Bobinas P4G
  • Login
  • Public

    • Public
    • Groups
    • Popular
    • People

Notices by Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)

  1. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Monday, 16-Sep-2019 02:23:10 UTC Mike Gerwitz Mike Gerwitz
    Mischaracterization of an individual is an injustice regardless of your differences.
    In conversation Monday, 16-Sep-2019 02:23:10 UTC from social.mikegerwitz.com permalink
  2. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Thursday, 29-Aug-2019 04:14:03 UTC Mike Gerwitz Mike Gerwitz
    in reply to
    • Free Software Foundation
    • Alexandre Oliva
    I'm really pleased to see this, @lxoliva! Congrats!
    In conversation Thursday, 29-Aug-2019 04:14:03 UTC from social.mikegerwitz.com permalink
  3. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Monday, 10-Jun-2019 02:14:53 UTC Mike Gerwitz Mike Gerwitz
    cnet: "Amazon's helping police build a surveillance network with Ring doorbells"

    https://www.cnet.com/features/amazons-helping-police-build-a-surveillance-network-with-ring-doorbells/
    In conversation Monday, 10-Jun-2019 02:14:53 UTC from social.mikegerwitz.com permalink

    Attachments


  4. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Tuesday, 14-May-2019 09:01:28 UTC Mike Gerwitz Mike Gerwitz
    in reply to
    • Alexandre Oliva
    • Christine Lemmer-Webber
    @cwebber @lxoliva Certainly we need to trust it as well. But if you're installing software on your system, there are generally other, more effective ways to compromise the user than resorting to side-channels.

    But ensuring your software is signed and reproducible also helps to mitigate targeted attacks---if you're running the same software that everyone else is running, then the risk is very high for someone to do something malicious and tarnish their reputation.

    Many users just `curl foo | sudo sh` the latest hot thing as they're instructed.
    In conversation Tuesday, 14-May-2019 09:01:28 UTC from social.mikegerwitz.com permalink
  5. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Monday, 13-May-2019 02:51:25 UTC Mike Gerwitz Mike Gerwitz
    in reply to
    • Alexandre Oliva
    • Christine Lemmer-Webber
    @lxoliva had some compelling words about this at LP2019:

    https://media.libreplanet.org/u/libreplanet/m/who-s-afraid-of-spectre-and-meltdown/

    I don't know if your comment related at all to Spectre, but---if all the software running on your system is free software, what is there to fear? And I agree.

    The biggest trouble is that people often run non-free and untrusted code all of the time in their web browsers, and don't see it as a software freedom or security issue. It's important to recognize it for what it is---untrusted, unsigned, ephemeral software---if you're going to consider security tradeoffs when it comes to certain mitigations. I personally don't run JS at all, even if it's free, with very few exceptions, because it's unsigned.
    In conversation Monday, 13-May-2019 02:51:25 UTC from social.mikegerwitz.com permalink
  6. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Friday, 10-May-2019 02:15:30 UTC Mike Gerwitz Mike Gerwitz
    Video for my #LibrePlanet 2019 talk "Computational Symbiosis: Methods That Meld Mind and Machine" is now available, and includes the slides:

    https://social.mikegerwitz.com/url/74281

    The PIP does slightly cover some slide contents. PDF of the slides is here:

    http://mikegerwitz.com/talks/cs4m.pdf

    Errata posted here:

    https://social.mikegerwitz.com/conversation/177288#notice-260018
    In conversation Friday, 10-May-2019 02:15:30 UTC from social.mikegerwitz.com permalink
  7. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Thursday, 04-Apr-2019 01:45:05 UTC Mike Gerwitz Mike Gerwitz
    EFF applauds WhatsApp fixing a group chat bug:

    https://www.eff.org/deeplinks/2019/04/fixed-whatsapp-rolls-out-group-privacy-settings

    I get it, a lot of people use WhatsApp. But this doesn't deserve applause---WhatsApp deserves condemnation. It is a proprietary, centralized service. There are better ways to go about your communication with others where you don't have to put up with company inaction by completely relinquishing control of your communications to a third party.

    I wrote about this and more back in February in response to the GHCQ Ghost proposal:

    https://mikegerwitz.com/2019/02/ghcq-exceptional-access-e2ee-decentralization-reproducible
    In conversation Thursday, 04-Apr-2019 01:45:05 UTC from social.mikegerwitz.com permalink
  8. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Saturday, 30-Mar-2019 03:00:49 UTC Mike Gerwitz Mike Gerwitz
    GNU Guix Blog, "Connecting reproducible deployment to a long-term source code archive":

    https://social.mikegerwitz.com/url/73241
    In conversation Saturday, 30-Mar-2019 03:00:49 UTC from social.mikegerwitz.com permalink
  9. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Tuesday, 26-Mar-2019 02:19:28 UTC Mike Gerwitz Mike Gerwitz
    • Danny O'B
    @mala Re: The LibrePlanet panel you were on about Australia's terrible decryption law:

    I asked the first questions just before rms. I had about an hour's worth of questions but had to give others a turn. I did talk to Isa a little bit after specifically about concerns with Tor, but wasn't able to find you free. That panel made a lot of people very uncomfortable. ;)

    In particular, I'm curious if you know of any prior precedent in the United States (not necessarily with regards to technology) for the aid in enforcement of laws of other countries that violate the rights of US citizens under the constitution, as they might apply in this situation.

