Xiadani e Xing Xing
Informazioni personali
Cerca nel blog
Translate
sabato 31 agosto 2013
domenica 25 agosto 2013
check out my new article on hakin9
Read Hakin9‘s QR Code Hacking Tutorial and Learn How To Avoid Data Loss | ||
You received this newsletter because you subscribed to autoresponder address list of Hakin9 magazine. If you want to unsubscribe please click the link. Dear Readers, we are pleased to inform you that our new tutorial about QR code hacking has just arrived. You can download it here. In this issue you will find articles such as: QR Code Hacking BASICS Hacking QR Codes By Rishabh Rastogi An information security, risk and governance minded professional who thrives on evaluating technologies and business processes from a critical perspective. Popularly QR Codes have found their application in encoding URLs, visiting cards, addresses and various forms of advertisement data on posters. Along with its great uses, QR codes have also many potential risks due to the vulnerabilities around its design and hence prying threat vectors would always be after exploiting those vulnerabilities. Hence not making a very sweeping statement, but funnily enough every kid on the block has a QR Code scanner and is a potential victim of being hacked. Sim Card Hacking By Carlos Rodriquez Perez Imagine you’re a malware developer, and you are looking for new techniques to spread your malware, you’re tired of thinking and suddenly you have an idea, why not include my trojan in a QR Code? This is the question that many cyberdelinquents ask to themselves, is very easy to pass a trojan by an application for our smatphone, for example an X-Ray Reader (fake of course), once we have read the fraudulent code, the malware disburdens himself and attack, usually the attack consists in a malware that is installed in our smatphone, once installed is dedicated to ilegal activities, such as sending SMS to a payment service that takes advantages of the attacker. THE TECHNIQUES Hijacking QR Codes By David Allen Managing Director at @MobileEngage The QR code system was invented in 1994 by Toyota’s subsidiary, Denso Wave. Its purpose was to track vehicles during manufacturing; it was designed to allow high-speed component scanning. It has since become one of the most popular types of two-dimensional barcodes. Originally designed for industrial uses, QR codes have become common in consumer advertising. Typically, a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form. QR Code A Real Treat Or Not By Antonio Ierano Security Consultant, Evangelist, Speaker, Trainer and Blogger at The Puchi Herald We could easily create a related to a malware infection, convert this URL through a shortened URL service, associate it to a common logo and embed this info in a QRCode. A normal User would check the code through its application and would find a familiar logo to click on; although he would check the URL he would probably see the short version that is anyway not readable. Unless the user is using on its smartphone or tablet a security suite could be easily fooled and redirected anywhere. QR Codes: Convenience or Minefield? By David Nordell CEO of New Global Markets Imagine that you are walking in the street in the town where you live. You need to find a new place to live, and don’t really want to use an estate agent, because they usually lie about the places they have available, and charge a commission too. But you pass a tree with a sheet of paper stapled to the bark, reading “beautiful two-room apartment, lots of light, modern kitchen and bathroom … no agents.” QR Codes – Hacking, cracking and other security considerations. By V. Michael Balas Founder and CEO at VitreoQR, LLC On March 6th of 1992, the world waited for the Michaelangelo Computer Virus to strike hundreds of thousands of computers across the planet. The threat was so great this one computer event received massive and widespread media attention in virtually every industrialized country. Ultimately, the virus did little actual damage but its media coverage frightened the world into a more pro-active position regarding protection from such attacks. The antivirus software industry now had its first truly legitimate example of the need for antivirus software. John McAfee was well on his way to making millions. 6 Ways To Protect Yourself From QR Code Hacking By Nick Lynch Co-Founder of OakReach, a native ad and content marketing platform In today’s fast moving times, getting information and content instantly at our figure tips has become an increasing necessity. Because of this, Quick Response (QR) codes continue to be the biggest driver of print to mobile activations. When scanned, the codes often contain web links that automatically take a user to a website. Over the last few years, the practice of placing this type of matrix barcode on billboards, posters, clothing tags, concert tickets, business cards, TV ads and magazines has become common practice. According to ClickZ.com, QR scans saw an increase of 400% between June 2011 and June 2012. EXTRA Interview with Nick Lynch By Magdalena Gierwatowska Interview with Antonio Ierano By Magdalena Gierwatowska |
Please spread the word about Hakin9. Hakin9 team wish you good reading! Product Manager: krzysztof.samborski@hakin9.org www.hakin9.org/en | New profiles on: |
Related articles
- The dangers of QR codes for security
- Microsoft Tag throws in the towel, QR code beats chest in victory
- Nmap Guide Revisited – Hakin9 Tutorials | Magazine | Hackers about hacking techniques in our IT Security Magazine
check out my new article on hakin9
Read Hakin9‘s QR Code Hacking Tutorial and Learn How To Avoid Data Loss | ||
You received this newsletter because you subscribed to autoresponder address list of Hakin9 magazine. If you want to unsubscribe please click the link. Dear Readers, we are pleased to inform you that our new tutorial about QR code hacking has just arrived. You can download it here. In this issue you will find articles such as: QR Code Hacking BASICS Hacking QR Codes By Rishabh Rastogi An information security, risk and governance minded professional who thrives on evaluating technologies and business processes from a critical perspective. Popularly QR Codes have found their application in encoding URLs, visiting cards, addresses and various forms of advertisement data on posters. Along with its great uses, QR codes have also many potential risks due to the vulnerabilities around its design and hence prying threat vectors would always be after exploiting those vulnerabilities. Hence not making a very sweeping statement, but funnily enough every kid on the block has a QR Code scanner and is a potential victim of being hacked. Sim Card Hacking By Carlos Rodriquez Perez Imagine you’re a malware developer, and you are looking for new techniques to spread your malware, you’re tired of thinking and suddenly you have an idea, why not include my trojan in a QR Code? This is the question that many cyberdelinquents ask to themselves, is very easy to pass a trojan by an application for our smatphone, for example an X-Ray Reader (fake of course), once we have read the fraudulent code, the malware disburdens himself and attack, usually the attack consists in a malware that is installed in our smatphone, once installed is dedicated to ilegal activities, such as sending SMS to a payment service that takes advantages of the attacker. THE TECHNIQUES Hijacking QR Codes By David Allen Managing Director at @MobileEngage The QR code system was invented in 1994 by Toyota’s subsidiary, Denso Wave. Its purpose was to track vehicles during manufacturing; it was designed to allow high-speed component scanning. It has since become one of the most popular types of two-dimensional barcodes. Originally designed for industrial uses, QR codes have become common