Jonkman Microblog
  • Login
Show Navigation
  • Public

    • Public
    • Network
    • Groups
    • Popular
    • People

Notices by शंतनू (shantanoo@gnusocial.in), page 46

  1. शंतनू (shantanoo@gnusocial.in)'s status on Wednesday, 12-Sep-2018 16:40:02 EDT शंतनू शंतनू
    Google’s Inbox app is shutting down in March 2019 https://www.theverge.com/2018/9/12/17848500/google-inbox-shut-down-sunset-snooze-email-march-2019
    In conversation Wednesday, 12-Sep-2018 16:40:02 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Google’s Inbox app is shutting down in March 2019
      from The Verge
      The app’s inevitable sunset is snoozed for six months
  2. शंतनू (shantanoo@gnusocial.in)'s status on Wednesday, 12-Sep-2018 16:39:25 EDT शंतनू शंतनू
    GitHub banned us without notice – Is Microsoft the risk we didn’t consider? https://gnusocial.in/url/27041
    In conversation Wednesday, 12-Sep-2018 16:39:25 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      GitHub banned us without notice — Is Microsoft the risk we didn’t consider?
      from Medium
      Like most SaaS companies, here at ProWritingAid, we do regular risk assessments. In the last week, Microsoft, both directly and indirectly…
  3. शंतनू (shantanoo@gnusocial.in)'s status on Wednesday, 12-Sep-2018 16:34:05 EDT शंतनू शंतनू
    Today, Europe Lost the Internet. Now, We Fight Back https://www.eff.org/deeplinks/2018/09/today-europe-lost-internet-now-we-fight-back
    In conversation Wednesday, 12-Sep-2018 16:34:05 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Today, Europe Lost The Internet. Now, We Fight Back.
      from Electronic Frontier Foundation
      Today, in a vote that split almost every major EU party, Members of the European Parliament adopted every terrible proposal in the new Copyright Directive and rejected every good one, setting the stage for mass, automated surveillance and arbitrary censorship of the internet: text messages like...
  4. शंतनू (shantanoo@gnusocial.in)'s status on Wednesday, 12-Sep-2018 16:19:58 EDT शंतनू शंतनू
    Apple can delete purchased movies from your library without telling you https://theoutline.com/post/6167/apple-can-delete-the-movies-you-purchased-without-telling-you
    In conversation Wednesday, 12-Sep-2018 16:19:58 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Apple can delete purchased movies from your library without telling you
      from The Outline
      Turns out cloud storage is not all it’s cracked up to be.
  5. शंतनू (shantanoo@gnusocial.in)'s status on Sunday, 09-Sep-2018 03:50:00 EDT शंतनू शंतनू
    You can be poor and intelligent and no one will listen to you however if you are rich and dumb, people will listen to you quite easily. #forward
    In conversation Sunday, 09-Sep-2018 03:50:00 EDT from gnusocial.in permalink
  6. शंतनू (shantanoo@gnusocial.in)'s status on Sunday, 09-Sep-2018 02:32:53 EDT शंतनू शंतनू
    When you're a little kid, adults teach you to be scared of strangers because they will probably kidnap, rape, and murder you. When you're an adult and afraid of strangers, they tell you that you have 'social anxiety disorder.' #ShowerThought
    In conversation Sunday, 09-Sep-2018 02:32:53 EDT from gnusocial.in permalink
  7. शंतनू (shantanoo@gnusocial.in)'s status on Friday, 07-Sep-2018 15:33:36 EDT शंतनू शंतनू
    Keybase’s browser extension subverts its encryption https://gnusocial.in/url/26895
    In conversation Friday, 07-Sep-2018 15:33:36 EDT from gnusocial.in permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      Keybase: "Our browser extension subverts our encryption, but why should we care?"
      from Wladimir Palant's notes
      The Keybase browser extension subverts the app's end-to-end encryption. Keybase considers that "an acceptable risk" and not worth fixing.
  8. शंतनू (shantanoo@gnusocial.in)'s status on Friday, 07-Sep-2018 15:30:56 EDT शंतनू शंतनू
    Hospitals to launch their own drug company to fight high prices and shortages https://gnusocial.in/url/26894
    In conversation Friday, 07-Sep-2018 15:30:56 EDT from gnusocial.in permalink
  9. शंतनू (shantanoo@gnusocial.in)'s status on Friday, 07-Sep-2018 15:29:39 EDT शंतनू शंतनू
    PostgreSQL Setting up Streaming Replication walk thru https://www.percona.com/blog/2018/09/07/setting-up-streaming-replication-postgresql/
    In conversation Friday, 07-Sep-2018 15:29:39 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Setting up Streaming Replication in PostgreSQL
      from Percona Database Performance Blog
      Configuring replication between two databases is considered to be a best strategy towards achieving high availability during disasters and provides fault tolerance against unexpected failures. Post…
  10. शंतनू (shantanoo@gnusocial.in)'s status on Tuesday, 04-Sep-2018 22:48:36 EDT शंतनू शंतनू
    MikroTik routers are forwarding owners’ traffic to unknown attackers https://gnusocial.in/url/26804
    In conversation Tuesday, 04-Sep-2018 22:48:36 EDT from gnusocial.in permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      7,500+ MikroTik Routers Are Forwarding Owners’ Traffic to the Attackers, How is Yours?
      from 360 Netlab Blog - Network Security Research Lab at 360
      Overview MikroTik is a Latvian company founded in 1996 to develop routers and wireless ISP systems. MikroTik now provides hardware and software for Internet connectivity in countries around the world. In 1997, MikroTik created the RouterOS software system. In 2002, MikroTik decided to build its own hardware and created the
  11. शंतनू (shantanoo@gnusocial.in)'s status on Tuesday, 04-Sep-2018 13:08:57 EDT शंतनू शंतनू
    CloudFlare wants to power Firefox's DNS lookups https://blog.powerdns.com/2018/09/04/on-firefox-moving-dns-to-a-third-party/
    In conversation Tuesday, 04-Sep-2018 13:08:57 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      On Firefox moving DNS to a third party
      By berthubert from PowerDNS Blog

