The Internet - The first Worldwide Tool of Unification ("The End of History")

" ... Now I give you something that few think about: What do you think the Internet is all about, historically? Citizens of all the countries on Earth can talk to one another without electronic borders. The young people of those nations can all see each other, talk to each other, and express opinions. No matter what the country does to suppress it, they're doing it anyway. They are putting together a network of consciousness, of oneness, a multicultural consciousness. It's here to stay. It's part of the new energy. The young people know it and are leading the way.... "

" ... I gave you a prophecy more than 10 years ago. I told you there would come a day when everyone could talk to everyone and, therefore, there could be no conspiracy. For conspiracy depends on separation and secrecy - something hiding in the dark that only a few know about. Seen the news lately? What is happening? Could it be that there is a new paradigm happening that seems to go against history?... " Read More …. "The End of History"- Nov 20, 2010 (Kryon channelled by Lee Carroll)

"Recalibration of Free Choice"– Mar 3, 2012 (Kryon Channelling by Lee Carroll) - (Subjects: (Old) Souls, Midpoint on 21-12-2012, Shift of Human Consciousness, Black & White vs. Color, 1 - Spirituality (Religions) shifting, Loose a Pope “soon”, 2 - Humans will change react to drama, 3 - Civilizations/Population on Earth, 4 - Alternate energy sources (Geothermal, Tidal (Paddle wheels), Wind), 5 – Financials Institutes/concepts will change (Integrity – Ethical) , 6 - News/Media/TV to change, 7 – Big Pharmaceutical company will collapse “soon”, (Keep people sick), (Integrity – Ethical) 8 – Wars will be over on Earth, Global Unity, … etc.) - (Text version)

“…5 - Integrity That May Surprise…

Have you seen innovation and invention in the past decade that required thinking out of the box of an old reality? Indeed, you have. I can't tell you what's coming, because you haven't thought of it yet! But the potentials of it are looming large. Let me give you an example, Let us say that 20 years ago, you predicted that there would be something called the Internet on a device you don't really have yet using technology that you can't imagine. You will have full libraries, buildings filled with books, in your hand - a worldwide encyclopedia of everything knowable, with the ability to look it up instantly! Not only that, but that look-up service isn't going to cost a penny! You can call friends and see them on a video screen, and it won't cost a penny! No matter how long you use this service and to what depth you use it, the service itself will be free.

Now, anyone listening to you back then would perhaps have said, "Even if we can believe the technological part, which we think is impossible, everything costs something. There has to be a charge for it! Otherwise, how would they stay in business?" The answer is this: With new invention comes new paradigms of business. You don't know what you don't know, so don't decide in advance what you think is coming based on an old energy world. ..."
(Subjects: Who/What is Kryon ?, Egypt Uprising, Iran/Persia Uprising, Peace in Middle East without Israel actively involved, Muhammad, "Conceptual" Youth Revolution, "Conceptual" Managed Business, Internet, Social Media, News Media, Google, Bankers, Global Unity,..... etc.)

German anti-hate speech group counters Facebook trolls

German anti-hate speech group counters Facebook trolls
Logo No Hate Speech Movement

Bundestag passes law to fine social media companies for not deleting hate speech

Honouring computing’s 1843 visionary, Lady Ada Lovelace. (Design of doodle by Kevin Laughlin)

Wednesday, October 1, 2014

New privacy battle looms after moves by Apple, Google

Yahoo – AFP, Rob Lever, 1 Oct 2014

A new battle is brewing over privacy for mobile devices, after moves by Google
 and Apple to toughen the encryption of their mobile devices sparked complaints from
law enforcement (AFP Photo/Lluis Gene)

Washington (AFP) - A new battle is brewing over privacy for mobile devices, after moves by Google and Apple to toughen the encryption of their mobile devices sparked complaints from law enforcement.

The issue is part of a long-running debate over whether tech gadgets should have privacy-protecting encryption which makes it difficult for law enforcement to access in time-sensitive investigations.

FBI director James Comey reignited the issue last week, criticizing Apple and Google for new measures that keep smartphones locked down -- without even the company holding the keys to unlock the data.

FBI director James Comey reignited the
issue last week, criticizing Apple and Google
for new measures that keep smartphones
locked down (AFP Photo/Georges Gobet)
"What concerns me about this is companies marketing something expressly to allow people to place themselves beyond the law," the FBI chief said, warning that law enforcement may be denied timely access, even with a warrant, in cases ranging from child kidnapping to terrorism.

Former FBI criminal division chief Ronald Hosko made a similar point in an opinion piece in the Washington Post, citing a case in which the agency used smartphone data to solve a brutal kidnapping just in time to save the life of the victim.

"Most investigations don't rely solely on information from one source, even a smartphone," he said. "But without each and every important piece of the investigative puzzle, criminals and those who plan acts destructive to our national security may walk free."

Crypto Wars 2.0

Observers who follow privacy and encryption say they have seen this debate before.

In the mid-1990s, as the Internet was gaining traction, the government pressed for access to digital "keys" to any encryption software or hardware, before abandoning what ended up being a futile effort.

"This is Crypto Wars 2.0," says Joseph Hall of the Center for Democracy and Technology, a digital rights group active in both campaigns.

Today, "the main difference is that phones are increasingly deeply personal, containing much more daily life and interaction than a desktop from the 1990s" Hall said.

Hall argued that giving law enforcement access requires companies to "engineer vulnerabilities" which could be exploited by hackers or others.

"There's no way to tell the difference between a good guy and bad guy when they walk through the back door," he said.

Cindy Cohn of the Electronic Frontier Foundation says the FBI has been making these arguments since 1995, with the same flawed logic.

"We've seen this movie before," Cohn said.

"Regulating and controlling consumer use of encryption was a monstrous proposal officially declared in 2001," she said in a blog post. "But like a zombie, it's now rising from the grave, bringing the same disastrous flaws with it."

In 2013, before the revelations of massive surveillance from leaked National Security Agency documents, the FBI called for broader authority to capture mobile communications which fall outside traditional surveillance, such as Skype and Google Hangouts.

But civil liberties activities say leaked NSA documents suggest that contrary to FBI claims made last year, the government has many tools at its disposal.

"There are an increasing number of places where we leave our digital trails," Hall said, including in the Internet cloud, where it can be accessed with a court order.

No back doors

Jennifer Granick, director of civil liberties at the Stanford University Center for Internet and Society, said the FBI argument overlooks the fact US tech firms must compete in the global marketplace.

The issue is part of a long-running debate over whether tech gadgets should have
 privacy-protecting encryption which makes it difficult for law enforcement to
access in time-sensitive investigations (AFP Photo)

"Global customers do not want backdoored products any more than Americans do, and with very good reason," Granick writes on the "Just Security" blog.

"Authoritarian countries like Russia, China, the United Arab Emirates, Sudan, and Saudi Arabia want to censor, spy on, and control their citizens' communications. These nations are just as able to make demands that Apple and Google decrypt devices as the FBI is, and to back up those demands with effective threats."

On balance, she said, "the public is more secure, not less secure, with the wide use of strong cryptography -- including cryptography without back doors."

Mike Janke, chief executive of the firm Silent Circle which makes the fully encrypted Blackphone, said the FBI is making a "false cry" against Google and Apple because the law enforcement agency can easily gain access to a phone -- through a carrier tap, or location tracking, for example.

Greater privacy, Janke said, comes from the harder encryption on Blackphone, but law enforcement can still track a user's location as long as the battery is inside.

While a small number of people may use encryption for nefarious purposes, Janke said, "do you sacrifice the privacy and trade secrets of everyone else because of that?"

No comments: