazil, finds independence by forming a new media outlet with help from eBay’s founder [4]. He will hopefully help nations which are victims of NSA espionage [5] without getting censored by The Guardian.

Tor, which is a project that came from the US military and is run by pseudonyms, is getting more attention from the NSA [6] and is becoming less safe to use [7], despite Edward Snowden’s promotion of it.

Snowden, the whistleblower who shamed the NSA, has his father visit him in Russia (despite or because of warnings about collaborations with the FBI) [8] and personal awards are being granted [9], with more possibly on the way [10]. Snowden is a hot target for the US government right now [11].

Richard Stallman has just published a long article about surveillance [12] and the EU Parliament, a famous victim of espionage managed by the NSA, is now turning its back on privacy [13,14].

Moves are being made to decentralise the US-centric Internet [15,16] as the NSA’s mischiefs go deeper and deeper [17,18], with complicity from US tech giants [19-22]. Lavabit is in the headline again, mostly for being the exception when it comes to selling customers down the river, only to be hunted down by the US government [23,24].

More interesting revelations come out of Britain, the US’ ally in espionage [25-28], with similar actions seen in Canada (also “Conservatives” [29]).

The NSA is fortunately having some growing pains [30]. The leaks can’t be helping Big Brother.

Related/contextual items from the news:

  1. China has more internet monitors than soldiers
  2. Russian embassy set up to intercept secrets: ASIO

    Russia used its embassy in Canberra to intercept Australian intelligence and political communications, targeting the capital’s main telecommunications tower, the Defence Department, Australian electronics firms and the Tidbinbilla space tracking station, according to confidential accounts of ASIO counter-espionage in the Cold War obtained by Fairfax Media.

  3. US/UK spy chiefs cover up NSA surveillance scandal

    The dis­par­ity in response to Edward Snowden’s dis­clos­ures within the USA and the UK is aston­ish­ing. In the face of right­eous pub­lic wrath, the US admin­is­tra­tion is con­tort­ing itself to ensure that it does not lose its treas­ured data-mining cap­ab­il­it­ies: con­gres­sional hear­ings are held, the media is on the warpath, and senior securo­crats are being forced to admit that they have lied about the effic­acy of endemic sur­veil­lance in pre­vent­ing ter­ror­ism.

    Just this week Gen­eral Alex­an­der, the head of the NSA with a long track record of mis­lead­ing lying to gov­ern­ment, was forced to admit that the endemic sur­veil­lance pro­grammes have only helped to foil a couple of ter­ror­ist plots. This is a big dif­fer­ence from the pre­vi­ous num­ber of 54 that he was tout­ing around.

    Cue calls for the sur­veil­lance to be reined in, at least against Amer­ic­ans. In future such sur­veil­lance should be restric­ted to tar­geted indi­vidu­als who are being act­ively invest­ig­ated. Which is all well and good, but would still leave the rest of the global pop­u­la­tion liv­ing their lives under the bale­ful stare of the US pan­op­ticon. And if the cap­ab­il­ity con­tin­ues to exist to watch the rest of the world, how can Amer­ic­ans be sure that the NSA et al won’t stealth­ily go back to watch­ing them once the scan­dal has died down — or just ask their best bud­dies in GCHQ to do their dirty work for them?

  4. Glenn Greenwald announces departure from the Guardian

    Journalist who broke stories about widespread NSA surveillance leaving to pursue ‘once-in-a-career journalistic opportunity’

  5. Glenn Greenwald to publish Snowden leaks on France and Spain
  6. Report: NSA has little success cracking Tor

    The agency has attacked other software, including Firefox, in order to compromise the anonymity tool, according to documents

  7. How the NSA identifies Tor users in 6 easy steps
  8. Snowden’s father arrives in Russia
  9. Snowden Accepts Whistleblower Award

    Though former NSA contractor Edward Snowden has been indicted for leaking secrets about the U.S. government’s intrusive surveillance tactics, he was honored by a group of former U.S. intelligence officials as a courageous whistleblower during a Moscow ceremony, reports ex-CIA analyst Ray McGovern who was there.

  10. Open letter by 23 European organisations in support of Snowden’s nomination for the Sakharov prize

    Today, 23 European non-governmental organisations released an open letter to the Conference of Presidents of the European Parliament in support of Edward Snowden’s nomination for the Sakharov Prize for Freedom of Thought 2013.