in consumer advertising. Typically, a smartphone is used as a QR-code scanner, displaying the code and converting it to some useful form. QR Code A Real Treat Or Not By Antonio Ierano Security Consultant, Evangelist, Speaker, Trainer and Blogger at The Puchi Herald We could easily create a related to a malware infection, convert this URL through a shortened URL service, associate it to a common logo and embed this info in a QRCode. A normal User would check the code through its application and would find a familiar logo to click on; although he would check the URL he would probably see the short version that is anyway not readable. Unless the user is using on its smartphone or tablet a security suite could be easily fooled and redirected anywhere. QR Codes: Convenience or Minefield? By David Nordell CEO of New Global Markets Imagine that you are walking in the street in the town where you live. You need to find a new place to live, and don’t really want to use an estate agent, because they usually lie about the places they have available, and charge a commission too. But you pass a tree with a sheet of paper stapled to the bark, reading “beautiful two-room apartment, lots of light, modern kitchen and bathroom … no agents.” QR Codes – Hacking, cracking and other security considerations. By V. Michael Balas Founder and CEO at VitreoQR, LLC On March 6th of 1992, the world waited for the Michaelangelo Computer Virus to strike hundreds of thousands of computers across the planet. The threat was so great this one computer event received massive and widespread media attention in virtually every industrialized country. Ultimately, the virus did little actual damage but its media coverage frightened the world into a more pro-active position regarding protection from such attacks. The antivirus software industry now had its first truly legitimate example of the need for antivirus software. John McAfee was well on his way to making millions. 6 Ways To Protect Yourself From QR Code Hacking By Nick Lynch Co-Founder of OakReach, a native ad and content marketing platform In today’s fast moving times, getting information and content instantly at our figure tips has become an increasing necessity. Because of this, Quick Response (QR) codes continue to be the biggest driver of print to mobile activations. When scanned, the codes often contain web links that automatically take a user to a website. Over the last few years, the practice of placing this type of matrix barcode on billboards, posters, clothing tags, concert tickets, business cards, TV ads and magazines has become common practice. According to ClickZ.com, QR scans saw an increase of 400% between June 2011 and June 2012. EXTRA Interview with Nick Lynch By Magdalena Gierwatowska Interview with Antonio Ierano By Magdalena Gierwatowska |
Please spread the word about Hakin9. Hakin9 team wish you good reading! Product Manager: krzysztof.samborski@hakin9.org www.hakin9.org/en | New profiles on: |
Related articles
- The dangers of QR codes for security
- Microsoft Tag throws in the towel, QR code beats chest in victory
- Nmap Guide Revisited – Hakin9 Tutorials | Magazine | Hackers about hacking techniques in our IT Security Magazine
sabato 24 agosto 2013
Appunti sulla Costituzione Italiana, Art. 4.
l’articolo 4 mi interessa perchè, nella definizione di diritti doveri del cittadino da una ulteriore chiarezza sul significato del termine lavoro.
il primo pezzo enunzia che a tutti i cittadini deve essere consentita la capacità di lavorare e compito della repubblica è promuovere le condizioni necessarie.
La Repubblica riconosce a tutti i cittadini il diritto al lavoro e promuove le condizioni che rendano effettivo questo diritto.
interessante è che ancora una volta si faccia riferimento ai “cittadini” e non genericamente all’umanità. Assieme però al diritto viene definito il relativo dovere:
Ogni cittadino ha il dovere di svolgere, secondo le proprie possibilità e la propria scelta, un’attività o una funzione che concorra al progresso materiale o spirituale della società.
Diventa quindi un obbligo contribuire al progresso della società nelle forme consoni all’individuo. Chi non cerca di concorrere a tale progresso è quindi da considerarsi non confacente al dettato costituzionale, in altre parole fuori legge.
Ora data la genericità della espressione usata si può ritenere che tale contribuzione possa essere economica, ma anche artistica, culturale, politica e via dicendo. E che tale contributo sia di valore anche se non sotto il profilo strettamente economico.
Allora diventa comprensibile legare ai doveri della Repubblica la promozione della cultura, delle arti e delle scienze come componenti portanti,assieme a quello economico, della società e dell’individuo.
una lettura allargata di questo articolo mi porta a fare alcune considerazioni, anche se non vi sono violazioni di articoli di legge specifici ci sono comportamenti comuni che sono, comunque censurabili in termini di senso del dettato costituzionale.
Quando, ad esempio, una azienda italiana decide di esternalizare una produzione stà, in qualche modo, violando tali indicazioni fornite dalla costituzione? Se consideriamo che è di fatto obbligo di tutti i cittadini concorrere in base alle proprie capacità al progresso della società e della Repubblica il sospetto viene. Esiste un obbligo morale, dettato dalla costituzione, che richiede a tutti di operare per il progresso della società nel suo complesso, e tale obbligo dovrebbe essere preso in esame anche in seno a scelte di carattere economico. Il maggior guadagno, o minori spese, non giustifica moralmente l’azione se non assolutamente indispensabile.
Analogamente possiamo ragionare per altri comportamenti che mirino non al bene complessivo dei cittadini della Repubblica ma al soddisfacimento di interessi personali. Il singolo individuo ha un obbligo nei confronti della collettività che supera eventuali vincoli legislativi o contrattuali quando questi contraddicano il dettato costituzionale, non vale, in virtù del secondo lemma dell’articolo 4, la giustificazione del “io eseguivo degli ordini” in quanto i vincoli cui è sottoposta la repubblica sono automaticamente vincoli anche del singolo in funzione delle proprie capacità.
Comportamenti oramai comuni in italia, dal disprezzo della cosa pubblica – res publica- , si pensi alla spazzatura nelle strade, al mancato pagamento delle tasse sono tutti quindi stigmatizzabili a livello di singolo. va da se che è altrettanto stigmatizzabile il comportamento delle istituzioni repubblicane quando non si operano alla rimozione degli ostacoli che possono ingenerare tali comportamenti, dalla educazione civile all’eccessivo carico fiscale.
Appunti sulla Costituzione Italiana, Art. 3.
Articolo 3
Tutti i cittadini hanno pari dignità sociale e sono eguali davanti alla legge, senza distinzione di sesso, di razza, di lingua, di religione, di opinioni politiche, di condizioni personali e sociali.
È compito della Repubblica rimuovere gli ostacoli di ordine economico e sociale, che, limitando di fatto la libertà e la uguaglianza dei cittadini, impediscono il pieno sviluppo della persona umana e l’effettiva partecipazione di tutti i lavoratori all’organizzazione politica, economica e sociale del Paese.
Sono dunque arrivato al terzo articolo della costituzione. Il terzo articolo è di grande importanza perchè, proseguendo il flusso derivante dai primi 2 articoli, enunzia il concetto di egualitarismo tra tutti i soggetti facenti parte della Repubblica.
Se nell’articolo due si fa genericamente riferimento all’uomo, generalizzando ed allargando la platea di riferimento dei diritti a tutta l’umanità e non al singolo membro di uno specifico paese, nell’articolo 3 si specifica chiaramente che l’oggetto del riferimento dell’articolo è i membri della Repubblica.
