Berkeley CSUA MOTD:Entry 38337
Berkeley CSUA MOTD
2019/05/19 [General] UID:1000 Activity:popular

2005/6/28-29 [Computer/SW/Security] UID:38337 Activity:nil
6/28    Sorry for going back in time here, but where I am, it's still Tuesday
        the 28th of June ... anyways, I had a couple of posts about how much
        people trust if people had experience with how
        much anonymizer can protect your information, especially if they are
        subpoenaed to turn over evidence.  Please leave this post up a couple
        of days, cuz I don't get to check the MOTD that many times a day.
        If nobody wants to comment, leave a note to that extent.
        \_ I used to work for a company in the same space. We kept access logs
           for 7 days, mainly to get statistics and bill advertisers. If we
           recieved a subpoena for access logs within 7 days of an event, we
           would turn over those logs (as required). If the request came more
           than 7 days after the event, we had no data to provide. The
           Anonymizer privacy policy states that they will disclose privacy
           information when required by law; however, they also say that
           "Anonymizer does not hold any personal information on our customers
           that could result in compromising their privacy and security", so I
           don't know what they might give up. I seem to recall their policies
           being about the same as ours, but it was a long time ago. -gm
        \_ Screw anonymizer.  Use TOR.
           \_ Is TOR anything like Freenet?  I tried out Freenet a while ago,
              but it was unreliable and slow as hell.  Looks like it's still
              being actively developed, but haven't installed it on my new
              computer.  Does either TOR or Freenet rely on a lot of
              participants?  -- op.
              \_ TOR is a serious mix-network crypto system.  Pretty
                 industrial strength.  Latency is gonna blow, but thats
                 the price.
        \_ Nothing you do online is anonymous, the trick is to make as
           cumbersome as possible for someone to track you.  If you go to
           a random library in another city, avoid cameras, use a public
           terminal and use an anonymizer, your "less likely" to be
           tracked than say logging into your home PC or local Computer Lab
           while using your private e-mail account.  It depends on what
           risks you're wiling to take (cost/ benefit).
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2019/05/19 [General] UID:1000 Activity:popular

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
2011/2/14-4/20 [Computer/SW/Unix] UID:54039 Activity:nil
2/14    You sure soda isn't running windows in disguise?  It would explain the
        \_ hardly, My winbox stays up longer.
        \_ Nobody cares about uptime anymore brother, that's what web2.0 has
           taught us.  Everything is "stateless".
           \_ You;d think gamers would care more about uptime.
2010/8/12-9/7 [Computer/SW/Languages/Perl] UID:53922 Activity:nil
8/12    Ruby coders, do you mostly DIY your stuff or use the ruby libs out
        there?   How is their quality compared to other libs you have used
        for other langs?  Thx.
        \_ I use Ruby for hobby stuff, etc.  I use libraries for system stuff
           (web access, process, etc.) but that's about it.  Perl libraries are
           much better/more complete.  I assume because of the maturity and
2010/2/22-3/12 [Computer/HW] UID:53723 Activity:nil
2/20    There was a failure validating the SSL/TLS certificate for the server
        The reason for the failure was
                          self signed certificate in certificate chain (details)
        We have not verified the identity of your server. If you ignore this certificate validation
        problem and continue, you could end up connecting to an imposter server.
Cache (13 bytes)
References 1.