Morning notes

Seems like I get a heck of a lot of traffic to my article on spyware from folks looking for ways to run kazaa or other file sharing services without the ads, or without the tracking. Could it be that you’re actually getting sick of all the intrusiveness? Or are you just worried that someone’s going to use the ad-tracking to track you down for all of your illegal MP3’s? Here’s an idea, quit using it and uninstall all of the BS that came with it! Not that I’m a fan of the record companies, far from it, but you knew what you were getting into when you downloaded Kazaa or Morpheus, or at least you should have before you decided to download it. You were getting into spyware, you were getting into downloading files from complete, anonymous strangers, and giving access to your PC to those same strangers. You were getting into an activity that the courts have already found to be illegal, and now you run around surprised that it turned out be such a dangerous activity and want to continue doing it while at the same time protecting your privacy and security? It doesn’t work that way.

OK enough lecturing. Doc, who I am so hoping I get to see at GnomeDex, is pointing to a new blog by Matthew Tanase called The Security Blog. Looks like it’ll have lots of good pointers to computer and network security news. Always a good thing to keep an eye on.

Brian Carnell on Dave Winer’s “stink” bomb. Brian’s calling out Dave about his exclusive deal to syndicate the New York Times headlines using only Radio. It’s the same vendor lock-in that Dave is always screaming at other companies for! Notice, though, in the replies, how long it took for other people to find a work around for it? There are too many smart people in this community to get away with stuff like that.

Cory has a scary look at how the Church of Scientology is using the DMCA to keep Google from linking to their critics. I hope there is a special place in hell for both the people who came up with the DMCA and the people who use it to silence others.

Similar Posts

  • |

    Linked: Twitter transgression proves why its flawed 2FA system is such a privacy trap

    This is such a bad look for Twitter: “The site said it may have inadvertently used email addresses and phone numbers provided for 2FA and other security purposes to match users to marketing lists provided by advertisers. ” Privacy and security advocates have enough of a hill to climb to get people to implement something…

  • |

    Ning Closing Free Networks: Blow to Anonymity

    I’m sure many of you have seen the announcement that Ning will be closing down the free side of their social network platform. The news hit me personally, as I have been using Ning to host a social network for child abuse survivors. One of the biggest reasons I choose that platform, as opposed to…

  • One other experiment

    One other experiment I’ve had in mind recently is tied into something that’s not been working correctly anyway. I just sent this email to the folks who had been getting posts by email: As I’ve mentioned before, something seems to have gone terribly awrywith the topica list in terms of getting emails when I post…

  • |

    What I’m Sharing (weekly)

    Google Has a Plan to Disrupt the College Degree?This is pretty interesting, could work, if we can get orgs to see it as “qualified”. Would open a ton of doors.
    Toward a Zoom agreement?”The purpose of a meeting is not to fill the allocated slot on the Google calendar invite. The purpose is to communicate an idea and the emotions that go with it, and to find out what’s missing via engaged conversation. If we can’t do that, let’s not meet.”
    Report: AI Company Leaks Over 2.5M Medical Records
    The Intersection of E-Discovery and Cybersecurity: You’ve Come a Long Way, Baby
    Think You Don’t Need to Preserve Slack Data for Discovery? Think Again
    There is No Such Thing as a Free Lunch in Legal Tech
    Non-Lawyer Ownership Doesn’t Guarantee More A2J?The $$ barrier to entry for someone to even be a lawyer guarantees legal services will always be expensive. #A2J will require systemic changes.
    5 Best Password Managers of 2020
    Surveys Show Technology Is The Key To Law Firm Success During COVID-19 And Beyond
    Minimize The Risk of Data Loss From Departing Employees With These Simple Checklists

  • Shared Links (weekly) Nov. 3, 2024

    For more like this, subscribe to the newsletter and get these links and more in your email.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Find out more about Webmentions.)