Moxie Marlinspike

I’ve written many times about the need to make email encryption accessible to Aunt Millie (see here, here, and here for example). Sadly, it’s a really hard problem. Now, maybe there’s some hope. The Wall Street Journal has an interesting story about Moxie Marlinspike, who, the WSJ says, is terrifying the FBI with software that holds the promise of universal encryption.

Marlinspike is producing encryption software that obviates the need for user key management, the really hard part of building a robust encryption framework. From what I can see, it works pretty much like iMessage to handle the keys and perhaps the messages go to a server to help mitigate leaking too much metadata. The server part doesn’t matter because the encryption is end-to-end and the server never sees message content. Since the servers don’t keep logs, third parties can’t get at the metadata either, at least not directly.

Right now, there are secure phone and text messaging components but an email solution is underway. When that happens, governments are going to have to come clean, admit what they’re doing, and pass laws trying to outlaw the services. It’s not clear that they’ll be able to do that.

Posted in General | Tagged , | Leave a comment

Associating ielm with a Buffer

Another handy tip from Wilfred Hughes:

Posted in General | Tagged , | 1 Comment

The EFF’s Most Important Cases

This is the Electronic Frontier Foundation’s 25 anniversary. ars technica celebrated that anniversary with a nice article on the EFF’s most influential cases from its first 25 years. The takeaway from the article is that the EFF has been fighting to make the Internet a better and safer place for us by resisting corporate attempts to control what content can be published and government attempts to monitor what we do on the Internet even if we’re not doing anything illegal.

I’m a member and urge all of you to become members too. Even if you can’t afford more than $10, send it off to them. They’re fighting the good fight and they’re fighting it for us. They deserve our gratitude and support.

Posted in General | Tagged | Leave a comment

There is No Internet of Things

A useful corollary to There is No Cloud.

In many ways, this is worse. Who knows what all those computers are doing or who they’re phoning home to?

Posted in General | Tagged | Leave a comment

The Emacs C-x 4 Bindings

Marcin Borkowski (mbork) has a very nice review of the【Ctrl+x 4】key bindings. Most of us learned—or at least read about—those when we started with Emacs but probably forgot about them because they were too esoteric for us then. That’s where his post is useful: it’s an excellent reminder of those key bindings and the functionality they provide.

For example, did you know, or remember, that 【Ctrl+x 4 c】 provides a clone of the current buffer in another window? Or even that 【Ctrl+x 4 f】 opens a new file in the other window? There are others as well so unless you’re up to speed with the 【Ctrl+x 4】 key bindings, head on over to mbork’s post and take a look.

UPDATE: Borkowski’s server appears to be having problems. Neither the above link nor those of previous posts about him are working.

UPDATE 2: MaikuMori comments that you can see the post here.

UPDATE 3: Looks like Borkowski’s site is back up.

Posted in General | Tagged | 5 Comments

Magit 2.1.0 Summary

Over at LWN.net, Nathan Willis has a nice summary of the Magit 2.1.0 features. Obviously he doesn’t cover all the features or even all the new features but it’s worth reading for getting an idea what’s in the latest release.

If you haven’t yet tried Magit, give Willis’ post a read and load Magit from Melpa. In the unlikely event that you don’t like it all you have to do is unload it. You won’t have to do any configuration to try it out so you can load it for a trial very easily and cheaply.

Posted in General | Tagged , | 2 Comments

Basic Org Tutorial

Over at the Worg site, David O’Toole has a nice tutorial on the basics of Org mode. It covers only the outlining and TODO features but there’s still some meat there for the more experienced Org user. For example, I learned about the org-log-done variable and the log display from the agenda. Take a look at O’Toole’s tutorial for the details.

If you’ve been following my adventures in setting up a personal information manager around Org and wanted to get in on the fun but don’t really know Org, this tutorial will give you enough information to get you going. Definitely worth a read.

Posted in General | Tagged , | Leave a comment

Seven Emacs Settings

Timothy Pratley lists Seven specialty Emacs settings with big payoffs. These suggestions are “special” in that they aren’t basic settings that every new Emacs user gets around to implementing. Not everyone will want to use all of them. For example, he has a bit of Elisp that saves all the buffers when Emacs loses focus. Pratley explains his use case for this but it’s still not something I’d want.

Others, such as setting chords to run commands are very attractive to me and, in fact, is something I do. You may find some ideas that work for you so it’s definitely worthwhile reading his post.

Posted in General | Tagged | 2 Comments

If You’ve Got Nothing to Hide…

…you’ve got nothing to fear.

For those of you who are as sick as I am of hearing that bit of tendentious nonsense floated by those who want to stick their noses into every aspect of your affairs, Jacques Mattheij has a nice summary post on the past, present, and future of if you’ve got nothing to hide, you’ve got nothing to fear.

Even a moment’s thought exposes it for the absurdity it is. As Mattheij points out, privacy is not the same thing as secrecy. Cory Doctorow notes that what goes on in the toilet is not secret but it sure is private. But Mattheij goes well beyond that obvious fact.

He revisits the example of the Amsterdam Census collecting information about residents’ religion for completely benign reasons and then having it used by the Nazis to hunt down and kill Jews during WWII. Closer to home, we have the example of a huge number (at latest count 21.5 million—7%) of Americans’ most private information being lost by the Office of Personnel Management. Again, data collected for benign reasons end up being used in harmful ways.

It’s time to stop being polite about this. The next time someone tells you you have nothing to fear as long as you’re innocent, laugh in their face and walk away. Nothing else they have to say is likely to be worth listening to either. If that reaction is too strong for you, point them to Mattheij’s post and tell them to come back after they’ve read it.

Posted in General | Tagged | 1 Comment

NSA Bulk Metadata Collection Resumes

This is why you must always resist government overtures to impose surveillance programs: You can never get rid of them. Despite expiration of the enabling legislation, the clear fourth amendment issues, and the lack of any productive results, the FISA court ruled that the NSA could resume collecting it.

The ruling is meant as a stopgap to cover the period before the new law—where the metadata is held by the carriers and requires a warrant to access—takes effect but nonetheless has no statutory authorization. The ruling could be appealed, I suppose, but the issue will be moot before it ever gets heard. Once a surveillance program is in place, the government will resist any efforts to end it. They’ll trot out the usual four horsemen and scare tactics to convince Congress and the citizenry that it’s absolutely necessary and that disaster will result without it.

Posted in General | Tagged | Leave a comment