    For example, I brought up the issue of compelled speech, so one example may be a case where another country has forced the extradition of a US citizen for exercising free speech rights that aren't permissible in that country. A couple of examples as it pertains to the Australian law would be: refusing to implement a backdoor, and creating a canary.

    Or, do you feel that this Australian law is such that the free speech rights established by Bernstein v. United States might be able to be subverted?

    I'm asking this as someone who has never visited Australia and has no dealings there. Obviously if you have operations within Australia's jurisdiction then it's a different story.
    In conversation Tuesday, 26-Mar-2019 02:19:28 UTC from social.mikegerwitz.com permalink
  10. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Monday, 25-Mar-2019 16:44:48 UTC Mike Gerwitz Mike Gerwitz
    As an errata of sorts to my #LibrePlanet2019 talk---I think I said "GNU/Linux running on the proprietary Windows kernel", when Linux isn't involved---it's GNU/kWindows. Microsoft wrote a compatibility layer that translates Linux syscalls, so programs compiled _for_ GNU/Linux run atop of the Windows kernel. See https://mikegerwitz.com/2016/04/gnu-kwindows for more information.

    I also forgot to mention for the 2FA password manager example that storing long-term secrets using asymmetric ciphers isn't a good idea; you should use symmetric keys for that. Fortunately, pass{words,phrases} (as I demonstrated in the talk) aren't long-term secrets---they're easily changed. But you can easily do _both_ asymmetric for 2FA with a smartcard and symmetric by adding another GPG invocation to the pipeline.

    More to come (including repository of the source code for the slides, as well as notes) within the next day or so. Slides are at https://mikegerwitz.com/talks/cs4m.pdf. Thanks to all those who attended and watched online. Feedback/criticism welcome. I simplified my talk a lot in case the audience wasn't technical but I also didn't want to simplify it too much in case the audience was full of hackers. The intent was to just provide some exposure to the concepts for further research by attendees.
    In conversation Monday, 25-Mar-2019 16:44:48 UTC from social.mikegerwitz.com permalink

    Attachments



  11. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Saturday, 23-Mar-2019 23:21:16 UTC Mike Gerwitz Mike Gerwitz
    Congratulations to Deb Nicholson and Open Street Map as recipients of the free software awards!
    In conversation Saturday, 23-Mar-2019 23:21:16 UTC from social.mikegerwitz.com permalink
  12. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Saturday, 23-Mar-2019 11:50:55 UTC Mike Gerwitz Mike Gerwitz
    Since I'm on hotel Wifi, a reminder to travelers: consider using a VPN or Tor. I use the latter, both for my web browsing and for SSH to my home server, for privacy reasons.

    It's not just about data collection on guests by the hotel or network operator---some networks, like my hotel, aren't even encrypted, so any non-encrypted traffic can be sniffed. There's a lot of metadata that can be sniffed even from encrypted connections, including domains that you're accessing, and traffic analysis can get a pretty good idea of what it is you're looking at depending on the sites you're visiting. So any guest or anyone else within range (or any users of long-range antennas, even) could sniff data from guest connections.

    Be safe!

    #LibrePlanet2019 #privacy
    In conversation Saturday, 23-Mar-2019 11:50:55 UTC from social.mikegerwitz.com permalink
  13. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Saturday, 09-Mar-2019 02:01:33 UTC Mike Gerwitz Mike Gerwitz
    This is interesting, and I'll be curious to see it presented:

    "From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic"

    https://social.mikegerwitz.com/url/72535

    I used to stare at the little hole in the tops of the HDD enclosures when I was younger and wonder how slight of pressure variances could be detected by the hardware, wondering how loud I'd have to scream at it (or if I'd have to put my lips on it and hum) to have a detectable level of vibration. I guess that answers my question.