      DNS lookups occur for every website visited. The processor of DNS requests gets a complete picture of what a household or phone is doing on the internet. In addition, DNS can be used to block sites or to discover if devices are accessing malware or are part of a botnet.

      Recently, we’ve seen Cloudflare (rumoured to be heading to IPO soon) get interested in improving your DNS privacy. Through a collaboration with Mozilla, Cloudflare is offering to move Firefox DNS lookups from the subscriber’s service provider straight onto its own systems. From a variety of blog posts it appears that Mozilla is aiming to make this the new default, although we also hear the decision has not yet been taken and that other organizations beyond Cloudflare may be involved. This new DNS service will be encrypted, using a protocol called DNS over HTTP.

      We are currently living in strange times where companies are willing to offer us services for “free” in return for access to our data. This data can then be used for profiling purposes (targeted advertising) or competitive analysis (market intelligence, for example what kinds of people visit what sites etc). In this way, if you are getting something for free, you frequently aren’t the customer, you are the product.

      In addition, once our data flows through a third party, it is possible for that third party to influence what we see or how well things work: Gmail moving your school newsletter to the never opened ‘Promotional’ tab, Facebook suddenly no longer displaying your updates to users unless you pay up, Outlook.com deciding that most independent email providers should end up in the spam folder.

      At Open-Xchange and PowerDNS, we think further centralization of the internet is a bad thing in and of itself, so we are not happy about the idea of moving DNS to a large, central, third party. Centralization means permissionless innovation becomes harder, when it was this very permissionless innovation that gave us the internet as we know it today.

      We do of course applaud giving users a choice of encrypted DNS providers. Our worry is about the mulled plan to switch users over by default, or asking users to make an uninformed choice to switch to “better, more private DNS”, without make sure consumers know what is going on. Because that ‘OK, Got It’ button will frequently just get clicked.

      Good thing it is encrypted and secure

      Beyond our worries about centralization however there are concrete reasons to think twice before changing the DNS trust model & moving queries to a third party by default.

      What will change?

      When a user wants to visit ‘www.wikipedia.org’, the browser first looks up the IP address for this site. As it stands, by default, the service provider nameserver is consulted for this purpose. The setting for this is hidden in the Cable/DSL/FTTH-modem or phone. In the newly proposed world, the browser would ask Cloudflare for the IP address of ‘www.wikipedia.org’. Cloudflare says it takes your privacy more seriously than telecommunication service providers do because this DNS query will be encrypted, unlike regular DNS. They also promise not to sell your data or engage in user profiling.

      Cloudflare and Mozilla have set out a privacy policy that rules out any form of customer profiling. Their story is that many ISPs are doing user profiling and marketing, and that moving your DNS to Cloudflare is therefore a win for your privacy.

      Interestingly, this claim cannot be true in Europe.The EU GDPR and telecom regulations greatly limit what ISPs could do with the data. Selling it on is absolutely forbidden. Service providers would be risking 4% revenue fines because doing this secretly would be in stark violation of the GDPR, Europe’s privacy regulation.

      In other countries, service providers do indeed study and use their user’s traffic patterns for marketing purposes.

      So given this, under what circumstances would it be ok for Cloudflare (or any other third party) to take over our DNS by default?

