What's new
  • ICMag with help from Landrace Warden and The Vault is running a NEW contest in November! You can check it here. Prizes are seeds & forum premium access. Come join in!

The IP laws to come

Check out this article http://www.blacklistednews.com/news-7536-0-7-7--.html

Now, in it they talk about a program to monitor data sent/received by your IP to limit pirating supposedly. So would it just notice downloads or do you think a visit to IC or other suspicious site would be recorder as well?
Do you think using a proxy would hide the data?

Any advice from more technically savvy individuals than myself is greatly appreciated
 
R

RMCG

Tough to do 'deep packet inspection' on SSL/TLS data.
ISP's could still see that data is flowing from you to a site, but not necessarily whats contained in that data stream.

Digitally signing traffic between client (browser) and (web) server would make sure that tampering has not taken place, but both the browser and the web server would have to support that functionality.

Use SSL proxies, Tor, btguard, etc. depending on what you are doing or where you are going.

PGP encrypt every email.
 

igrowone

Well-known member
Veteran
i've seen talk of this for a while, but all i could see it accomplishing is for most IP traffic to become encrypted
i mean, who would talk over a bugged phone if there's an easy way to get around it(SSL)
and the constitutionality of this seems pretty sketchy at best
 
R

RMCG

i've seen talk of this for a while, but all i could see it accomplishing is for most IP traffic to become encrypted
i mean, who would talk over a bugged phone if there's an easy way to get around it(SSL)
and the constitutionality of this seems pretty sketchy at best

Agreed, but constitutionality only ~sort of~ holds up in the US of A.
 
Thanks for the advice guys. So basically if I use a proxy and say stream a video of some site, my ISP would notice only my connection to the proxy server, right? But if you are say torrenting pirated movies it would get noticed. Correct me if I'm wrong.
 

Hephaestus

Member
Went on a big rambling rant about how one might do it over in http://www.icmag.com/ic/showthread.php?t=155107&page=2

Basics, you run a netbook (linux) fully encrypted, no GUI, ctrlaltdel retasked to initiate a hard drive wipe -to run your webcam, connect it via secure (encrypted) VPN to a remote server (Somewhere like costa rica / switzerland - where LEO has a hell of a time getting a warrant to access). Have the server do all the hard work - pipe the video out via secure webpage; can pretty easily have it SMS/email you on motion. Give yourself a self destruct link on that webpage - initiate a hard drive wipe on the server (where everything is stored) and send the same to the netbook...

The encrypted VPN basically makes it impossible for LEO to access your data stream... Talked to a computer security friend - it's possible for them to crack it eventually... But you're going to tie up a lot of supercomputer time in the process... Maybe DEA has those resources... Not LEO though...
 
R

RMCG

Thanks for the advice guys. So basically if I use a proxy and say stream a video of some site, my ISP would notice only my connection to the proxy server, right? But if you are say torrenting pirated movies it would get noticed. Correct me if I'm wrong.

Check out btguard.com for your torrents.

Or switch to newsgroups and pull articles via SSL. (Sabnzbd+ and Astraweb is a great combo)

Offshore VPS server can be used as your personal VPN endpoint.

I would not use Tor for anything other than surfing and IRC.
 
R

RMCG

What about "peer block". they say to use it when dwnlding torrents on a certain site.

that works for now, as long as IP blocks are updated.

If this new thing comes in, it will be implemented by ISP's and it will monitor ALL traffic.
 
I've been using anonymizer software for a few years and have been very happy with it. All of their dedicated proxy servers are in the US, which is kinda troubling though. I had to pay for it but all I have to do is press a button and I'm supposedly invisible lol. Works for now, but the draconian security measures to be implemented for "our safety" might change it.
 
Slow down, don't panic, relax. We all need clarity before calamity, yes? After reading this thread I went in search of the original truth ( I still haven't found concrete documents, just a press release) and have found some comfort at the same time. I guess I feel as though no matter what the outcome, good or bad, there will be an outcome and humanity will not stop there. And in the end it seems that any change at all by meddling hands can forever open Pandora's box. Check out this post concerning the topic. It comes from here;

http://boingboing.net/2009/11/03/secret-copyright-tre.html

Anonymous | #97 | 06:43 on Wed, Nov. 4 | Reply | Report


The internet will route around these laws as per JP Barlow's dictum. “The Internet treats censorship as a malfunction and routes around it.”