Tutti i cittadini hanno pari dignità sociale e sono eguali davanti alla legge
il riferimento chiaro è al termine cittadini che va inteso non nel senso di abitanti di una città, ma nel più vasto “membri di una collettività organizzata in stato”. come per il termine lavoro incontrato quindi nel primo articolo occorre dare alla parola una lettura più ampia che la sua apparente traduzione diretta.
Interessante il fatto che si enunci, ancora una volta, il concetto di eguaglianza sociale di tutti i cittadini. questo significa che, come si era già visto all’articolo precedente, sono da considerarsi al di fuori della costituzione discriminazioni in base al censo, natali, ricchezza o via dicendo.
Inoltre viene rimarcato che tutti i cittadini sono uguali davanti alla legge, che quindi è super partes e tratta tutti alla stessa maniera. qualsiasi pretesa di eccezionalità di fronte alla legge quindi è da considerarsi al di fuori del dettato costituzionale.
senza distinzione di sesso, di razza, di lingua, di religione, di opinioni politiche, di condizioni personali e sociali.
e a ulteriore rafforzativo viene esplicitamente espresso l’ambito di uguaglianza sociale e di fromnte alla legge, includendo la incostituzionalità di divisioni arbitrarie.
forte è il richiamo ancora una volta ad una eguaglianza di trattamento, da parte della repubblica, in maniera indipendente dalle condizioni personali e sociali. viene quindi chiaramente espresso che la repubblica non da giudizi morali sull’individuo ma gestisce tutti in maniera egualitaria.
questo vincolo della Repubblica è quindi tradotto in dettatodovere di chi compone la repubblica.
C compito della Repubblica rimuovere gli ostacoli di ordine economico e sociale, che, limitando di fatto la libertà e la uguaglianza dei cittadini, impediscono il pieno sviluppo della persona umana e l’effettiva partecipazione di tutti i lavoratori all’organizzazione politica, economica e sociale del Paese.
quindi tutti, in quanto membri della Repubblica, sono tenuti a rimuovere gli ostacoli che limitino libertà, eguaglianza e partecipazione alla vita del Paese.
Ancora una volta viene usato il termine “lavoratori”, che sembra nei fatti fare riferimento non a chi “ha un lavoro” ma a chi opera, nel complesso delle sue capacità, alla vita della Repubblica.
Il termine lavoro viene poi ulteriormente affrontato nel articolo successivo, dando un ulteriore chiarimento sulla chiave di lettura del termine.
da quello che si deduce dall’articolo 3 appare chiaro che compito della Repubblica, e quindi dei suoi membri e delle sue istituzioni, è quello di permettere in maniera attiva lo sviluppo della persona e di consentire a questa di essere membro attivo della società. Questa necessità di azione è chiaramente esposta nel “ È compito della Repubblica rimuovere gli ostacoli …” non si tratta quindi di passiva accettazione dello status quo o attesa di eventi esterni, ma di doverosa azione volta a permettere lo sviluppo sociale ed economico della persona.
Qualsiasi atteggiamento volto a mantenere tali differenze è quindi da considerarsi in contrasto con lo spirito e la lettera dell’articolo 3.
Le ricadute sono molteplici la tutela del diritto allo studio del diritto di espressione, associazione e lavoro sono quindi doverose e gli ostacoli che si frappongono sono da rimupvere dagli organi e membri della Repubblica.
In questa ottica l’accesso ai mezzi di informazione e comunicazione, dalla telefonia a internet, sono da considerarsi inderogabili per consentire nella società attuale un pieno accesso e fruizione delle possibilità di formazione della persona.
L’articolo 2 e l’articolo 3 rimarcano come la Repubblica debba essere un agente attivo nei confronti di chi la compone per permettere a tutti il raggiungimento della propria completezza personale, sociale ed economica.
Questo obbligo, questo imperativo, ricade su ogni singolo membro della Repubblica, istituzioni, rappresentanti e popolo sovrano. è quindi eticamente deprecabile non operare, in seno alle proprie possibilità, al fine che questi ostacoli siano rimossi.
Si noti che questo significa che non è possibile per nessuno evitare di operare al fine di aiutare il prossimo, dalla omissione di soccorso, al danno economico provocato da un comportamento privo di scrupoli tutto questo può essere stigmatizzato nei confronti di questi due articoli.
venerdì 23 agosto 2013
Appunti sulla Costituzione Italiana, Art. 2.
Art. 2. La Repubblica riconosce e garantisce i diritti inviolabili dell’uomo, sia come singolo, sia nelle formazioni sociali ove si svolge la sua personalità, e richiede l’adempimento dei doveri inderogabili di solidarietà politica, economica e sociale.
il secondo articolo della costituzione inizia in maniera estremamente interessante:
La Repubblica riconosce e garantisce i diritti inviolabili dell’uomo
la prima osservazione è sull’uso del verbo riconoscere. Questo implica che esistano una serie di valori che sono antecedenti o primevi alla costituzione e a questi la costituzione si appoggia. In particolare l’Art. 2. afferma che questi siano i “diritti inviolabili” che la costituzione e quindi la repubblica DEVE riconoscerli e GARANTIRLI.
è compito quindi della Repubblica dotarsi degli strumenti adatti al recepimento di questa istanza. Qualsiasi trattamento che, nei fatti, violi questi diritti è fuori dell’ambito costituzionale e quindi fuori legge.
Si noti che il riferimento all’Uomo, e non al cittadino, rende questa esigenza universale e quindi vera per qualsiasi essere umano. è quindi compito della Repubblica, almeno negli ambiti della sua area di influenza, operarsi per garantire l’adempimento di questa regola senz differenza alcuna tra cittadini membri della repubblica o esseri umani provenienti da paesi diversi, quali essi siano.
.Andando avanti nella lettura leggiamo
sia come singolo, sia nelle formazioni sociali ove si svolge la sua personalità
quindi compito della repubblica è garantire tali diritti sia al singolo sia alle “formazioni sociali”,
il fatto che tali “formazioni sociali” siano inderterminate apre alla discussione di cosa queste siano. Apparentemente potrebbe essere qualsiasi struttura organizzativa che faccia riferimento ad un gruppo di individui. Termini come “famiglia”, “partito”, “movimento” o qualsiasi altra associazione potrebbe entrare nella definizione. Ma anche costrutti meno formali potrebbero essere la base di formazioni sociali, quali i gruppi di utenti internet che si scambiano informazioni e persino coloro che leggono questo blog.