      Neutrality

      Cloudflare is a Content Delivery Network (CDN). CDNs serve website content & videos from servers across the globe, so that content is closer to the end-user. As it stands, large scale CDNs like Akamai, Fastly, Google, Level3 and Cloudflare cooperate and coordinate intimately with service providers, to the point of co-locating caches within ISP networks to guarantee rapid delivery of content. When connecting to ‘www.whitehouse.gov’ for example, it is entirely possible to end up on an Akamai server hosted within your own service provider in the city you live in.  Only two companies were then involved in delivering that page to you: your ISP and Akamai. Neither your request, nor the response ever left your own country.

      In the proposed future where Cloudflare does our DNS, all queries go through their networks first before we reach content hosted by them, or their competitors. We can legitimately wonder if Cloudflare will diligently work to protect the interests of its competitors and deliver the best service it can.

      Interestingly enough, as of today, at least for KPN (a national service provider in The Netherlands) and www.whitehouse.gov this is not true: the IP address we mostly get from the KPN servers is 20% closer in terms of latency, and is reached through Internet peering. The IP address we get via Cloudflare is slower and additionally reached through IP transit, which is more expensive for both KPN and Akamai. Cloudflare is therefore slowing down access to an Akamai hosted website, at higher cost for everyone involved. Cloudflare, incidentally, explains that this is because of privacy reasons.

      Any new default DNS provider should commit to working with all its competitors to deliver service that is as good as would have been provided through the service providers’ DNS.

      Blocking

      Any chokepoint of communications is susceptible to government blocking orders and legal procedures. In some countries the government shows up with a (long) list of what domains to block, in other countries this happens only after a series of long-winded lawsuits. In addition, child pornography researchers (& law enforcement organizations) frequently provide lists of domains they think should be blocked, and these often are.  

      Local service providers typically fight attempts to block popular content, since their subscribers don’t like it. Once an international DNS provider is the default for lookups, it can also expect government orders and other legal efforts aimed to get domain names blocked.

      A new default DNS provider should document its policies on how it will deal with lawsuits and government orders commanding it to block traffic, At the very least, blocks should be constrained regionally. It should also document what content they would block out of their own accord.

      Government interception

      Without going all “Snowden” on this subject, many governments grant themselves rights to intercept foreign communications with far less oversight than if they were intercepting national traffic. In other words, citizens of country X enjoy far less privacy protection in country Y. This is not a controversial statement and is explicitly written out in many countries’ interception laws and regulations. But the upshot is that for privacy, it pays to keep DNS within the country where you are a citizen.

      In addition, most countries have legislated that communications service providers can and must break their own contracts, terms and conditions to comply with government interception orders. In other words, even though a company has committed in writing to not share your data with anyone, if the government shows up, they can be forced to do so anyhow.

      It may well be that a third party DNS provider operates under a regime that has an interest in the DNS traffic that gets sent to it from all over the world.

      New centralised DNS providers should document which governments have interception powers over them and be honest about their chances of standing up to such interception.

      Losing control

      DNS is currently under control of your network provider – which could be your employer, your coffee shop or frequently, your (Internet) service provider. Enterprise environments frequently filter DNS for malware related traffic, blocking requests for known harmful domain names. They will also use query logs to spot infected devices. Increasingly, large scale service providers are also offering DNS based malware filtering, especially in the UK.

      When moving DNS to a centralised provider, such local filtering no longer functions. Enterprise Network administrators will also lose visibility into what traverses their network. From the standpoint of the individual employee this may be a great but it is not what the network operator wanted.

      Interestingly enough, DNS over HTTPS has specifically been designed to be hard to block, as the designers envisioned that network operators would attempt to use firewall rules to disable forms of DNS they could not monitor or control.

      When asking users if they should move their DNS to a new provider, they should be reminded they may be losing protection that was previously provided to them by their service provider or employer network administrators.

      Is your service provider actually spying on you?

      If we want to assess the benefit of moving DNS to a third party by default, it is important to know if we are being spied upon in the first place. In some cases and in some countries, this is definitely true. In Russia and China, DNS is routinely intercepted and even changed. Also, some providers replace ‘this domain does not exist’ DNS answers by the IP address of a ‘search page’ with advertisements.

      But in many places, local service providers are bound by stringent rules that forbid any spying or profiling, mostly countries that fall under the European GDPR or GDPR inspired legislation.

      A non-scientific Twitter poll

      It has been reasoned that users are not sophisticated enough to reason about this subject and that the DNS move should happen by default, with an opt-out for those that care. Another idea that has been raised is a startup dialogue that proposes a more secure internet experience and a ‘Got it!’ button. This clearly does not go far enough in educating users about the change they will be authorizing.

      Before moving DNS to a third party, users should be surveyed if they feel their current provider is spying on them or not, and if they think the new third party DNS provider would be an improvement. The outcome will likely be different per region. This survey could then lead to a well-designed, localized, opt-in procedure.

