Now that we’ve [the IETF] decided
pervasive monitoring is an attack, anyone can ask how a proposed protocol
(or change to a protocol) counters that attack. If it doesn’t handle the
attack and there is a way to address the attack, then we will be in a
stronger position arguing the threat could be addressed.
— Sam Hartman
But the [UK] Conservative Party has removed the archive from its public facing website, erasing records of speeches and press releases going back to the year 2000 and up until it was elected in May 2010.
It also struck the record of their past speeches off internet engines including Google, which had been a role model for Cameron and Osborne's "open source politics".
And it erased the official record of their speeches from the Internet Archive, the public record of the net - with an effect as alarming as sending Men in Black to strip history books from a public library and burn them in the car park.
We have known for some time that traffic analysis is more powerful
than content analysis. If I know everything about to whom you
communicate including when, where, with what inter-message latency
and at what length, then I know you. If all I have is the undated,
unaddressed text of your messages, then I am an archaeologist, not
a case officer. The soothing mendacity of proxies for the President
saying "It's only metadata" relies on the ignorance of the listener.
— Dan Geer
reading in full)
to post comments)