Questa indeterminatezza rende l’articolo 2 particolarmente “flessibile” e libertario, associando ai diritti personali anche la esigenza di garantire i diritti associativi e quindi, ipso facto, anche agli strumenti che ne garantiscono la fruizione. é innegabile che, ad esempio, nel caso dell’accesso alla rete, che questo abbia una valenza in termini di espressione della personalità.
e richiede l’adempimento dei doveri inderogabili di solidarietà politica, economica e sociale
a questo punto l’articolo 2 istituisce un principio che deve sempre essere alla base di qualsiasi interpretazione del dettato costituzionale e della legge: la richiesta dei doveri inderogabili, quindi veso cui non è ammessa alcuna remora o indietreggiamento, di solidarietà non generica ma in 3 ambiti ben precisi Uno politico, uno economico ed uno sociale.
Interessanti sono gli elementi introdotti di soliderietà economica e sociale, la Repubblica non può quindi vessare ne il singolo ne la “formazione sociale” rendendoli incapaci di esercitare una attività economica, un lavoro, attivo ne di negare il diritto di svolgere attività sociale.
Appare ovvio che vi siano delle deroghe a tali esigenze “inderogabili” nel caso di violazione delle leggi della repubblica stessa, o nei casi in cui tali azioni violino il dettato degli articoli costituzionali. Ma viene da chiedersi se privare un cittadino del sostentamento economico per lui o la sua famiglia, ad esempio, a causa di mancati pagamenti da parte dello stato, per citare eventi recenti, o per imposizioni di pene pecuniarie (cartelle esattoriali, multe o via dicendo) che se pur dovute nei fatti impediscano l’esercizio dei diritti fondamentali quali avere una casa e via dicendo.
Non si può non notare come, in apparenza, alcuni comportamenti dello stato siano in contrasto con la lettera e lo spirito dell’articolo 2.
Se la Repubblica richiede inderogabilmente a tutti (e il tutti è determinato dsl fatto che non vi siano riferimenti specifici nell’articolo a chi queste regole siano indirizzate) l’adempimento di doveri di solidarietà appare chiaro come comportamenti egoistici o che si oppongano a questi doveri siano anticostituzionali e quindi da stigmatizzare e reprimere. Ancora più alto, ne consegue, è il vincolo che lega a queste regole chi dal popolo è chiamato a rappresentare e gestire la repubblica, come all’articolo 1 della nostra costituzione.
Uno dei problemi piu grandi relativi all’articolo 2 è la natura di questi diritti inviolabili, la loro definizione è necessaria per definire quali siano gli ambiti operativi della costituzione e quindi della Repubblica. Solitamente si fa riferimento alla dichiarazione dei diritti dell’uomo Dichiarazione universale dei diritti dell’uomo approvata dalle Nazioni Unite il 10 dicembre 1948.
Essendo questi diritti un corpus mobile, legato alla percezione del periodo storico, e non statico la espressione generica dell’articolo 2 consente la incorporazione di nuove esigenze, dal diritto alla casa, al diritto all’accesso ai mezzi di comunicazione internet compresa, al diritto di vivere in un pianeta ecologicamente sano e via dicendo.
Appunti sulla Costituzione Italiana, Art. 1.
Art. 1.
L'Italia e' una Repubblica democratica, fondata sul lavoro.
La sovranita' appartiene al popolo, che la esercita nelle forme e nei limiti della Costituzione.
Visto che si parla tanto di cambio della costituzione, suo ammodernamento e via discorrendo ho pensato che rileggermi gli articoli potrebbe essere sensato. qui di seguito i miei appunti.
Come insegnano a scuola (?) la sua composizione e struttura è la seguente:
La Costituzione è composta da 139 articoli e relativi commi (5 articoli sono stati abrogati: 115; 124; 128; 129; 130), suddivisi in quattro sezioni:
Principi fondamentali (articoli 1-12);
Parte prima: “Diritti e Doveri dei cittadini” (articoli 13-54);
Parte seconda: “Ordinamento della Repubblica” (articoli 55-139);
Disposizioni transitorie e finali (articoli I-XVIII).
Il primo articolo da una serie di indicazioni fondamentali su cosa sia l’Italia e su cosa si basi. alcuni concetti vanno per me analizzati con cura.
L’italia è una:
Repubblica democratica
Quindi viene definita la forma di stato come Repubblica Ovvero una forma di governo caratterizzata dalla elettività e dalla temporaneità delle cariche, oltre che da una limitazione del loro potere.
Il fatto che sia anche democratica indica che tali cariche sono scelte attraverso un processo elettivo che garantisce a ogni cittadino la partecipazione in piena uguaglianza all’esercizio del potere pubblico.
Va appuntato che nei fatti l’Italia è una repubblica parlamentare, e quindi a democrazia indiretta, ove talune cariche istituzionali sono quindi elette non direttamente dal popolo ma da una serie di rappresentanti dal popolo eletto.
interessante è affermazione che sia anche
fondata sul lavoro
Questo sembrerebbe significare che la base elettiva non sia fondata su censo o natali più o meno nobili ma sulle capacità del singolo a contribuire alla società.
I riferimenti nell’articolo 1, comma 1 e nell’articolo 4, comma 2 indicano che il lavoro non è solo un rapporto economico, ma anche un valore sociale che nobilita l’uomo. Non è solo un diritto, bensì anche un dovere che eleva il singolo. Non serve ad identificare una classe ma a definire chi, in funzione delle proprie capacità di contribuzione, partecipa attivamente alla res publica.
Trovo altrettanto interessante che l’articolo poi dica che :
La sovranita’ appartiene al popolo
rimarcando quindi ulteriormente come la forma elettiva sia veicolo di espressione della sovranità popolare e che questa non risieda nelle cariche elettive ma queste ma ne sia espressione. Considerando che la Repubblica è democratica e fondata sul lavoro questo significa che il processo elettivo va esteso al popolo lavoratore nel senso definito in precedenza, ove il lavoro diventa una categoria etica e morale. I disoccupati, senza colpa, non devono comunque essere discriminati, in quanto in questa accezione il “lavoro” è tale in forza della volontà del singolo di lavorare e non delle situazioni contingenti che lo possono lasciare senza, in un certo senso la ricerca di un lavoro è un lavoro esso stesso. Più avanti la nostra costituzione infatti dichiara che compito della repubblica è fornire le condizioni adatte al conseguimento del singolo del lavoro (Art. 3 e Art. 4)
che la esercita nelle forme e nei limiti della Costituzione
è quindi il dettato costituzionale che definisce le regole da seguire.
Ora essendo il Popolo la sorgente della sovranità, mentre la costituzione la sorgente primaria della legge, appare ovvio che sia del popolo la facoltà di cambiare la costituzione stessa, nelle forme che la costituzione definisce.
Al di là quindi della lettera traspare evidente come la volontà dei padri costituenti fosse indicare che l’eventuale cambio della costituzione richieda non una formale maggioranza ma una effettiva, fattiva e sostanziale partecipazione popolare.
