Why this blog?
Until this moment I have been forced to listen while media and politicians alike have told me "what Canadians think". In all that time they never once asked.
This is just the voice of an ordinary Canadian yelling back at the radio -
"You don't speak for me."
email Kate
Goes to a private
mailserver in Europe.
I can't answer or use every tip, but all are appreciated!
Katewerk Art
Support SDA
Paypal:
Etransfers:
katewerk(at)sasktel.net
Not a registered charity.
I cannot issue tax receipts
Favourites/Resources
Instapundit
The Federalist
Powerline Blog
Babylon Bee
American Thinker
Legal Insurrection
Mark Steyn
American Greatness
Google Newspaper Archive
Pipeline Online
David Thompson
Podcasts
Steve Bannon's War Room
Scott Adams
Dark Horse
Michael Malice
Timcast
@Social
@Andy Ngo
@Cernovich
@Jack Posobeic
@IanMilesCheong
@AlinaChan
@YuriDeigin
@GlenGreenwald
@MattTaibbi
Support Our Advertisers

Sweetwater

Don't Run

Polar Bear Evolution

Email the Author
Wind Rain Temp
Seismic Map
What They Say About SDA
"Smalldeadanimals doesn't speak for the people of Saskatchewan" - Former Sask Premier Lorne Calvert
"I got so much traffic after your post my web host asked me to buy a larger traffic allowance." - Dr.Ross McKitrick
Holy hell, woman. When you send someone traffic, you send someone TRAFFIC.My hosting provider thought I was being DDoSed. - Sean McCormick
"The New York Times link to me yesterday [...] generated one-fifth of the traffic I normally get from a link from Small Dead Animals." - Kathy Shaidle
"You may be a nasty right winger, but you're not nasty all the time!" - Warren Kinsella
"Go back to collecting your welfare livelihood." - Michael E. Zilkowsky
The internet is deliberately designed to allow this sort of rerouting, in case a router goes down. It isn’t a dedicated telephone route. Roguery is bound to happen
This is why anything on the internet is public domain – because you don’t know where and how the your traffic was routed.
If you want to keep your data private, do not send it on the internet. Any research center or other institution which want to keep their lab data/plans, etc. private should have an internal network NOT connected to the internet.
“Any research center or other institution which want to keep their lab data/plans, etc. private should have an internal network NOT connected to the internet.”
Which is why, of course, any leak in the manner of a Snowden or Wikileaks first has to be physically stolen to be placed on the web.
It was inevitable that as the internet spread world wide it would become the primary vehicle for information and commerce. Our entire way of life now hangs on the presumption that all we take for granted is not under threat, and that there will be no black hole to swallow or destroy everything on the information highway. Can you even begin to imagine the panic if our virtual stock market, banking system, defense system,electric grid,phones and you name it, all crashed at the same time? One EMP could do it or one super hacker group instead of siphoning, concentrated on destroying. Our backups to computers are other computers and no alternatives. Seems to me that all our eggs are in one basket with a very questionable bottom. Reminds me of when 1999 turned to 2000. Everyone was sure it would all be OK but I was being paid triple time to stay home and be close to the phone, because they weren’t THAT sure. It’s even wilder and more complicated today and I doubt they have made much progress that hackers can’t keep up with. Fun subject.
The problem Robert, is that BGP’s are relatively easy to exploit. Yes, the “internet routes around damage” but hijacking a gate node isn’t the same thing. There are a lot of ways this can be countered, and the decentralized BGP’s are looking like the way to go.
And they want to use the internet for elections.I can’t see anything wrong with that.No Oh No no!
Robert 20 yrs ago I said that very thing to my SIL & nephew, who are IT guys, and my justification was that any board 14-18 yrs old geek could hack the sucker, now this router trick is news to me, but not surpizing:-)))
The “Cloud”.
Where people can safely store files, photo’s, and music.
Right.
In related news: Former FBI official confirms that the FBI can turn on your webcam without turning on the little red light beside it.
http://www.theblaze.com/stories/2013/12/07/the-fbi-can-secretly-activate-an-individuals-webcam-without-the-indicator-light-turning-on/?utm_source=twitter&utm_medium=story&utm_campaign=ShareButtons
So couple that with mass IP hijacking, and you have ugliness.
I believe our period of history will be called something like the Golden Age of Trust, where the assumption of civilized behavior on the part of the masses isn’t terminally stupid or even naive, its the way things are done. The whole Internet is set up on the assumption that all IP servers are trusted.
Now, in another related vein, Western society operates on the basis that if 100 people find your wallet lying on the ground, 90 of them will turn it in, five will take the cash and still turn the rest in, and five will steal it and sell the cards. That’s how we do business.
Why? Christianity. Morality is considered its own reward due entirely to Christianity. Do wrong and sooner or later it will come back to you.
All you Lefties, God-haters and other diverse atheists will want to carefully consider what happens to society when religion is no longer a factor. Why not lie? Why not corrupt the whole Internet and rip off people’s bank accounts? Why not kill anybody who gets in your way?
How does a bank even operate in those conditions? How does anything?
Incidentally I never go to church. Haven’t since I was a teen. I’m just saying you might want to check for a baby before you throw out that bath water. Following your hate is generally not a good way to go.
Getting tougher to do…
Robert of Ottawa, I agree with your comment about having computers around which are never connected to the internet. For my internet connected machines, I have what people have told me are psychotic monitoring programs which will log all IP addresses that hit my machine, often I’ll run Wireshark for days when I’m away to see what’s happening to my systems and I have some personal monitoring programs to further detect what’s happening on my systems. Exchange of information with my non-internet connected network utilizes preferably USB flash drives to transfer files or ftp transfers between my internal network machines. All machines are configured to log all process launches and other system events. Only wired ethernet connections are used for the non-internet connected machines.
Right now the best thing to do is to assume that the internet is insecure and take appropriate precautions. For simple text messages where the content of the message is “meet you on 5N in 5 min” I don’t worry about although this does give any snooper the information that I’m not at home at the time. However, my cell phone is registered under a phony name and I pay cash for phone time so it would take a major undertaking by an attacker to link a cell phone to me personally. For financial transactions, I keep a detailed log of every online transaction I engage in and time times of each portion of the interaction. AFAIK, the BGP attack can’t be used to create a man in the middle type of attack required to bypass secure sockets protection.
Any sensitive communication that one sends over the internet should be encrypted with a robust encryption scheme such as PGP and, if possible, physical exchange of keys between the parties occur. Another very robust encryption scheme is the use of a one time pad (OTP) but, again, this requires the physical exchange of OTP files which should never be sent over the internet. Also, it wouldn’t hurt to run periodic traceroute commands to ensure that ones internet communication doesn’t go through Belarus or Iceland.
Loki, I notice you often have the last word because by the time you finish, there’s not much left to say. Good tips. Good post.
So many governments want your life story. It almost makes you feel relevant (O:)
Too many crooks want your bank account. You need teen fire walls before breakfast.