A localização de cada monitorado é transmitida pela rede de telefonia móvel através de uma VPN (rede virtual privada, um túnel de informação que é criptografado para evitar interceptações do sinal). Mas, como a cobertura de celular não é lá essas coisas, foi preciso criar uma adaptação tecnológica para o Brasil. Fontes do sistema prisional que não têm permissão para dar entrevistas me disseram que a maioria das tornozeleiras nacionais funciona com dois chips de operadoras diferentes (Claro, Vivo, Tim e Oi aparecem nos sites das fabricantes como parceiras). São escolhidos os chips das duas operadoras de telefonia que tiverem o sinal mais forte na região da casa do monitorado. Se um falhar, o outro entra em ação.
http://piaui.folha.uol.com.br/c/a-minha-se-chama-toto
Voting 0
"The h-node project aims at the construction of a hardware database in order to identify what devices work with a fully free operating system. The h-node.org website is structured like a wiki in which all the users can modify or insert new contents. The h-node project is developed in collaboration and as an activity of the FSF."
https://www.h-node.org
Voting 0
-
http://motherboard.vice.com/read/the-...an-plans-to-make-iceland-a-data-haven
Voting 0
-
http://freedomdefined.org/Definition
Voting 0
'Após um período de euforia e liberdade, os usuários da internet devem começar a se policiar, pois tudo o que fazem está sendo gravado e classificado. A palavra “tudo”, aqui, não é força de expressão. É “tudo” mesmo. Stallman citou os casos do Facebook, do Google e do Google Analytics como exemplos de um sistema de vigilância que está sendo feito em vários níveis. O mais perigoso, defendeu, é aquele controlado pelos governos.'
http://www.cartamaior.com.br/templates/materiaMostrar.cfm?materia_id=20274
Voting 0
-
http://www.advogato.org/article/808.html
Voting 0
-
http://www.cartacapital.com.br/politica/os-poderes-e-os-limites-da-internet
Voting 0
"We know how to engineer our way out of this situation. We need to create plug servers which are cheap and require little power, and we must fill them with "sweet free software." We need working mesh networking, self-constructing phone systems built with tools like OpenBTS and Asterisk, federated social services, and anonymous publication platforms. We need to keep our data within our houses where it is shielded by whatever protections against physical searches remain. We need to send encrypted email all the time. These systems can also provide perimeter defense for more vulnerable systems and proxy servers for circumvention of national firewalls. We can do all of it, Eben said; it is easily done on top of the stuff we already have."
http://lwn.net/Articles/426763
Voting 0
"IT security in 2020 will be less about protecting you from traditional bad guys, and more about protecting corporate business models from you. Deperimeterization assumes everyone is untrusted until proven otherwise. Consumerization requires networks to assume all user devices are untrustworthy until proven otherwise. Decentralization and deconcentration won’t work if you’re able to hack the devices to run unauthorized software or access unauthorized data. Deconsumerization won’t be viable unless you’re unable to bypass the ads, or whatever the vendor uses to monetize you. And depersonization requires the autonomous devices to be, well, autonomous." .. »
"Welcome to the future. Companies will use technical security measures, backed up by legal security measures, to protect their business models. And unless you’re a model user, the parasite will be you."
http://www.schneier.com/blog/archives/2010/12/security_in_202.html
Voting 0
"The new model employs criminal sanctions, primarily fines, to induce computer users and those who provide access to cyberspace to employ reasonable security measures as deterrents. We argue that criminal sanctions are preferable in this context to civil liability, and we suggest a system of administrative regulation backed by criminal sanctions that will provide the incentives necessary to create a workable deterrent to cybercrime."
http://www.schneier.com/blog/archives/2009/07/cybercrime_pape.html
Voting 0