I propose that Governments have seen their fate.

The network makes Governments irrelevant.

Irrelevant like the 20th C Record Companies, humanity becomes ever better networked and more like the self regulating meta-organism we truly are - it's in our genes and memes - it is the eschaton of humanity. We can be, en masse, Homeostatic.

The current tax of corruption and graft on our social regulation will become as unnecessary the price fixed CD album.

The network is not merely a technical construct it is the inevitable expression of the truly human impulse, to connect and to share - to communicate.

Democracy requires an informed debate which requires communication unhindered by censorship, copyright or cost.

Internet access is simply the right to communicate and it is a natural and fundemental right.

This is a time of change, change is inevitable.

But these vile secret laws and treaties that sell out freedom to preserve power can make the dark ages drag on, cause misery on an immense scale and hold back the pace of progress, science and democracy.

That we need governmets to protect us from other governments and ourselves is not true on the whole and certainly not at the current cost.

State and Fiat currencies will then go a similar way as transactions costs between people will drop to nearly zero.

And Replicators...









Nice. Anyway, here's what the rhetoric looks like. Taken from here;

http://www.ustr.gov/about-us/press-...or-ron-kirk-announces-plan-move-forward-negot





Washington, D.C. - Today the United States Trade Representative (USTR) announced that the Administration plans to move forward with the negotiation of an Anti-Counterfeiting Trade Agreement (ACTA) to step up the fight against global counterfeiting and piracy.

"The ACTA negotiations provide an opportunity to toughen international standards for the enforcement of intellectual property rights, making it harder for counterfeit and pirated products to enter our country, and making the world safer for the innovation and creativity that are so critical to the U.S. economy," said United States Trade Representative Ron Kirk. "As we proceed with these negotiations, we will ensure that the public is kept well informed and has further opportunities to give input."

The Obama Administration has been conducting an overall review of current and pending trade agreements, including the ACTA. Ambassador Kirk emphasized that ACTA remains an important part of the U.S. trade agenda and, accordingly, the United States is ready to continue negotiations. In keeping with President Obama's transparency goals, USTR will continue its efforts to ensure that the public is well-informed about the negotiations. In addition to the April 6 release of a detailed summary of issues under negotiation, USTR has established a dedicated ACTA page on the USTR website. Also, USTR will maintain our "open-door" policy toward all stakeholders, and will hold "town hall" meetings to engage with members of the public.

The participants in the ACTA negotiations will next meet in Morocco in July to continue their discussions with a goal of reaching an agreement in 2010. Today's announcement underscores the participants' goal of combating global infringements of intellectual property rights (IPR), particularly in the context of counterfeiting and piracy, by increasing international cooperation, strengthening the framework of practices that contribute to effective enforcement, and strengthening relevant IPR enforcement measures themselves.

BACKGROUND

Negotiations on the ACTA began in June 2008. The objective of the ACTA negotiations is to create a new, state-of-the art agreement to combat counterfeiting and piracy. The United States has been working with several trading partners, including Australia, Canada, the European Union and its 27 member states, Japan, Mexico, Morocco, New Zealand, Singapore, South Korea, and Switzerland, to negotiate the agreement. When it is finalized, the ACTA is intended to assist in the efforts of governments around the world to combat more effectively the proliferation of counterfeit and pirated goods, which undermines legitimate trade and the sustainable development of the world economy, and in some cases contributes to organized crime and exposes American consumers to dangerous fake products.

The U.S. approach to the legal framework provisions of ACTA has been to view the IPR enforcement provisions of recent U.S. free trade agreements as a model. Members of the public with questions about the status of the negotiations should contact Kira Alvarez, Chief Negotiator and Deputy Assistant U.S. Trade Representative for Intellectual Property Enforcement at (202) 395-4510.




In closing it seems that the people don't like this the world over. This gives me hope and that's a good thing.
 

Nigel

Member
Very Cool

Very Cool

I like to stay on-top of these type issues. And since I know dick about computers, It's great to have some smoker buddies who do ! :smoke out: +rep
 

Latest posts

Latest posts

Top