    The bottom of the article links to a video of prior research on the topic, but I don't have the time to look at it right now.
    In conversation Saturday, 09-Mar-2019 02:01:33 UTC from social.mikegerwitz.com permalink

    Attachments


  14. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Tuesday, 05-Mar-2019 03:26:47 UTC Mike Gerwitz Mike Gerwitz
    in reply to
    • Christine Lemmer-Webber
    My sons and I also enjoy using Minetest for 3d home modelling, though it's a bit less precise. ;)

    But I agree with Sweet Home 3D! I used it with my wife for some remodelling ideas when we first bought our home (...and sadly one that we almost bought but lost the bid on).
    In conversation Tuesday, 05-Mar-2019 03:26:47 UTC from social.mikegerwitz.com permalink
  15. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Tuesday, 05-Mar-2019 02:48:51 UTC Mike Gerwitz Mike Gerwitz
    ACLU: "Student Surveillance Versus Gun Control: The School Safety Discussion We Aren’t Having"

    https://social.mikegerwitz.com/url/72405
    In conversation Tuesday, 05-Mar-2019 02:48:51 UTC from social.mikegerwitz.com permalink

    Attachments


  16. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Thursday, 28-Feb-2019 03:53:58 UTC Mike Gerwitz Mike Gerwitz
    "It’s Time to Make Sure Our Kids Are No Longer Bound, Shackled, or Locked Away When They’re at School"

    https://social.mikegerwitz.com/url/72240

    Issues like these take on a whole new light when you're a parent. In all the things in my life that are important to me, including all of my activism, the only thing that triggers instant, deep, almost irrational emotion is the thought of someone harming one of my children. And that's something I would have never been capable of understanding before becoming a parent.

    I haven't had a chance to review the proposed bill or even the cases that it references.
    In conversation Thursday, 28-Feb-2019 03:53:58 UTC from social.mikegerwitz.com permalink

    Attachments


  17. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Wednesday, 27-Feb-2019 02:52:34 UTC Mike Gerwitz Mike Gerwitz
    "ETS Isn't TLS and You Shouldn't Use It":

    https://www.eff.org/deeplinks/2019/02/ets-isnt-tls-and-you-shouldnt-use-it
    In conversation Wednesday, 27-Feb-2019 02:52:34 UTC from social.mikegerwitz.com permalink
  18. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Friday, 22-Feb-2019 04:02:23 UTC Mike Gerwitz Mike Gerwitz
    Finally received word: #LibrePlanet2019 will once again be held in the Stata Center at MIT in Boston, MA.

    I'm excited to see everyone there, and I'll be speaking. Who here on the fediverse is attending?
    In conversation Friday, 22-Feb-2019 04:02:23 UTC from social.mikegerwitz.com permalink
  19. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Tuesday, 19-Feb-2019 05:17:37 UTC Mike Gerwitz Mike Gerwitz
    in reply to
    • Christine Lemmer-Webber
    @cwebber Good stuff!

    Re: encryption "shelf life": would the URI scheme support multiple encryption?

    Barring weaknesses in the actual ciphers (and the various other ways to undermine encryption), it's unlikely that data encrypted with modern ciphers at sufficient keysizes will ever be able to be decrypted without the key (Bremermann's limit, with the optimal brute-force post-quantum attack against symmetric ciphers being Grover's algorithm, which is mitigated by doubling the keysize).

    So one option to mitigate the compromise of a cipher due to some sort of cryptanalytic attack is to use multiple ciphers, each with different keys.

    Of course, if Alice is communicating an ephemeral symmetric key to Bob using a asymmetrically encrypted channel, the robustness of the symmetric algorithms won't matter much if attacker that can monitor network traffic between Alice or Bob may be able to decrypt that key exhcnage in the future. But that exchange could take place over a more trusted connection that is not available to the public, unlike the e.g. IPFS-stored encrypted messages themselves (though it may still be available to e.g. the NSA/GHCQ/etc). So there is still value in hardening the symmetrically encrypted message as much as Alice and Bob desire based on their threat model.
    In conversation Tuesday, 19-Feb-2019 05:17:37 UTC from social.mikegerwitz.com permalink
  20. Mike Gerwitz (mikegerwitz@social.mikegerwitz.com)'s status on Monday, 18-Feb-2019 06:20:56 UTC Mike Gerwitz Mike Gerwitz
    GHCQ’s “Exceptional Access”, End-To-End Encryption, Decentralization, and Reproducible Builds

    https://mikegerwitz.com/2019/02/ghcq-exceptional-access-e2ee-decentralization-reproducible

    My contribution to the debate to address what I felt was missing from mainstream discussions.
    In conversation Monday, 18-Feb-2019 06:20:56 UTC from social.mikegerwitz.com permalink
  • Before

User actions

    Mike Gerwitz

    Mike Gerwitz

    Buffalo, New York, United States

    https://mikegerwitz.com

    Free software hacker and activist with a focus on privacy and security; GNU maintainer, evaluator, and volunteer. GPG: D6E9 B930 028A 6C38 F43B 2388 FEF6 3574 5E6F 6D05

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          457
          Member since
          4 Aug 2016
          Notices
          77
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • Privacy
          • Source
          • Version
          • Contact

          Bobinas P4G is a social network. It runs on GNU social, version 2.0.1-beta0, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All Bobinas P4G content and data are available under the Creative Commons Attribution 3.0 license.