Alcune ricadute di questo articolo sono estremamente interessanti, in effetti sembra chiaro che compito dei rappresentanti eletti sia quello di rappresentare la sovranità popolare e di rispettare il dettato costituzionale e la legge da esso derivante, consequentemente qualsiasi scelta di tali rappresentanti volta a favorire i propri interessi è, al di la di qualsiasi considerazione giuridica successiva, contraria sia al dettato che allo spirito del primo articolo.
è morto Michael il mio gattino di un mese
Oggi sono particolarmente triste, è morto Michael il mio gattino di nemmeno un mese. ha lottato per 4 giorni contro una infezione intestinale, tra alti e bassi ma sempre coccolato ed accudito da me e Rika.
Ho pianto, lo ammetto, e se penso ai motivi ne trovo molti. in primo luogo un essere vivente si è spento, e er quanto fosse da poco con noi era diventato parte della famiglia. chi non ama gli animali o chi ri si tiene cosi in alto probabilmente non può capire, ma talvola è riflettendosi nei nostri amici diversi che troviamo il valore reale delle cose.
Volevo bene al gattino e ne voglio ancora, non è il primo animale che perdo, ma questo non allena al dolore, anzi. forse allenandosi ad amare si ama di più, e quindi si soffre di più.
Solo un paio di settimane fa un altro amico peloso, dark, è sparito. Spero che qualcuno lo abbia preso e tenuto anche se non suo e che lo tratti bene. adoravo Dark, e Xiadani anche di più. Purtroppo una sera è uscito a gironzolare come sempre, ma non è più tornato.
Prima Dark e poi Michael in cosi poco tempo…:( Preferisco gioire dell’amore donato e soffrire che non provare nulla. purtroppo questo è un brutto anno. Non trovare un lavoro devasta anche dal punto di vista morale, e si sovrappone alle preoccupazioni di come tirare avanti, pagare la multa che l’agenzia delle entrate ha graziosamente pensato di propinarmi nel momento economico più difficile per me è solo un segno di questo annus horribilis. lo so questo è uno sfogo personale, ma anche a questo serve un blog, talvolta sfogarsi con se stessi serve.
lo so il mondo intanto continua a dare il peggio di se e le mie preoccupazioni personali sono una goccia in un mare di cose molto più grandi. Ma in questo momento piango per mio gattino, per le lacrime di mia moglie e di mia figlia che soffrono per lui e vedo tutto un po piu scuro.
spero che sorga il sole domani.
scusate lo sfogo
Michael 2013 -23 August 2013 rip
Michael 2013 -23 August 2013
Related articles
- Michael 2013 -23 August 2013
mercoledì 21 agosto 2013
E-mail requirements change for a safe use in the post PRISM internet
Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use.
This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is:
Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text. this means anyone can read the command and data sent if sniffing the line. data that are not in plain text are transformed with MIME that allow to change bitstream into ascii stream.
Another point we should consider is that email require an Email server to deliver information to destination, and this server is the database containing the message for the user. to allow the user to read those message heshe has to use a client and another protocol like IMAP or POP. the client allow the user to read the mail, store in another place different form the server, and provide conversion for mime data to be able to read rich data we are used to exchange.
this structure has been created not to preserve privacy but to provide a simple but effective way to communicate. SMTP does not contain any security feature, all the security needed should be create around an email communication process. But is this possible?
since email provide poor security basis we should try to work on several layer in order to make this communication channel a little bit more secure.
the areas we should work on are at least
1) user identification
2) server identification
3) server hardening (and storage level encryption)
4) mailstore hardening (and mailbox level encryption)
5) data transport encryption (Securing SMTP)
6) data encryption (user level encryption)
User Identification:
This is a serious problem in the email world, since transmission of data can start from any source and basically anyone can send an email using a simple telnet to a mail server impersonating anyone.
User identification is not provided by sender recipient data since those data can be easily forget, think about spam as an example or better phishing and scams.
An email solution should be able to provide a way to identify the user, but this require to be able to certify somehow the entire dataflow. email encryption solution can provide several layer of identification that can be used to solve this problem.
Server Identification:
this is an area where some progress have been done: SPF, DKIM, VBR and DMARC should be always implemented even if they required an extended deployment that is far from real.
Server hardening:
this is a tough area as well, a mailserver contain precious and delicate data that should be protected from intrusions, harvest attack, ddos and so on. In order to protect a server several techniques should be used like shutting down the non necessary serviceprotocols, check user and service rights and the other specific platform hardening , beside a NGF firewall, a secure mail gateway should be used to be exposed to the internet in order to limit the data exposure. but AV and protection systems should be added both to the host server and the mail services.
mailstore hardening:
this is a key point, even if you think your server and your email services are secure is better do not trust anyone so encrypting the store should be a must, i do not mean disk encryption, that is part of the server hardening, but the store encryption is a second layer that should be independent from the storage.
You can think about this need better if you consider data in the cloud, although you do not have idea where your data reside encrypting them in an independent way from the cloud provider will give you a little extra layer of security. No matter if the cloud provider claim they use encryption, since you cannot control the keys it is useless from your point of view.
data transport encryption (Securing SMTP):
if you’re using an esoteric protocol probably do not need this passage, but since SMTP is the unsecure protocol we talked before we should try to provide at least a minimum layer of security, the easiest way to provide this is to use TLS to encrypt the SMTP communication. Most mail servers nowadays use opportunistic TLS configuration, that means use TLS if you can or go plain. I strongly suggest for secure communication to use always on TLS.
Data encryption:
This is the basis of any secure communication, you should always encrypt communication if you consider them critical or private. an encryption system should be able to use asymmetric key encryption as PGP. the problem here is that encrypting an email require a certain level of knowledge from both sender and recipient side. there are simple or hybrid encryption services that can provide a minimum level of privacy with a easy to use impact on the sender and the recipient.
again the key management is a fundamental requirement when using user level encryption, if you can’t control key exchange then you cannot provide a minimum level of security to your mail communication.
At the end the system will not be impenetrable but will give, if correctly implemented, a quite nice level of security, considering where we started from. we should remember anyway that when encrypting at user level we work on the mime part of the message so, at least sender and recipient and other data can be anyway retrieved.
for any further suggestion (protocols, implementation hints and so on) just send me a note.
cheers
Antonio
Related articles
- Poll: Do you encrypt your email? (news.ycombinator.com)
- Google presents server side encryption for Cloud Storage (cloudstoragecenter.com)
- Silent Mail is also shutting down its encrypted mail service (usahitman.com)
- Google to Encrypt Cloud Data by Default (ahotcupofjoe.net)
- Google Enables AES-128 Encryption for All Cloud Storage Users (hothardware.com)
- Google to encrypt Cloud Storage data by default (infoworld.com)
- Automatically Encrypting all Incoming Email (grepular.com)
- To Our Customers (silentcircle.wordpress.com)
- Google Cloud Storage now automatically encrypts all data (zdnet.com)
- Crypto experts blast German e-mail providers secure data storage claim (arstechnica.com)
E-mail requirements change for a safe use in the post PRISM internet
Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use.
