2008 Oct 14, 11:14Similar in concept to the Pirate Bay suggestion of encrypting all TCP/IP connections if both server and client support it: "Obfuscated TCP is a transport layer protocol that adds opportunistic
encryption. It's designed to hamper and detect large-scale wiretapping and corruption of TCP traffic on the Internet."
internet tcp encryption security google privacy opensource cryptography network ssl 2008 Oct 13, 2:40Watch out for too good to be true washing services (or free network traffic anonymization): "The laundry would then send out "color coded" special discount tickets, to the effect of "get two loads
for the price of one," etc. The color coding was matched to specific streets and thus when someone brought in their laundry, it was easy to determine the general location from which a city map was
coded. While the laundry was indeed being washed, pressed and dry cleaned, it had one additional cycle -- every garment, sheet, glove, pair of pants, was first sent through an analyzer, located in
the basement, that checked for bomb-making residue." From the comment section of Schneier on Security on this topic: "Yet another example of how inexpensive, reliable home washers and dryers help
terrorists. When will we learn?"
security history laundromat ira terrorism bomb 2008 Aug 26, 3:34Some enjoyable and surreal photos in here featuring Gama-Go gear. "Gama-Go fans gather round, for this is the place to post your Gama-Go fan photos and sightings! ". I like all the pirate kitty flags
in "Greetings from Terschelling".
photo gama-go flickr 2008 Jul 25, 1:52Music that played in a bonus room of the game Skullmonkeys. Cited by Jonathan Coulton as inspiration for the Portal end theme.
video music humor skullmonkeys lil-bonus-room videogame 2008 Jul 11, 1:39Some tracks from Paranoia Agent released by the composer Susumu Hirasawa. That series freaked the hell out of me.
anime music mp3 paranoia-agent susumu-hirasawa 2008 Jul 10, 4:44More on IPETEE w/ some of the politics and commentary. "The Pirate Bay has ambitious plans to bring end-to-end encryption to all network activity..."
article encryption privacy security ip cryptography 2008 Jun 10, 4:52"...we were able to generate hundreds of real DMCA takedown notices for ... nonsense devices including several printers and a (non-NAT) wireless access point."
security bittorrent copyright dmca legal mpaa piracy printer research riaa washington 2008 Apr 9, 12:51"Matt Mason's keynote on The Pirate's Dilemma, his book on how to compete with piracy... Mason discusses why piracy can be an opportunity as well as a threat, how pirates innovate outside of the
marketplace and how legitimate businesses can respond."
video via:boingboing matt-mason piracy economics the-pirates-dilemma 2008 Feb 25, 1:26"In some cases, it may be desirable to invoke another application to handle a custom protocol. To do so, register the existing application as a URL Protocol handler."
msdn reference microsoft uri application-protocol-handler 2008 Jan 2, 4:41Cory Doctorow the always entertaining and informative speaker talks on new business models, DRM, etc. FTA: "Cory Doctorow is an activist, a writer, a blogger, a public speaker, and a technology
person. He speaks about "Digital Rights Management" at LIFT0
video cory-doctorow drm music piracy 2007 Dec 27, 3:54Jack Black on piracy. Another humorous piracy related video on youtube. Who would have thought?
piracy youtube video jack-black humor 2007 Dec 19, 2:49Despair, Inc. makes humorous shirts and posters that parody the office standard inspirational posters. I haven't been in a while and it looks like they have new stuff with more variety.
parody geek wallpaper shopping technology poster office humor 2007 Nov 6, 7:34Humorous TED talk based losely on the topic of 4AM.
humor video ted conspiracy history politics 2007 Oct 3, 2:55Similar to the previous piracy ad parody but this is what the ad would look like if it were technically accurate.
via:felix42 copyright law legal piracy advertising humor video 2007 Oct 3, 2:50Parody of anti-piracy ads you may have seen at the beginning of movies recently.
via:felix42 copyright humor video videos piracy legal law advertising politics ip 2007 Jul 14, 12:15How hackers bugged the largest Greek cell provider and listened to government and military officials.
article ieee cellphone phone conspiracy hack hackers politics privacy security 2007 Apr 8, 9:27This is a search shortcut for Vizicious my delicious heirarchy visualization tool.
shortcut: delicious tool personal tag tagging ontology folksonomy 2007 Feb 6, 2:39The MPAA's suggested curriculum for LA Boy Scouts on 'Respecting Copyright' badge. It doesn't have them learn about copyright which might have been interesting rather things like watch a movie's
credits and think about the people who will be hurt by pira
mpaa copyright humor boy-scouts 2006 Nov 13, 2:12Official docs on the XPath language. XPath allows you to describe pieces of an XML document by navigating and filtering the XML heirarchy via a string that looks like a file system path.
xml xpath w3c reference development programming internet quickreference