“And so, paradoxically, after everything you have read above, with the outrage fresh in your mind, on the day when it feels harder than any other, I hope you will join me in saying: Bravo, Roche. Now let’s do better.” Ben Goldacre highlights the deficiencies of a regulatory system which governs the approval of pharmaceutical drugs.
“WhatsApp notoriously rifles through your address book, scoops up your phone numbers, and uploads them to its servers. This is something Facebook has wanted for some time since its own phone records are incomplete.” Andrew Orlowski is convinced that what Facebook actually bought are your contact’s phone numbers.
“Basically, iCloud is appallingly insecure, and Apple has just dramatically increased the volume of information that’s about to start flowing through it—names, email addresses, home addresses, and phone numbers in droves, not to mention your doctor’s visits.” Molly Wood does not regard Apple’s iCloud a safe place for her data.
“And whoever tells you that they have nothing to hide simply haven’t thought about this long enough. ‘Cause we have this thing called privacy. And if you really think that you have nothing to hide, please make sure that’s the first thing you tell me because then I know, that I should not trust you with any secrets because obviously, you can’t keep a secret [sic]”
The screen command allows you to detach a running process from a session and then reattach it at a later time. Its use is simple:
user@debian:~$ screen yourlinuxcommand
Now that yourlinuxcommand is executing, press Ctrl+A followed by D to detach the screen.
Obtain a list of all the running screen processes:
user@debian:~$ screen -ls
There is a screen on:
18470.pts-0.server(02/03/14 10:03:43) (Detached)
1 Socket in /var/run/screen/S-user.
Note the screen id in the above output. Use the screen id to reattach the session at anytime:
user@debian:~$ $ screen -r 18470.pts-0.server
“I would suggest that it is more useful to take a holistic democratic accounting of lawful access laws and their implications. Where such laws are prospectively damaging to the fabric of the democracy, perhaps by threatening rights of free speech, association, and limitations of governmental search powers, then those are the areas that we as citizens, journalists, and commentators must focus our attention. Such democratic narrative can be supported by technological and legal facts and opinions, but critically the basic narrative is not on corporate products, whiz-bang technologies, nor legal minutia, but the very principles of a democracy.” Christopher Parsons in 2012, more than one year before Edward Snowden, is right on the money pinpointing the implications of unrestrained government surveillance.
“I think there is an equally diffuse malaise today—waiting for a new kind of journalism to bring it into focus. Like with McClure’s it won’t be just a catalogue of shocking facts—it will be an imaginative leap that pulls all the scandals together and shows how they are part of some new system of power that we don’t fully comprehend.” Adam Curtis attempts to define the point at which journalism fails and modern power begins.
“Our choice isn’t between a digital world where the agency can eavesdrop and one where it cannot; our choice is between a digital world that is vulnerable to any attacker and one that is secure for all users.” Bruce Schneier regards ubiquitous surveillance as a quixotic undertaking that does nothing to keep us safe and does everything to undermine the very societies we seek to protect.
“The rich are not merely different: they’ve become a cult which drafts us as members. We are invited to deceive ourselves into believing we are playing for the same stakes while worshipping the same ideals, a process labelled ‘aspiration’.” Priyamvada Gopal does not regard vast economic inequalities as either natural or just.
This page is gradually evolving into a showcase of cycling creativity. I am seriously considering a contribution of my own. 18 days left to add your bike…
“At any given moment, more than half a million people are in the air. What happens when one of them gets seriously ill—or even dies—mid-flight?” Emma Brockes reports on why no one ever actually dies on an aircraft. Interesting comments.
“We now face the greatest threat to our liberties since the second world war. We are sleepwalking into despotism. Because of the amount of material that is being collected, because these databases, which are not about tiny items of information, will be used and not just by governments. Snowden was working for a corporation. They will be accessed by others in government and because, that’s most important of all, people will start to self-censor. We will find that the very fact of the total surveillance of our activities means that we are going to sort of … it’s not a question, as the foreign minister said, of ‘if you haven’t done anything wrong you have nothing to fear’. [sic] This structure of surveillance will stop us doing things which are right, that we know we should be doing.” Anthony Barnett appearing on yesterday’s Newsnight programme.
“The RockYou dump was a watershed moment, but it turned out to be only the start of what’s become a much larger cracking phenomenon. By putting 14 million of the most common passwords into the public domain, it allowed people attacking cryptographically protected password leaks to almost instantaneously crack the weakest passwords. That made it possible to devote more resources to cracking the stronger ones.” Dan Goodin details the many reasons you should choose your passwords even more carefully.
“The NSA has turned the fabric of the internet into a vast surveillance platform, but they are not magical. They’re limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible.” Bruce Schneier works on the assumption that the NSA is able to decrypt most of the Internet.
On the same subject, David Meyer felt compelled to pen an open letter titled ‘Dear stupid, stupid NSA’.