This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is:
Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text. this means anyone can read the command and data sent if sniffing the line. data that are not in plain text are transformed with MIME that allow to change bitstream into ascii stream.
Another point we should consider is that email require an Email server to deliver information to destination, and this server is the database containing the message for the user. to allow the user to read those message heshe has to use a client and another protocol like IMAP or POP. the client allow the user to read the mail, store in another place different form the server, and provide conversion for mime data to be able to read rich data we are used to exchange.
this structure has been created not to preserve privacy but to provide a simple but effective way to communicate. SMTP does not contain any security feature, all the security needed should be create around an email communication process. But is this possible?
since email provide poor security basis we should try to work on several layer in order to make this communication channel a little bit more secure.
the areas we should work on are at least
1) user identification
2) server identification
3) server hardening (and storage level encryption)
4) mailstore hardening (and mailbox level encryption)
5) data transport encryption (Securing SMTP)
6) data encryption (user level encryption)
User Identification:
This is a serious problem in the email world, since transmission of data can start from any source and basically anyone can send an email using a simple telnet to a mail server impersonating anyone.
User identification is not provided by sender recipient data since those data can be easily forget, think about spam as an example or better phishing and scams.
An email solution should be able to provide a way to identify the user, but this require to be able to certify somehow the entire dataflow. email encryption solution can provide several layer of identification that can be used to solve this problem.
Server Identification:
this is an area where some progress have been done: SPF, DKIM, VBR and DMARC should be always implemented even if they required an extended deployment that is far from real.
Server hardening:
this is a tough area as well, a mailserver contain precious and delicate data that should be protected from intrusions, harvest attack, ddos and so on. In order to protect a server several techniques should be used like shutting down the non necessary serviceprotocols, check user and service rights and the other specific platform hardening , beside a NGF firewall, a secure mail gateway should be used to be exposed to the internet in order to limit the data exposure. but AV and protection systems should be added both to the host server and the mail services.
mailstore hardening:
this is a key point, even if you think your server and your email services are secure is better do not trust anyone so encrypting the store should be a must, i do not mean disk encryption, that is part of the server hardening, but the store encryption is a second layer that should be independent from the storage.
You can think about this need better if you consider data in the cloud, although you do not have idea where your data reside encrypting them in an independent way from the cloud provider will give you a little extra layer of security. No matter if the cloud provider claim they use encryption, since you cannot control the keys it is useless from your point of view.
data transport encryption (Securing SMTP):
if you’re using an esoteric protocol probably do not need this passage, but since SMTP is the unsecure protocol we talked before we should try to provide at least a minimum layer of security, the easiest way to provide this is to use TLS to encrypt the SMTP communication. Most mail servers nowadays use opportunistic TLS configuration, that means use TLS if you can or go plain. I strongly suggest for secure communication to use always on TLS.
Data encryption:
This is the basis of any secure communication, you should always encrypt communication if you consider them critical or private. an encryption system should be able to use asymmetric key encryption as PGP. the problem here is that encrypting an email require a certain level of knowledge from both sender and recipient side. there are simple or hybrid encryption services that can provide a minimum level of privacy with a easy to use impact on the sender and the recipient.
again the key management is a fundamental requirement when using user level encryption, if you can’t control key exchange then you cannot provide a minimum level of security to your mail communication.
At the end the system will not be impenetrable but will give, if correctly implemented, a quite nice level of security, considering where we started from. we should remember anyway that when encrypting at user level we work on the mime part of the message so, at least sender and recipient and other data can be anyway retrieved.
for any further suggestion (protocols, implementation hints and so on) just send me a note.
cheers
Antonio
Related articles
- Poll: Do you encrypt your email? (news.ycombinator.com)
- Google presents server side encryption for Cloud Storage (cloudstoragecenter.com)
- Silent Mail is also shutting down its encrypted mail service (usahitman.com)
- Google to Encrypt Cloud Data by Default (ahotcupofjoe.net)
- Google Enables AES-128 Encryption for All Cloud Storage Users (hothardware.com)
- Google to encrypt Cloud Storage data by default (infoworld.com)
- Automatically Encrypting all Incoming Email (grepular.com)
- To Our Customers (silentcircle.wordpress.com)
- Google Cloud Storage now automatically encrypts all data (zdnet.com)
- Crypto experts blast German e-mail providers secure data storage claim (arstechnica.com)
martedì 20 agosto 2013
is Free and investigative Journalism in danger?
I live in a country, Italy, where journalism is not a synonymous of freedom, objectivity or courage. In the past we have had great journalists able to put their life at the service of a profession that require total dedication, but today the market offer really a few example of journalism, most are just “the voice of the boss” as mr. Sallusti or mr. Belpietrto.
I always seen that outside there were great journalists, free and brave ones. Journalists able to fight and find scandals or inconvenient truths, and this was accepted and even defended by their governments who considered free press just an asset for democracy.
Now I’m afraid this world is slowly vanishing, journalists are not free to tell us the inconvenient truth, and the tools to do their work is in danger. What I’m talking about?
Recently i’ve seen how can be dangerous to be a journalist in western countries. I’m thinking of Barret Brown, for example, but also to Glenn Greenwald. It’s ironic that the countries that have always claimed the right to free speech, USA and UK, are now the worst place to be a free journalist.
You think I’m wrong? Barret Brown is risking 100 years in jail. I know there are people claiming he is not a journalist, he is crazy, he is guilty because worked FOR Anonymous and other things I’ve read in Blogs, but the truth is that he is risking his freedom to have wrote an article and a tweet.
Barrett Brown is now facing his third round of charges. The first was for threatening an FBI agent on Twitter; the second involved ‘trafficking’ by making available an URL; and this third is for concealing evidence.
Barrett Brown is the one-time self-proclaimed voice of Anonymous. He has not been accused of taking part in Anonymous hacks, but is clearly a thorn in the side of authority. The previous indictment in December 2012 included 12 charges relating to Brown trafficking in stolen credit card details (from the Stratfor hack) by publicizing an URL that was already public knowledge on the internet.
The latest indictment, dated January 23, 2013, contains two counts – Obstruction: Concealment of Evidence; and Obstruction: Corruptly Concealing Evidence. The gist of the accusation is that he hid two laptops and their content “prior to the execution of a search warrant… said search warrant having been issued by a United States Magistrate Judge” (count 1); and that he “did knowingly and corruptly conceal and attempt to conceal records, documents, and digital data contained on two laptop computers” (count 2).
