Podcast for 21 September 2015

Started by MrBogosity, September 20, 2015, 06:00:00 PM

Previous topic - Next topic
[mp3]http://podcast.bogosity.tv/mp3s/BogosityPodcast-2015-09-21.mp3[/mp3]


Co-host: Chris Hangartner

News of the Bogus:
24:59 - Biggest Bogon Emitter: GCHQ http://www.independent.co.uk/life-style/gadgets-and-tech/news/stop-using-difficulttoguess-passwords-uks-spying-agency-gchq-recommends-10497048.html

34:04 - Idiot Extraordinaire: Oklahoma Governor Mary Fallin (nominated by Travis Retriever) https://theintercept.com/2015/09/15/richard-glossip-set-to-die/
This Week's Quote: "The day is coming when we will be certain beyond a shadow of a doubt that we've executed an innocent person. On that day, we're all murderers." —Penn Jillette

I started using TOR when my ISP (which happens to be Sympatico, the DSL service of Bell Canada) decided they were going to start tracking the surfing habits of their subscribers (both smartphone and DSL) to sell ad REPLACEMENTS to advertisers.  That is, they would intercept downloads of web pages with ads on them, remove the ads and replace them with other ads they get paid to insert.  Not only does this unacceptably accumulate information about my surfing habits with my ISP, it screws over those very sites I surf by depriving them of their own ad revenue.  I don't allow certain types of ads (such as blocking many forms of popup ads in my browser settings) to be displayed, but I'm not interested in screwing over the providers of the content I view by them not getting the revenue for non-intrusive ads.

Quote from: evensgrey on September 21, 2015, 09:31:55 AM
I started using TOR when my ISP (which happens to be Sympatico, the DSL service of Bell Canada) decided they were going to start tracking the surfing habits of their subscribers (both smartphone and DSL) to sell ad REPLACEMENTS to advertisers.  That is, they would intercept downloads of web pages with ads on them, remove the ads and replace them with other ads they get paid to insert.

Not only is that despicable on the face of it, it's Lenovo doing that with HTTPS web pages that broke the entire security model on their computers.

Quote from: MrBogosity on September 22, 2015, 06:48:38 AM
Not only is that despicable on the face of it, it's Lenovo doing that with HTTPS web pages that broke the entire security model on their computers.

Fortunately, they can't plausibly do that with HTTPS (since being able to do so would mean HTTPS was useless to begin with, which it isn't).  However, I object strongly to both their monitoring my surfing and altering the content.  Sufficiently so to accept the significant inconvenience of using TOR.  (Yes, it is inconvenient:  I need to make sure a second app is up and running before I can surf, some sites or features break outright or do something stupid if you try to access them through TOR, and some sites actively block TOR users.)  Perhaps I should just bite the bullet and get myself a regular VPN service.

Quote from: evensgrey on September 23, 2015, 11:54:41 AM
Fortunately, they can't plausibly do that with HTTPS (since being able to do so would mean HTTPS was useless to begin with, which it isn't).

Oh, they can. All they need to do is run a proxy server and serve their own root certs. That's how Superfish worked.