  11. Snowden: DOJ Won’t Prosecute Official For Lying, But Will Stop At Nothing To Persecute Someone For Telling The Truth
  12. Stallman: How Much Surveillance Can Democracy Withstand?

    The current level of general surveillance in society is incompatible with human rights. To recover our freedom and restore democracy, we must reduce surveillance to the point where it is possible for whistleblowers of all kinds to talk with journalists without being spotted. To do this reliably, we must reduce the surveillance capacity of the systems we use.

    Using free/libre software, as I’ve advocated for 30 years, is the first step in taking control of our digital lives. We can’t trust non-free software; the NSA uses and even creates security weaknesses in non-free software so as to invade our own computers and routers. Free software gives us control of our own computers, but that won’t protect our privacy once we set foot on the internet.

  13. Will EU Parliament Sacrifice our Privacy for Electoral Reasons?

    A crucial vote for EU Citizens fundamental right to privacy will take place on October 21st, in the “Civil Liberties” committee (LIBE) of the European Parliament. The future of the EU Regulation on the protection of individuals to the processing of their personal data will be decided by a vote on “compromise amendments”1. The rapporteur seems willing to request a mandate to enter closed-doors negotiations to severely cut short any chance of public debate. La Quadrature du Net calls on all citizens to contact the members of the LIBE committee to urge them to refuse this obscure hijacking of the democratic debate.

  14. [Video] Will EU Parliament Sacrifice our Privacy for Electoral Reasons?
  15. The US is losing control of the internet
  16. NSA Blowback Spreads to Internet Governance Organizations

    The unexpected disclosures of NSA activities by Edward Snowden presents a splendid example of U.S. government, as well as popular, indifference to world opinion. As part of its efforts to control the political damage of the embarrassing revelations, the Obama administration repeatedly stressed that only foreign nationals had been the targeted. As the breathtaking breadth of the data accessed and analyzed became clear, this rationale raised the question of how the foreign citizens – and even leaders – of U.S. allies might feel about being considered to be fair game for the NSA’s attention.

    The answer to that question is that they weren’t happy. Nor, as we will see, were a group of NGOs that had no reason to think they were targeted at all.

    Some foreign governments doubtless communicated their concerns privately through diplomatic channels. But others made their displeasure very public indeed. Brazil’s President Dima Rouseff, for one, cancelled a bilateral summit with President Obama after it was reported that her telephone calls and email had been intercepted. Late last week, she went a step further, announcing that Brazil will host a global summit to oppose U.S. surveillance.

  17. The NSA’s New Codebreakers

    But TAO doesn’t just spy on America’s rivals. In 2012, the group reportedly compromised the encryption system used by an important G8 country to transmit sensitive diplomatic communications via satellite to its embassies around the world. The same is true with a number of countries in the Middle East and South Asia, including Egypt, Syria, Iran, and Pakistan, although the details of these successes are not yet known. And finally, sources report that TAO has successfully compromised the privacy protection systems currently used on a range of 4G cell phones and hand-held devices, thanks in large part to help from a major American telecommunications company.

  18. NSA Has Spurred Renewed Interest In Thorough Security Audits Of Popular ‘Secure’ Software

    In yet another bit of fallout from the NSA surveillance efforts — and, specifically, the NSA’s covert takeover of security standards to insert vulnerabilities — it appears that there’s suddenly much more skepticism towards well-known security offerings. This is a good thing. There have already been some revelations concerning attempts to compromise Tor, and security researcher Matthew Green has now called for a thorough security audit of TrueCrypt, the (very) popular disk encryption tool. Green and some others have kicked off the project on the aptly named website IsTrueCryptAuditedYet.com.

  19. If the Internet were a game of Risk, Facebook and Google would be winning
  20. Tech titans’ muted response on NSA data mining
  21. Latest NSA revelation is black eye for Yahoo

    Yahoo plans to make encryption a default setting for all Yahoo Mail users in January — four years after rival Google took what is considered a basic security step.

  22. NSA collects millions of e-mail address books globally

    The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.

    The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.