The obstruction and concealment was not very successful. Brown’s lawyer, Jay Leiderman, commented, “they got them with some reasonable ease. This was not a mastermind of hiding things. Which makes these charges all the more absurd and unnecessary.”
There are some parallels to the Aaron Swartz case, another activist who killed himself earlier this month. “I would have thought in the wake of Aaron Swartz that the government might have learned something and might have thought twice about bringing the weight of the entire United States down upon someone when it wasn’t warranted,” says Leiderman. This indictment alone adds a potential further 20 years prison term to the earlier indictments.
“Clearly they’re more worried about what they perceive as his egging people on to go after defense contractors and secret spy organizations,” said Leiderman. “Barrett believes in privacy for individuals and transparency for corporations and government. The government doesn’t like his belief system. And Barrett was effective in expressing that belief system.”
And what about Glenn Greenwald who is a journalist for the Guardian, which his life mate, david miranda, has been threatened 9 hours by UK police as a terrorist because…. Glenn Greenwald was the journalist that worked with Snowden.
David Miranda, who lives with Glenn Greenwald, was returning from a trip to Berlin when he was stopped by officers at 8.05am and informed that he was to be questioned under schedule 7 of the Terrorism Act 2000. The controversial law, which applies only at airports, ports and border areas, allows officers to stop, search, question and detain individuals. Those stopped have no right to legal advice and it is a criminal offence to refuse to cooperate with questioning under schedule 7.
The 28-year-old was held for nine hours, the maximum the law allows before officers must release or formally arrest the individual. According to official figures, most examinations under schedule 7 – over 97% – last less than an hour, and only one in 2,000 people detained are kept for more than six hours.
Miranda was released, but officials confiscated his electronics equipment, including his mobile phone, laptop, camera, memory sticks, DVDs and games consoles.
After PRISM nothing will be the same in western countries, PRISM certified that our modern communication media, the internet, is not a safe place. To be honest it has never been a safe place, but at least formally any one used to have the right for privacy.
As for wikileaks affair nobody told Snowden was lying, that means he told the truth so NSA did spied on people and countries (in Germany this is becoming a big issue).
And when people close to the government say that anybody using encryption can be a terrorist well we can understand that something is at risk.
What is happening is that if a Journalist publish something then he is in danger, his family as well, the people that worked with him even indirectly, as lavabit that was just providing a secure mailbox to snowden, can be target of pressure and seen their right limited (a NSL may be? who knows if you got it you cannot say to anyone nor even your lawyer).
At the same time he cannot hold data secure because the fact he is securing data is considered an act of terrorism or worse. he cannot exchange information with email or phone because are hacked. Can we really think this is the best environment for a free journalist?
i’m afraid all we could have then is people like this one: Time senior national correspondent Michael Grunwald has apologized for a tweet in which he suggested WikiLeaks founder Julian Assange be killed in a drone strike.
“I can’t wait to write a defense of the drone strike that takes out Julian Assange,” Grunwald wrote on Twitter on Saturday afternoon.
The tweet was met with immediate criticism by fellow journalists, including the Guardian’s Glenn Greenwald:
I assume you’re allowed to express this vile opinion & still be an objective “journalist”- not an “activist”, right?https://t.co/NhXiZ5jdTl
— Glenn Greenwald (@ggreenwald) August 17, 2013
Here’s the idiotic and frankly disturbing since-deleted tweet from TIME correspondent@MikeGrunwald: pic.twitter.com/xJNMrugVc0
— James Ball (@jamesrbuk) August 18, 2013
This is a @Time reporter. Remarkable. RT @MikeGrunwald: I can’t wait to write a defense of the drone strike that takes out Julian Assange.
— Mosharraf Zaidi (@mosharrafzaidi) August 17, 2013
In response, WikiLeaks called for Grunwald’s resignation:
We have written to TIME magazine to ask for Michael Grunwald’s resignationhttps://t.co/X8Rf3TN5MY
— WikiLeaks (@wikileaks) August 18, 2013
In a statement, Time magazine called the tweet “offensive” and distanced itself from Grunwald’s views:
Michael Grunwald posted an offensive tweet from his personal Twitter account that is no way representative of TIME’s views. He regrests having tweeted it, and he removed it from his Twitter feed.
Grunwald later apologized on Twitter:
It was a dumb tweet. I’m sorry. I deserve the backlash. (Maybe not the anti-Semitic stuff but otherwise I asked for it.)
— Michael Grunwald (@MikeGrunwald) August 18, 2013
He added:
I didn’t need a boss to tell me it was dumb. I mean, @blakehounshell called me derpy! Again, I apologize. Good night, everyone.
— Michael Grunwald (@MikeGrunwald) August 18, 2013
I’m worrying Sallusti and Belpietro made the right choice
Related articles
- Michael Grunwald, Time Magazine Reporter, Sends Out Shocking Tweet About Julian Assange (huffingtonpost.com)
- Greenwald: Even the Mafia doesn’t target family (cnn.com)
- Why does being a relative of Glenn Greenwald place you above the law? (blogs.telegraph.co.uk)
- BREMMER: The UK And US Are Likely Preparing To Indict Journalist Glenn Greenwald Over Snowden Leaks (businessinsider.com)
- UK Detains Glenn Greenwald’s Partner (drudge.com)
- The Government Wants the Media to Stop Covering Barrett Brown (federaljack.com)
- The Government Wants the Media to Stop Covering Barrett Brown (vice.com)
- No, Glenn Greenwald didn’t ‘vow vengeance.’ He said he was going to do his job. (washingtonpost.com)
- Detaining David Miranda Ticked Off More Journalists Than Glenn Greenwald (reason.com)
- Barrett Brown: 100 Years in Prison for Posting a Link? | Brainwash Update (familysurvivalprotocol.com)
is Free and investigative Journalism in danger?
I live in a country, Italy, where journalism is not a synonymous of freedom, objectivity or courage. In the past we have had great journalists able to put their life at the service of a profession that require total dedication, but today the market offer really a few example of journalism, most are just “the voice of the boss” as mr. Sallusti or mr. Belpietrto.
I always seen that outside there were great journalists, free and brave ones. Journalists able to fight and find scandals or inconvenient truths, and this was accepted and even defended by their governments who considered free press just an asset for democracy.
Now I’m afraid this world is slowly vanishing, journalists are not free to tell us the inconvenient truth, and the tools to do their work is in danger. What I’m talking about?
Recently i’ve seen how can be dangerous to be a journalist in western countries. I’m thinking of Barret Brown, for example, but also to Glenn Greenwald. It’s ironic that the countries that have always claimed the right to free speech, USA and UK, are now the worst place to be a free journalist.
You think I’m wrong? Barret Brown is risking 100 years in jail. I know there are people claiming he is not a journalist, he is crazy, he is guilty because worked FOR Anonymous and other things I’ve read in Blogs, but the truth is that he is risking his freedom to have wrote an article and a tweet.
