Category Archives: Internet

Whitehouse.gov Doesn’t Like My Privacy Settings and Has Nothing on Guantanamo

Odd thing: when I go to Whitehouse.gov and allow Flash, the site complains about my privacy settings.

Click for a larger image.
Click for a larger image.

The error message says,

The page did not process successfully because of the following:
• Field 'Email' is invalid
• Field 'Zip Code' is empty

Second odd thing: I wanted the full text of the order postponing trials at Guantanamo, the one that caused the following motion to be filed in Guantanamo,

In order to permit the newly inaugurated President and his administration time to review the military commission process, generally, and the cases currently pending before the military commissions, specifically, the Secretary of Defense has, by order of the President directed the chief prosecutor to seek continuances of 120 days in all pending case.

The Secretary of the Defense issued his order to the Chief Prosecutor in order to provide the administration sufficient time to conduct a review of detainees currently held at Guantanamo Bay, Cuba to evaluate the cases of detainees not approved for release or transfer to determine whether prosecution may be warranted for any offenses those detainees may have committed, and to determine which forum best suits any future prosecution.

But when I search for “Guantanamo” at whitehouse.gov I get … nothing.

Posted in Guantanamo, Internet | 1 Comment

Geekish, But Oh So Cool

Found via BoingBoing, The country's new robots.txt file at kottke.org.

Very geekish, but oh so cool.

Update: An expert writes: “This is actually crap. The old robots file just waved spiders off the text-only versions.”

If so, this may be the first time I misunderestimated the Bush administration.

Posted in Internet | 1 Comment

Debunking Hysteria About Online ‘Predators’

Enhancing Child Safety and Online Technologies is the “Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States.”

To make a very, very, very long story short, what the panel found is exactly what I would have expected: that popular hysteria over online 'predators' is wildly overblown. Plus, age verification technology is of little value — to the extent there is a real problem online, it is that kids are mean to each other (think “recess”).

From the executive summary:

… the risks minors face online are complex and multifaceted and are in most cases not significantly different than those they face offline, and that as they get older, minors themselves contribute to some of the problems. In broad terms, the research to date shows:

  • Sexual predation on minors by adults, both online and offline, remains a concern. Sexual predation in all its forms, including when it involves statutory rape, is an abhorrent crime. Much of the research based on law-enforcement cases involving Internet-related child exploitation predated the rise of social networks. This research found that cases typically involved post-pubescent youth who were aware that they were meeting an adult male for the purpose of engaging in sexual activity. The Task Force notes that more research specifically needs to be done concerning the activities of sex offenders in social network sites and other online environments, and encourages law enforcement to work with researchers to make more data available for this purpose. Youth report sexual solicitation of minors by minors more frequently, but these incidents, too, are understudied, underreported to law enforcement, and not part of most conversations about online safety.
  • Bullying and harassment, most often by peers, are the most frequent threats that minors face, both online and offline.
  • The Internet increases the availability of harmful, problematic and illegal content, but does not always increase minors’ exposure. Unwanted exposure to pornography does occur online, but those most likely to be exposed are those seeking it out, such as older male minors. Most research focuses on adult pornography and violent content, but there are also concerns about other content, including child pornography and the violent, pornographic, and other problematic content that youth themselves generate.
  • The risk profile for the use of different genres of social media depends on the type of risk, common uses by minors, and the psychosocial makeup of minors who use them. Social network sites are not the most common space for solicitation and unwanted exposure to problematic content, but are frequently used in peer-to-peer harassment, most likely because they are broadly adopted by minors and are used primarily to reinforce pre-existing social relations.
  • Minors are not equally at risk online. Those who are most at risk often engage in risky behaviors and have difficulties in other parts of their lives. The psychosocial makeup of and family dynamics surrounding particular minors are better predictors of risk than the use of specific media or technologies.
  • Although much is known about these issues, many areas still require further research. For example, too little is known about the interplay among risks and the role that minors themselves play in contributing to unsafe environments.

There are also some sensible, cautious, suggestions about what can be done — but don't expect a magic bullet.

Posted in Internet | 3 Comments

500 ‘Worst Passwords of All Time’

Amazingly, even my very worst, crummy, seemingly obvious, password that I use for many sites where no money changes hands did not make the list of alleged[*] The Top 500 Worst Passwords of All Time.

I should probably use more special keys; I tend to letter/number combos when it matters.

Many years ago I had a numerical password for a bank account that no longer exists. That number has been very useful worked into things since then.

[* -Why “alleged”? They don't actually say how this list was produced….]

Spotted via BoingBoing

Posted in Internet | 2 Comments

So Much for Safe Browsing (Temporarily)

Via Ed Felton, news of a medium-sized bombshell in Researchers Show How to Forge Site Certificates:

Today at the Chaos Computing Congress, a group of researchers (Alex Sotirov, Marc Stevens, Jake Appelbaum, Arjen Lenstra, Benne de Weger, and David Molnar) announced that they have found a way to forge website certificates that will be accepted as valid by most browsers. This means that they can successfully impersonate any website, even for secure connections.

This is a big deal. But as Ed explains, it is based on an making worse a known weakness in the “MD5 with RSA” hashing algorithm. It can be fixed by having Equifax, which uses this now shown-to-be-insecure hast, replace the hash with something better. And having Equifax (and anyone else using it) revoking all existing certs based on this now vulnerable hash. (Which will cause a new wave of people ignoring security warnings…)

And, as Ed wisely notes,

… this is a sobering reminder that the certification process that underlies web site authentication —- a mechanism we all rely upon daily —- is far from bulletproof.

Posted in Cryptography, Internet | 2 Comments

Seeking Tools for Web Page Design

I am a guy whose idea of a web page design tool has always been stuff like Kompozer, and I've got the homepage to prove it (although, actually, most of that was done by hand back in the day….).

But I was admiring a nice looking web page with good graphics and drop-down boxes the other day, and wondering how they'd done that. A quick look at the codes suggests it was done in iWeb 2.0.4. So I went looking for that.

Turns out, shoulda figured given the i, that's its for Mac, and I'm a PC guy.

I even went so far as to see how you might install a Mac tool on a PC. VMware? OK, been thinking of that to run Ubuntu next to XP. External hard drive? OK, got a few spares acting as paperweights. Bittorent a pirated copy? Forget it.

So … anyone know of a good, ideally free, XP-compatible (or maybe Ubuntu-compatible) web design tool that makes cool pages easily?

Posted in Internet | 5 Comments