  23. Meet Lavabit’s founder: An American hero hiding in plain sight
  24. Lavabit Case Shows Why We Need Tech Literate Judges

    While there’s plenty of attention being paid to Lavabit’s temporary re-opening for the sake of letting people export their accounts, a much more interesting issue is the recent development in the legal case. Lavabit has filed its latest brief, and there are some interesting discussions about the details of the case. From my reading, Lavabit makes a very strong argument that the government has no right to demand the production of Lavabit’s private SSL keys, as it’s an overreach way beyond what traditional wiretapping laws allow. Lawyer Orin Kerr’s analysis argues that Lavabit’s case is weak, mainly arguing that the federal government can subpoena whatever the hell they want, and just because it conflicts with your business model: too bad. Lavabit argues that complying with the government’s order is oppressive because it would effectively mean it would be committing fraud on all its customers…

  25. Interview on London Real TV
  26. The Empire Strikes Back

    Sir Andrew Parker, the recently elev­ated Dir­ector Gen­eral of the UK’s domestic secur­ity Ser­vice (MI5) yes­ter­day made both his first pub­lic speech and a super­fi­cially robust defence of the work of the intel­li­gence agen­cies. Read­ing from the out­side, it sounds all pat­ri­otic and noble.

  27. Snowden leaks: David Cameron urges committee to investigate Guardian

    David Cameron speaks during prime minister’s questions, where he said: ‘The plain fact is that what has happened has damaged national security.’ Photograph: PA

  28. Parliamentarians warn of ‘deliberate failiure’ to conceal GCHQ capability

    Shortly after Lord Macdonald, the former director of public prosecutions, condemned the way the new head of MI5 had dismissed calls for greater scrutiny several senior figures involved in the scrutiny of the draft communications data bill have said that Britain’s spy agencies may be operating outside the law in the mass internet surveillance programmes uncovered by Edward Snowden.

  29. Conservatives Set To Kill Growing VPN Industry
  30. Windows Becomes Freeware, Adobe Cracked & More…

    This week we were treated to the surprising news (not) that the NSA has been going after users of TOR. We also learned that the opening of the huge data center the agency is building in the Utah desert has been again delayed, this time due to power surges that have been burning out about $100,000 in equipment with each incident. Meanwhile, as more items revealed by Edward Snowdon are released, companies offering online anonymity find their business booming.

After Attacking GNU/Linux at Microsoft’s Behalf (and Hiring Executives From Microsoft) HP Pretends to be Against Microsoft

Posted in Deception, GNU/Linux, HP, Microsoft at 11:05 am by Dr. Roy Schestowitz

Meg Whitman talks nonsense

Meg Whitman
Author: Max Morse

Summary: HP says Microsoft is a rival, but evidence suggests that HP is being occupied by Microsoft managers and that it attacks GNU/Linux, not Windows

People should not be taking HP’s claims at face value. Realising what the cash cows are, HP is trying to sell as many servers as possible (many will use GNU/Linux), so it tries to appeal to system administrators while quietly spreading Microsoft’s anti-GNU/Linux FUD [1, 2] to derail government migrations to GNU/Linux. Perhaps the inefficiently of Windows helps sell more such servers (for the same task).

Either way, HP sure is suffering from the decline of Microsoft’s desktop empire, but publicly HP wants us to think that “Microsoft Is At War With Its OEM Partners” (such as HP). More “sock puppetry,” calls it iophk, saying that “Microsoft Hilf is still inside HP, Ray Ozzie is still on the board, so this is just noise.” There are more such examples, including Vice Presidents. HP is gradually becoming somewhat of a proxy to Microsoft — a bit like Nokia.

Microsoft is hardly a competitor of HP; those two are partners and actions at the management level show this. Here is another article which blindly repeats HP’s claims:

APPARENTLY NOT CONTENT with making her employees draw lots or arm-wrestle for desks by banning telecommuting, HP CEO Meg Whitman has decided to let loose the hounds on Microsoft, declaring that it and Intel have changed from being “partners to outright competitors”.

HP is still using x86 and Windows, so how are Intel and Microsoft competitors really? Sheer nonsense.

Speaking of Microsoft and pretense, the company pretended to be “nice” to FOSS while essentially banning particular FOSS licence — an action which it quietly steps away from:

With little fanfare, Microsoft — or at least one part of it — has gone from considering the GNU General Public License v.3 (GPLv3) “evil” to “acceptable.”

That’s because this licence is popular, unlike Microsoft. “A company spokesperson didn’t provide a direct answer,” says Microsoft Mary, whose inquiry helps show just how Microsoft really feels about the GPLv3. Public statements are the area controlled by marketing people and professional spinners. In order to find out what’s true we need to investigate actions — not words — for ourselves.

Linux Backdoors Revisited (New Revelations and Old Revelations)

Posted in GNU/Linux, Kernel, Security at 10:43 am by Dr. Roy Schestowitz

Claude Elwood Shannon, the man who introduced entropy

Claude Elwood Shannon

Summary: An anonymous backdooring attempt against Linux goes a decade back, but a randomisation problem in today’s Linux also seems possible (subverting encryption)

Jonathan Allen wrote this article about an incident mentioned also by Freedom to Tinker. Slashdot’s summary goes like this, documenting news from one decade ago:

“Ed Felton writes about an incident, in 2003, in which someone tried to backdoor the Linux kernel. Back in 2003 Linux used BitKeeper to store the master copy of the Linux source code. If a developer wanted to propose a modification to the Linux code, they would submit their proposed change, and it would go through an organized approval process to decide whether the change would be accepted into the master code. But some people didn’t like BitKeeper, so a second copy of the source code was kept in CVS. On November 5, 2003, Larry McAvoy noticed that there was a code change in the CVS copy that did not have a pointer to a record of approval. Investigation showed that the change had never been approved and, stranger yet, that this change did not appear in the primary BitKeeper repository at all. Further investigation determined that someone had apparently broken in electronically to the CVS server and inserted a small change to wait4: ‘if ((options == (__WCLONE|__WALL)) && (current->uid = 0)) …’ A casual reading makes it look like innocuous error-checking code, but a careful reader would notice that, near the end of the first line, it said ‘= 0′ rather than ‘== 0′ so the effect of this code is to give root privileges to any piece of software that called wait4 in a particular way that is supposed to be invalid. In other words it’s a classic backdoor. We don’t know who it was that made the attempt—and we probably never will. But the attempt didn’t work, because the Linux team was careful enough to notice that that this code was in the CVS repository without having gone through the normal approval process. ‘Could this have been an NSA attack? Maybe. But there were many others who had the skill and motivation to carry out this attack,’ writes Felton. ‘Unless somebody confesses, or a smoking-gun document turns up, we’ll never know.’”

Backdoors in Linux are a subject for jokes in Torvalds' mind, but given the above we should take this subject very seriously. In any system, for example, having no mechanism for randomness (like in some embedded devices) typically means that strong encryption (with high entropy) is not possible. Given new alleged “insecurities in the Linux /dev/random,” as Bruce Schneier put it, Linux backdoors seem possible again. David Benfell said:

I’m guessing Schneier knows what the fuck he’s talking about. If it is the same vulnerability, then Torvalds’ defense is that the vulnerable source of entropy is only one of many. But if I read Schneier correctly, the result was still too predictable.

“On the other hand,” says Benfell, “here’s Theodore T’so from the comments:”

So I’m the maintainer for Linux’s /dev/random driver. I’ve only had a chance to look at the paper very quickly, and I will at it more closely when I have more time, but what the authors of this paper seem to be worried about is not even close to the top of my list in terms of things I’m worried about.

First of all, the paper is incorrect in some minor details; the most significant error is its (untrue) claim that we stop gathering entropy when the entropy estimate for a given entropy pool is “full”. Before July 2012, we went into a trickle mode where we only took in 1 in 096 values. Since then, the main way that we gather entropy, which is via add_interrupt_randomness(), has no such limit. This means that we will continue to collect entropy even if the input pool is apparently “full”.

This is critical, because *secondly* their hypothetical attacks presume certain input distributions which have an incorrect entropy estimate —| that is, either zero actual entropy but a high entropy estimate, or a high entropy, but a low entropy estimate. There has been no attempt by the paper’s authors to determine whether the entropy gathered by Linux meets either of their hypothetical models, and in fact in the “Linux Pseudorandom Number Generator Revisited”[1], the analysis showed that our entropy estimator was actually pretty good, given the real-life inputs that we are able to obtain from an actual running Linux system.

[1]http://eprint.iacr.org/2012/251.pdf

The main thing which I am much more worried about is that on various embedded systems, which do not have a fine-grained clock, and which is reading from flash which has a much more deterministic timing for their operations, is that when userspace tries to generate long-term public keys immediately after the machine is taken out of the box and plugged in, that there isn’t a sufficient amount of entropy, and since most userspace applications use /dev/urandom since they don’t want to block, that they end up with keys that aren’t very random. We had some really serious problems with this, which was written up in the “Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices” [2]paper, and the changes made in July 2012 were specifically designed to address these worries.