      Summarising

      Having a choice of (encrypted) DNS providers is good. Mozilla is pondering moving DNS resolution to a third party by default, initially Cloudflare. Before doing so, any third party should commit to:

      • Network neutrality: promise to work with competitors to ensure performance for other CDNs does not deteriorate compared to when the service provider DNS was used
      • A policy on blocking: how will the provider deal with government blocking requests or lawsuits demanding that content will be blocked.
      • Warning users the new DNS may not offer safety features they got from the network DNS provider
      • Being clear about the legislations it operates under: which governments could force it into large scale interception?

      Finally, Mozilla should survey its users to find out their attitudes towards moving DNS from their current service provider to Cloudflare. To do so, those users must first be well informed about what such a move would mean. Based on the survey results, an honest consent page can be generated that makes sure users know what they are agreeing to.

      We want to thank Rudolf van der Berg and Remco van Mook for their comments & input for this post. These opinions are ours alone though. 

  12. शंतनू (shantanoo@gnusocial.in)'s status on Saturday, 01-Sep-2018 15:11:04 EDT शंतनू शंतनू
    Rails, still? https://blog.phusion.nl/2018/08/30/rails-still/
    In conversation Saturday, 01-Sep-2018 15:11:04 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Rails… Still?!?!
      from Phusion Blog
      At the Amsterdam Ruby meetup Chris Salzberg has us metaprogramming and PJ Hagerty explores a number of Ruby and Rails frameworks.
  13. शंतनू (shantanoo@gnusocial.in)'s status on Saturday, 01-Sep-2018 15:07:40 EDT शंतनू शंतनू
    Why California's Privacy Law Won't Hurt Facebook or Google https://www.wired.com/story/why-californias-privacy-law-wont-hurt-facebook-or-google/
    In conversation Saturday, 01-Sep-2018 15:07:40 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Why California's Privacy Law Won't Hurt Facebook or Google
      from WIRED
      The California Consumer Privacy Act was heralded as a blow against Big Tech. But the law will primarily constrain smaller actors in the online-ad world.
  14. शंतनू (shantanoo@gnusocial.in)'s status on Monday, 27-Aug-2018 15:48:49 EDT शंतनू शंतनू
    How Facebook, Apple and Microsoft Are Contributing to OpenStreetMap https://theodi.org/article/how-are-facebook-apple-and-microsoft-contributing-to-openstreetmap/
    In conversation Monday, 27-Aug-2018 15:48:49 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      How Facebook, Apple and Microsoft are contributing to an openly licensed map of the world
      By Rebecca Ghani from The ODI
      How Facebook, Apple and Microsoft are contributing to an openly licensed map of the world
  15. शंतनू (shantanoo@gnusocial.in)'s status on Friday, 24-Aug-2018 14:33:02 EDT शंतनू शंतनू
    Home Assistant: Open-source home automation platform running on Python 3 https://www.home-assistant.io/
    In conversation Friday, 24-Aug-2018 14:33:02 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Home Assistant
      from Home Assistant
      Open-source home automation platform running on Python 3. Track and control all devices at home and automate control. Installation in less than a minute.
  16. शंतनू (shantanoo@gnusocial.in)'s status on Friday, 24-Aug-2018 14:14:13 EDT शंतनू शंतनू
    IRC turns thirty http://www.oulu.fi/university/node/54247
    In conversation Friday, 24-Aug-2018 14:14:13 EDT from gnusocial.in permalink

    Attachments

    1. File without filename could not get a thumbnail source.
      Internet chat system IRC turns thirty
      Atte Jauhiainen chatting on IRC at the OTiT Guild Room IRC (Internet Relay Chat) was born at the Department of Information Processing Science of the University of Oulu 30 years ago.&nbs
  17. शंतनू (shantanoo@gnusocial.in)'s status on Friday, 24-Aug-2018 14:11:51 EDT शंतनू शंतनू
    Amazon is paying to tweet nice things about warehouse working conditions https://gnusocial.in/url/26505
    In conversation Friday, 24-Aug-2018 14:11:51 EDT from gnusocial.in permalink

    Attachments

    1. Invalid filename.
      Amazon is paying people to tweet nice things about warehouse working conditions after horror stories of staff peeing in bottles
      from Business Insider Deutschland
      A small army of Amazon employees are tweeting nice things about the working conditions in the company's warehouses. The Twitter accounts have a standardised...
  • After
  • Before
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

Jonkman Microblog is a social network, courtesy of SOBAC Microcomputer Services. It runs on GNU social, version 1.2.0-beta5, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All Jonkman Microblog content and data are available under the Creative Commons Attribution 3.0 license.

Switch to desktop site layout.