[mp3]http://podcast.bogosity.tv/mp3s/BogosityPodcast-2015-09-21.mp3[/mp3]
Co-host: Chris Hangartner
News of the Bogus:
- 0:30 - First Library To Support Tor Anonymous Internet Browsing Effort Stops After DHS Email https://www.techdirt.com/articles/20150910/13090332217/first-library-to-support-tor-anonymous-internet-browsing-effort-stops-after-dhs-email.shtml
- New Hampshire Library Rejects DHS Fearmongering, Turns Tor Back On https://www.techdirt.com/articles/20150915/23161932266/new-hampshire-library-rejects-dhs-fearmongering-turns-tor-back.shtml
- 9:53 - The FCC Imposes Netflix's Broadband Policy http://www.wsj.com/articles/the-fcc-imposes-netflixs-broadband-policy-1441149876
- 18:47 - U.S. Drops Charges That Professor Shared Technology With China http://www.nytimes.com/2015/09/12/us/politics/us-drops-charges-that-professor-shared-technology-with-china.html
24:59 -
Biggest Bogon Emitter: GCHQ http://www.independent.co.uk/life-style/gadgets-and-tech/news/stop-using-difficulttoguess-passwords-uks-spying-agency-gchq-recommends-10497048.html
34:04 -
Idiot Extraordinaire: Oklahoma Governor Mary Fallin (nominated by Travis Retriever) https://theintercept.com/2015/09/15/richard-glossip-set-to-die/
- Richard Glossip Stay Of Execution Dismissed http://news.sky.com/story/1553236/richard-glossip-stay-of-execution-dismissed
- Richard Glossip Execution Is Halted by Oklahoma Court http://www.nytimes.com/2015/09/17/us/richard-glossip-execution-oklahoma.html
This Week's Quote: "The day is coming when we will be certain beyond a shadow of a doubt that we've executed an innocent person. On that day, we're all murderers." —Penn Jillette
I started using TOR when my ISP (which happens to be Sympatico, the DSL service of Bell Canada) decided they were going to start tracking the surfing habits of their subscribers (both smartphone and DSL) to sell ad REPLACEMENTS to advertisers. That is, they would intercept downloads of web pages with ads on them, remove the ads and replace them with other ads they get paid to insert. Not only does this unacceptably accumulate information about my surfing habits with my ISP, it screws over those very sites I surf by depriving them of their own ad revenue. I don't allow certain types of ads (such as blocking many forms of popup ads in my browser settings) to be displayed, but I'm not interested in screwing over the providers of the content I view by them not getting the revenue for non-intrusive ads.
Quote from: evensgrey on September 21, 2015, 09:31:55 AM
I started using TOR when my ISP (which happens to be Sympatico, the DSL service of Bell Canada) decided they were going to start tracking the surfing habits of their subscribers (both smartphone and DSL) to sell ad REPLACEMENTS to advertisers. That is, they would intercept downloads of web pages with ads on them, remove the ads and replace them with other ads they get paid to insert.
Not only is that despicable on the face of it, it's Lenovo doing that with HTTPS web pages that broke the entire security model on their computers.
Quote from: MrBogosity on September 22, 2015, 06:48:38 AM
Not only is that despicable on the face of it, it's Lenovo doing that with HTTPS web pages that broke the entire security model on their computers.
Fortunately, they can't plausibly do that with HTTPS (since being able to do so would mean HTTPS was useless to begin with, which it isn't). However, I object strongly to both their monitoring my surfing and altering the content. Sufficiently so to accept the significant inconvenience of using TOR. (Yes, it is inconvenient: I need to make sure a second app is up and running before I can surf, some sites or features break outright or do something stupid if you try to access them through TOR, and some sites actively block TOR users.) Perhaps I should just bite the bullet and get myself a regular VPN service.
Quote from: evensgrey on September 23, 2015, 11:54:41 AM
Fortunately, they can't plausibly do that with HTTPS (since being able to do so would mean HTTPS was useless to begin with, which it isn't).
Oh, they can. All they need to do is run a proxy server and serve their own root certs. That's how Superfish worked.