[2]https://www.factorable.net/paper.html

However, it may be that on certain systems, in particular ARM and MIPS based systems, where a long-term public key is generated very shortly after the first power-on, that there’s enough randomness that the techniques used in [2]would not find any problems, but that might be not enough randomness to prevent our friends in Fort Meade from being able to brute force guess the possible public-private key pairs.

Speaking more generally, I’m a bit dubious about academic analysis which are primarily worried about recovering from the exposure of the state of the random pool. In practice, if the bad guy can grab the state of random pool, they probably have enough privileged access that they can do many more entertaining things, such as grabbing the user’s passphrase or their long-term private key. Trying to preserve the amount of entropy in the pool, and making sure that we can extract as much uncertainty from the system as possible, are much higher priority things to worry about.

That’s not to say that I might not make changes to /dev/random in reaction to academic analysis; I’ve made changes in reaction to [2], and I have changes queued for the next major kernel release up to make some changes to address concerns raised in [1]. However, protection against artificially constructed attacks is not the only thing which I am worried about. Things like making sure we have adequate entropy collection on all platforms, especially embedded ones, and adding some conservatism just in case SHA isn’t a perfect random function are some of the other things which I am trying to balance as we make changes to /dev/random.

T’so, who is the former CTO of the Linux Foundation, at least acknowledges the possibility that there is a real issue here.

10.14.13

GNU is Big in Top500.org

Posted in GNU/Linux at 10:05 am by Dr. Roy Schestowitz

Large server

Summary: The erosion of accurate historical record when it comes to the free (as in freedom) operating system

EARLIER today I found yet another article which claims to give the history of GNU/Linux but talks only about Linux, pretending everything started in 1991 [1]. This is a common mistake, found in other articles that I found today [2], but nothing is as upsetting as the Linux Foundation, which cannot claim ignorance, brushing GNU out of the record, even when it comes to supercomputing [3]. The historical record is important and language is too. To use an analogy that I used a fortnight ago, calling native Americans (or Americans) “Indians” legitimises a view where these are foreigners rather than First People (“American Indian” means Indian citizen living in the US), so to say that European conquerors “discovered” America and are now the real “Americans” is like claiming that GNU is somehow the ugly little brother of Linux when it fact it’s a distortion of the truth. Google takes it a step further by calling GNU/Linux “Chromebook” and just never attributing anything which is Free software. In the latest episode of TLLTS (probably the longest-running Linux podcast) one of the hosts did not even know that Chromebook had GNU/Linux in it. Lack of proper attribution and intentional blurring of history leads to this.

Related/contextual items from the news:

  1. History of Linux: The Timeline

    Bangalore: Enterprises are the home for Linux operating systems. They are mostly used across servers, for connecting databases and clients and for other purposes. Yet, presently, these operating systems have turned out to be so user-friendly that they have become a common sight throughout houses. So, how did this transition happen? How was this operating system even born? In the next couple of pages, we are taking you to a journey in time. Read on to know about the history of the most popular operating system.

  2. Limpag: Elementary, my dear PC

    The main difference between Linux and Windows is the way these are developed. Windows is a proprietary system built by a single company – Microsoft. Linux is built by a global community of users under an open source license – a framework that encourages
    sharing and collaboration.

  3. Reality Check: Supercomputers Still Rule… and Linux Still Rules Them

    Earlier this summer, The Linux Foundation released the report 20 years of Top500.org, which marked the 20th anniversary of the Top 500 supercomputer ranking, and (quite naturally) highlighted Linux’s dominance on systems within the Top 500 over time.

  4. Does a Chromebook replace a laptop?

Techrights Was Right About Skype All Along

Posted in Microsoft at 9:45 am by Dr. Roy Schestowitz

Keyboard in the dark

Summary: Realisations about Skype, which is now under investigation by Luxembourg’s data protection commissioner

YEARS ago we warned that Skype had become a surveillance tool like never before. A year and a half ago we explained how Skype had become a tool for NSA eavesdropping on calls all around the world, not just calls within the United States (or routed through US allies like the UK), potentially engaging in espionage against nations outside the EU and Russia (Sweden has been used as an outpost for such eavesdropping).