Barrett Brown is now facing his third round of charges. The first was for threatening an FBI agent on Twitter; the second involved ‘trafficking’ by making available an URL; and this third is for concealing evidence.
Barrett Brown is the one-time self-proclaimed voice of Anonymous. He has not been accused of taking part in Anonymous hacks, but is clearly a thorn in the side of authority. The previous indictment in December 2012 included 12 charges relating to Brown trafficking in stolen credit card details (from the Stratfor hack) by publicizing an URL that was already public knowledge on the internet.
The latest indictment, dated January 23, 2013, contains two counts – Obstruction: Concealment of Evidence; and Obstruction: Corruptly Concealing Evidence. The gist of the accusation is that he hid two laptops and their content “prior to the execution of a search warrant… said search warrant having been issued by a United States Magistrate Judge” (count 1); and that he “did knowingly and corruptly conceal and attempt to conceal records, documents, and digital data contained on two laptop computers” (count 2).
The obstruction and concealment was not very successful. Brown’s lawyer, Jay Leiderman, commented, “they got them with some reasonable ease. This was not a mastermind of hiding things. Which makes these charges all the more absurd and unnecessary.”
There are some parallels to the Aaron Swartz case, another activist who killed himself earlier this month. “I would have thought in the wake of Aaron Swartz that the government might have learned something and might have thought twice about bringing the weight of the entire United States down upon someone when it wasn’t warranted,” says Leiderman. This indictment alone adds a potential further 20 years prison term to the earlier indictments.
“Clearly they’re more worried about what they perceive as his egging people on to go after defense contractors and secret spy organizations,” said Leiderman. “Barrett believes in privacy for individuals and transparency for corporations and government. The government doesn’t like his belief system. And Barrett was effective in expressing that belief system.”
And what about Glenn Greenwald who is a journalist for the Guardian, which his life mate, david miranda, has been threatened 9 hours by UK police as a terrorist because…. Glenn Greenwald was the journalist that worked with Snowden.
David Miranda, who lives with Glenn Greenwald, was returning from a trip to Berlin when he was stopped by officers at 8.05am and informed that he was to be questioned under schedule 7 of the Terrorism Act 2000. The controversial law, which applies only at airports, ports and border areas, allows officers to stop, search, question and detain individuals. Those stopped have no right to legal advice and it is a criminal offence to refuse to cooperate with questioning under schedule 7.
The 28-year-old was held for nine hours, the maximum the law allows before officers must release or formally arrest the individual. According to official figures, most examinations under schedule 7 – over 97% – last less than an hour, and only one in 2,000 people detained are kept for more than six hours.
Miranda was released, but officials confiscated his electronics equipment, including his mobile phone, laptop, camera, memory sticks, DVDs and games consoles.
After PRISM nothing will be the same in western countries, PRISM certified that our modern communication media, the internet, is not a safe place. To be honest it has never been a safe place, but at least formally any one used to have the right for privacy.
As for wikileaks affair nobody told Snowden was lying, that means he told the truth so NSA did spied on people and countries (in Germany this is becoming a big issue).
And when people close to the government say that anybody using encryption can be a terrorist well we can understand that something is at risk.
What is happening is that if a Journalist publish something then he is in danger, his family as well, the people that worked with him even indirectly, as lavabit that was just providing a secure mailbox to snowden, can be target of pressure and seen their right limited (a NSL may be? who knows if you got it you cannot say to anyone nor even your lawyer).
At the same time he cannot hold data secure because the fact he is securing data is considered an act of terrorism or worse. he cannot exchange information with email or phone because are hacked. Can we really think this is the best environment for a free journalist?
i’m afraid all we could have then is people like this one: Time senior national correspondent Michael Grunwald has apologized for a tweet in which he suggested WikiLeaks founder Julian Assange be killed in a drone strike.
“I can’t wait to write a defense of the drone strike that takes out Julian Assange,” Grunwald wrote on Twitter on Saturday afternoon.
The tweet was met with immediate criticism by fellow journalists, including the Guardian’s Glenn Greenwald:
I assume you’re allowed to express this vile opinion & still be an objective “journalist”- not an “activist”, right?https://t.co/NhXiZ5jdTl
— Glenn Greenwald (@ggreenwald) August 17, 2013
Here’s the idiotic and frankly disturbing since-deleted tweet from TIME correspondent@MikeGrunwald: pic.twitter.com/xJNMrugVc0
— James Ball (@jamesrbuk) August 18, 2013
This is a @Time reporter. Remarkable. RT @MikeGrunwald: I can’t wait to write a defense of the drone strike that takes out Julian Assange.
— Mosharraf Zaidi (@mosharrafzaidi) August 17, 2013
In response, WikiLeaks called for Grunwald’s resignation:
We have written to TIME magazine to ask for Michael Grunwald’s resignationhttps://t.co/X8Rf3TN5MY
— WikiLeaks (@wikileaks) August 18, 2013
In a statement, Time magazine called the tweet “offensive” and distanced itself from Grunwald’s views:
Michael Grunwald posted an offensive tweet from his personal Twitter account that is no way representative of TIME’s views. He regrests having tweeted it, and he removed it from his Twitter feed.
Grunwald later apologized on Twitter:
It was a dumb tweet. I’m sorry. I deserve the backlash. (Maybe not the anti-Semitic stuff but otherwise I asked for it.)
— Michael Grunwald (@MikeGrunwald) August 18, 2013
He added:
I didn’t need a boss to tell me it was dumb. I mean, @blakehounshell called me derpy! Again, I apologize. Good night, everyone.
— Michael Grunwald (@MikeGrunwald) August 18, 2013
I’m worrying Sallusti and Belpietro made the right choice
Related articles
- Michael Grunwald, Time Magazine Reporter, Sends Out Shocking Tweet About Julian Assange (huffingtonpost.com)
- Greenwald: Even the Mafia doesn’t target family (cnn.com)
- Why does being a relative of Glenn Greenwald place you above the law? (blogs.telegraph.co.uk)
- BREMMER: The UK And US Are Likely Preparing To Indict Journalist Glenn Greenwald Over Snowden Leaks (businessinsider.com)
- UK Detains Glenn Greenwald’s Partner (drudge.com)
- The Government Wants the Media to Stop Covering Barrett Brown (federaljack.com)
- The Government Wants the Media to Stop Covering Barrett Brown (vice.com)
- No, Glenn Greenwald didn’t ‘vow vengeance.’ He said he was going to do his job. (washingtonpost.com)
- Detaining David Miranda Ticked Off More Journalists Than Glenn Greenwald (reason.com)
- Barrett Brown: 100 Years in Prison for Posting a Link? | Brainwash Update (familysurvivalprotocol.com)