The Telecom Digest for June 19, 2010
Volume 29 : Issue 165 : "text" Format
Messages in this Issue:
Encrypt the Web with the HTTPS Everywhere Firefox Extension (Monty Solomon)
Re: Encrypt the Web with the HTTPS Everywhere Firefox Extension (David Clayton)
Mobile policing (David Clayton)
====== 28 years of TELECOM Digest -- Founded August 21, 1981 ======
Telecom and VOIP (Voice over Internet Protocol) Digest for the
Internet. All contents here are copyrighted by Patrick Townson and
the individual writers/correspondents. Articles may be used in other
journals or newsgroups, provided the writer's name and the Digest are
included in the fair use quote. By using -any name or email address-
included herein for -any- reason other than responding to an article
herein, you agree to pay a hundred dollars to the recipients of the
Addresses herein are not to be added to any mailing list, nor to be
sold or given away without explicit written consent. Chain letters,
viruses, porn, spam, and miscellaneous junk are definitely unwelcome.
We must fight spam for the same reason we fight crime: not because we
are naive enough to believe that we will ever stamp it out, but because
we do not want the kind of world that results when no one stands
against crime. Geoffrey Welsh
See the bottom of this issue for subscription and archive details
and the name of our lawyer, and other stuff of interest.
Date: Fri, 18 Jun 2010 09:21:22 -0400
From: Monty Solomon <firstname.lastname@example.org>
Subject: Encrypt the Web with the HTTPS Everywhere Firefox Extension
Encrypt the Web with the HTTPS Everywhere Firefox Extension
Technical Analysis by Peter Eckersley
June 17th, 2010
Today EFF and the Tor Project are launching a public beta of a new
Firefox extension called HTTPS Everywhere.
This Firefox extension was inspired by the launch of Google's
encrypted search option. We wanted a way to ensure that every search
our browsers sent was encrypted. At the same time, we were also able
to encrypt most or all of the browser's communications with some
* Google Search
* Twitter and Identi.ca
* EFF and Tor
* Ixquick, DuckDuckGo, Scroogle and other small search engines
* and lots more!
***** Moderator's Note *****
I'd like to have a "Darknet" that my friends and I could use to keep
everything we do under wraps. The problem is that if too many people
switch to encrypted communications, then the NSA will beg Uncle Sam to
revive the "Clipper Chip" or similar "back door" decryption
Date: Sat, 19 Jun 2010 10:24:51 +1000
From: David Clayton <email@example.com>
Subject: Re: Encrypt the Web with the HTTPS Everywhere Firefox Extension
> ***** Moderator's Note *****
> I'd like to have a "Darknet" that my friends and I could use to keep
> everything we do under wraps. The problem is that if too many people
> switch to encrypted communications, then the NSA will beg Uncle Sam to
> revive the "Clipper Chip" or similar "back door" decryption capability.
> Bill Horne
It isn't that difficult for a group to set up point-to-point encrypted VPN
tunnels if you all have the right equipment, and I think that there are
central sites that offer this as well(?) so you each might just need one
secure connection into that.
This sort of thing can make a mess of optimum packet routing for general
Internet traffic, but that might be a small price to pay for massively
increased personal security.
It still takes a lot of CPU power to decrypt data, and with the massive
amounts of Internet traffic it may be theoretically possible but not that
practical - especially if some agency wants to to a general snoop looking
for particular patterns.
The more people that start using encryption the more secure that traffic
will be (at least in the short-term).
Melbourne, Victoria, Australia.
Knowledge is a measure of how many answers you have, intelligence is a
measure of how many questions you have.
Date: Sat, 19 Jun 2010 10:53:36 +1000
From: David Clayton <firstname.lastname@example.org>
Subject: Mobile policing
June 19, 2010
A man has been jailed for 10 months after police matched a mobile phone
image of a hand holding three stolen watches to his fingerprint records.
In less than an hour, the images were enhanced and experts were able to
zoom in on the ridges of the hand and come up with a palm print. Those
details provided a database match with Stephen Taylor, 29, of Stalybridge,
Greater Manchester, who later pleaded guilty to handling the watches,
worth nearly £4000 ($A6800).
TELECOM Digest is an electronic journal devoted mostly to telecom-
munications topics. It is circulated anywhere there is email, in
addition to Usenet, where it appears as the moderated newsgroup
TELECOM Digest is a not-for-profit, mostly non-commercial educational
service offered to the Internet by Bill Horne. All the contents
of the Digest are compilation-copyrighted. You may reprint articles in
some other media on an occasional basis, but please attribute my work
and that of the original author.
The Telecom Digest is moderated by Bill Horne.
Contact information: Bill Horne
43 Deerfield Road
Sharon MA 02067-2301
bill at horne dot net
Subscribe: email@example.com?body=subscribe telecom
Unsubscribe: firstname.lastname@example.org?body=unsubscribe telecom
This Digest is the oldest continuing e-journal about telecomm-
unications on the Internet, having been founded in August, 1981 and
published continuously since then. Our archives are available for
your review/research. We believe we are the oldest e-zine/mailing list
on the internet in any category!
URL information: http://telecom-digest.org
Copyright (C) 2009 TELECOM Digest. All rights reserved.
Our attorney is Bill Levant, of Blue Bell, PA.
Finally, the Digest is funded by gifts from generous readers such as
yourself who provide funding in amounts deemed appropriate. Your help
is important and appreciated. A suggested donation of fifty dollars
per year per reader is considered appropriate. See our address above.
Please make at least a single donation to cover the cost of processing
your name to the mailing list.
All opinions expressed herein are deemed to be those of the
author. Any organizations listed are for identification purposes only
and messages should not be considered any official expression by the
End of The Telecom Digest (3 messages)