In a way, Techrights was right about Skype falling into the NSA’s hands 2 years ago. Given the NSA’s very strong relationship with Microsoft, the acquisition may as well be taxpayers-funded. Now there is a formal investigation into it in Europe, where politicians got bugged by the NSA:

A EUROPEAN DATA PROTECTION WATCHDOG is investigating Microsoft’s voice over IP (VoIP) and chat service Skype about its suspected links to the US National Security Agency (NSA).

According to a report in the Guardian newspaper Skype is being investigated by Luxembourg’s data protection commissioner. Since the firm is based in Europe it might find itself under strict inspection and facing criminal proceedings and possible sanctions.

Here is more. We wrote about it years ago, but back then people considered that “paranoid”, despite evidence existing (not evidence as hard as what Snowden later leaked).

Tim Berners-Lee is Wrong, DRM in HTML is a Very Big Deal

Posted in DRM at 9:29 am by Dr. Roy Schestowitz

Time to fork HTML?

Tim Berners-Lee by John S. and James L. Knight Foundation
Source: Original from John S. and James L. Knight Foundation, modified by Techrights

Summary: The Web’s founder, Tim Berners-Lee, now actively defends the copyright cartel, only to find loud opposition even from his biggest and more prominent fans

Tim Berners-Lee is quickly losing credibility and he has nobody else to blame. He actively echoes Hollywood talking points or at least Hollywood’s apologists, to whom a copyright monopoly or cartel is perfectly acceptable if not essential.

“It’s that time of the year again,” writes iopkh.” Time to remind the media that there are no such things as Nobel prizes in astrology, professional wrestling or economics.” Here is Cory Doctorow speaking out his mind again, urging Mozilla to tackle DRM like it already tackles Flash, namely:

Mozilla’s Shumway project, an attempt to create a replacement Flash plug-in that uses HTML5, might ever so slightly placate those barracking for the latter. Previously Shumway has only been available as a separate extension, but it recently made its way into Firefox’s nightly builds, hinting at the prospect of mainline inclusion somewhere down the line.

Glyn Moody, a vocal fan of Tim Berners-Lee, has become quite a notable opposer of his stance of DRM in HTML5. He raises some very good points:

Tim Berners-Lee on Why HTML5 “Needs” DRM

[...]

That’s an extremely odd comment, since it divides up the online world up into active creators and passive consumers. That’s precisely the framing that the copyright industry adopts in an attempt to minimise the rights of Internet users, and to belittle their role.

[...]

Putting users first is great, but this sets up a false dichotomy between those who “like to watch big-budget movies at home” and those who want an open Web, as if the former must lose if the latter win. But it’s ridiculous to suggest that companies like Netflix will stop streaming video over the Internet if the Web does not include DRM. It may do it with proprietary Web plugins, or it might even insist that people use standalone code, but that’s not a problem – it is exactly how it’s been done in the past.

Moreover, the open Web will exist and thrive even if some people choose to use proprietary code, just as open source thrives despite the existence of some closed-source applications. The only people who might conceivably lose out if DRM isn’t included in HTML is the W3C, who won’t be able to control exactly how those non-Web parts operate. But that’s true now, anyway, and I can’t believe that the W3C is so power crazed that it wants to sacrifice the open Web solely to extend its empire a little further.

The longer this goes on for, the worse Tim Berners-Lee’s reputation will get. He hopefully understands this by now. The NSA already threatens forking of the Web. Tim Berners-Lee might do the same with his stance. If not a fork, then an alternative might be put forth. There were several Web-like prototypes preceding Tim Berners-Lee’s. Although some were better, they never quite caught on. Tim Berners-Lee and the W3C may feel like they have no competition, so they think that they can get away with DRM.

10.13.13

IRC Proceedings: September 29th-October 5th, 2013

Posted in IRC Logs at 5:56 am by Dr. Roy Schestowitz

IRC Proceedings: September 29th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: September 30th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: October 1st, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: October 2nd, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: October 3rd, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: October 4th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: October 5th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

Enter the IRC channels now

IRC Proceedings: September 22nd-September 28th, 2013

Posted in IRC Logs at 4:37 am by Dr. Roy Schestowitz

IRC Proceedings: September 22nd, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: September 23rd, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: September 24th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: September 25th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: September 26th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: September 27th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

IRC Proceedings: September 28th, 2013

GNOME Gedit

GNOME Gedit

#techrights log

#boycottnovell log

GNOME Gedit

GNOME Gedit

#boycottnovell-social log

#techbytes log

Enter the IRC channels now

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts