Electronic Vulnerability

Encryption, exposed as almost useless except to spys

Several weeks ago, Glen Greenwald said there was much more to come based on the information obtained by Edward Snowdon. For several of those weeks we have had disturbing, yet relatively minor disclosures. Yet once again, Snowdon has providing something huge. We need, once again to become a nation of laws.

An instructive story – Suppression, Conspiracy, Intrigue, Incredible, unfortunately True

This is a tale of three individuals focusing on the less known of the three, and her struggles with a country bent on suppressing information required of its citizens to participate in, direct, and obtain democracy. It would be quite a movie trailer or book sample text, yet perhaps too unbelievable.

GMO Danger: CALEA II (Government Modified Operating system)

Last week a group of computer security experts issued a warning about a proposed expansion of government spying know as CALEA II (Communications Assistance For Law Enforcement Assistance) being considered for “wire” tap expansion.

The report if anything understates the risks. Further, if you believe that, in general, government can be incompetent, that makes this plan even less effective and more risky.

Testimony against six bills and for one

All of these bills are well intended. In fact, I would support most of the concepts, yet in only a single case could I support one of these bills , based on huge gaps between the good intent and the actual details present and missing in those bills.

What We Worry? What Could Go Wrong On Election Day?

America’s elections are run entirely on the honor system. What could possibly go wrong?

Caltech/MIT: What has changed, what hasn’t, & what needs improvement

The Caltech/MIT Voting Technology Project has released a thorough, comprehensive, and insightful new report timed to the 2012 election. We find little to quibble with in the report. We agree with all of its recommendations.Several items with which we fully endorse were covered in this report which sometimes are missing from the discussion or often underemphasised.

The report itself is 52 pages, followed by 32 pages of opinions of others, including election officials, advocates, and vendors, some of whom disagree with some aspects of the report. Every page is worth reading. The report is not technical. It covers a wide range of issues, background, and recommendations.

CTVotersCount flip flops from “Trust but Verify” to “Verify to Trust”

There is absolutely no need to “trust” anyone if there is sufficient verification. There is also little evidence to trust our democracy to anyone. As they say power corrupts.

Now we learn that many of our votes are being counted by machines under the influence of one of the candidates and his family.

Big Bird and Charlie Rose know what the CT Legislature does not!

See Charlie Rose interview Dr. Barbara Simons, co-auther of Broken Ballots. <view>

Big Bird and Charlie Rose now know that Internet voting, email voting, Virgina elections, and inadequately audited elections – do not merit our trust.

What can the F.D.A. teach us about Officials, Internet voting, and Computer voting?

Vast, easy spying capabilities. No technical expertise required. The possibilities are endless. Votes, voters, spouses, lawyers, business opponents, employees, bosses, officials, candidates, campaigns, investigators, and auditors can be monitored by practically anyone. Will the perpetrators be brought to justice?

UConn paper warns of limitations of cryptography

Use of good tools must go hand-in-hand with good use of tools

Page 10 of 24« First...89101112...20...Last »