Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

WCIT-12

Name: Anonymous 2012-12-06 20:21

http://en.wikipedia.org/wiki/International_Telecommunication_Union#World_Conference_on_International_Telecommunications_2012_.28WCIT-12.29

The ITU will facilitate the The World Congress on International Telecommunications or WCIT, a treaty-level conference that addresses the international rules for telecommunications, including international tariffs.[11] The previous conference to update the International Telecommunication Regulations (ITRs) was held in Melbourne in 1988.[12] The next conference is taking place in Dubai in December 2012.

[...]

In August 2012, ITU called for a public consultation on a draft document ahead of the conference.[13] It is claimed the proposal would allow government restriction or blocking of information disseminated via the internet and create a global regime of monitoring internet communications – including the demand that those who send and receive information identify themselves. It would also allow governments to shut down the internet if there is the belief that it may interfere in the internal affairs of other states or that information of a sensitive nature might be shared.[14]

[...]

Proposals currently under consideration would establish regulatory oversight by the U.N. over security, fraud, traffic accounting as well as traffic flow, management of Internet Domain Names and IP addresses, and other aspects of the Internet that are currently governed either by community-based approaches such as Regional Internet Registries, ICANN, or largely national regulatory frameworks.[17] The move by the ITU and some countries has alarmed many within the United States and within the Internet community.[18][19] Indeed some European telecommunication services have proposed a so-called "sender pays" model which would requires sources of Internet traffic to pay destinations, similar to the way funds are transferred between countries using the telephone.[20][21]

The WCIT-12 activity has been attacked by Google, who has characterized it as a threat to the "free and open internet".[22]

Name: Anonymous 2012-12-06 21:28

Cool, it's about time everyone switched to darknets.

Name: Anonymous 2012-12-06 21:32

On 5 December 2012, the lower chamber of the United States Congress passed a resolution opposing U.N. governance of the Internet by a rare unanimous 397-0 vote. The resolution warned that ".. proposals have been put forward for consideration at the [WCIT-12] that would fundamentally alter the governance and operation of the Internet ... [and] would attempt to justify increased government control over the Internet", and stated that the policy of the United States is "... to promote a global Internet free from government control and preserve the successful multistakeholder model that governs the Internet today." The same resolution had previously been passed unanimously by the upper chamber of the Congress in September.
It's dead, Jim!

Name: Anonymous 2012-12-06 21:50

>>2
No darknet. The ITU (the people who manage international calling) will publish recommendations (read: mandates) that member states use DPI to block suspicious traffic that may harm internet security, real-life security, or violate international laws (like copyright). With the power of the DNSSEC keys, they will be able to ensure that no website encrypts it's traffic without paying for a license when registering the domain. All traffic not to or from a licensed server (and clients can only contact servers, as clients and servers are separate tiers of users under ITU control), will be marked suspicious and possibly disconnected.

Then the UN will have blasphemy and porn blocked, then Russia and China will have political speech blocked, and the US will have all material that doesn't have it's copyright verified by a public notary and ten witnesses blocked.

Darknets only work when encrypted traffic is viewed as legitimate. Every time you go to onionland to look at CP, your ISP gives you the benefit of the doubt that you are just browsing some forum about knitting. They aren't so stupid that they can't tell between an encrypted packet and an unencrypted packet, after all.

Name: Anonymous 2012-12-06 22:48

>>4-autist, you are a paranoid faggot.

Name: Anonymous 2012-12-06 23:11

>>5
I'm not sure how you inferred that >>4 was autistic, paranoid, or a faggot. Care to explain?

Name: Anonymous 2012-12-06 23:14

>>6
No, fuck you.

Name: Anonymous 2012-12-06 23:24

>>4
Then darknet + mesh network + sneakernet.

All traffic not to or from a licensed server (and clients can only contact servers, as clients and servers are separate tiers of users under ITU control), will be marked suspicious and possibly disconnected.
Right, and the hundreds of thousands of companies that depend on a free Internet will just stand by as their business model crumbles to the ground.

Darknets only work when encrypted traffic is viewed as legitimate. Every time you go to onionland to look at CP, your ISP gives you the benefit of the doubt that you are just browsing some forum about knitting.
That's just because darknets aren't sufficiently advanced yet to support some sort of voluntary "conspiracy attack" on servers that break the darknet rules (e.g. to unmask nodes that sell/post CP/snuff, or who spam). Also, the ISP has fuck-all to do with encrypted traffic; the government is the one that has the authority to interfere, and it doesn't do it because it would violate over 9000 constitutional amendments (unless you live in some retarded niggerland). Finally, the existence of steganography proves the futility of Internet censorship, no matter how draconian.

Name: Anonymous 2012-12-06 23:36

>>8
Right, and the hundreds of thousands of companies that depend on a free Internet will just stand by as their business model crumbles to the ground.
Do they have lots of money? Hollywood Jews have money. Saudi Arabia has money. Google is broke compared to The Forces That Be.

That's just because darknets aren't sufficiently advanced yet to support some sort of voluntary "conspiracy attack" on servers that break the darknet rules (e.g. to unmask nodes that sell/post CP/snuff, or who spam).
Are you fucking stupid? If someone can unmask a node, then it isn't a fucking darknet, it's fucking limewire. You have no god damn clue as to what you are talking about you fucking faggot. You just want to play like on of the hackers on TV and browse green-text-on-black-background websites with 1337 URLs and talk about how the government is afraid of you. Why don't you go buy a fucking clue and read up on what a fucking darknet is and look into encryption before you spew your idiotic cyberpunk fantasies and make yourself look stupid again.

Name: Anonymous 2012-12-06 23:39

>>8
It's not that far off of a reality. The government can require parties to apply for a license to use encryption. Upon approval of the license, the party discloses the private keys to the government. The companies still get security from other members of the public, but not the government. Encrypted traffic can be detected, and if the user does not have a license, they can be prosecuted. This is how it is done in some places in the world.

Name: Anonymous 2012-12-06 23:41

>>9
Fuck you.

Name: Anonymous 2012-12-07 0:02

>darknet

it doesn't mean what you think it means

Name: Anonymous 2012-12-07 0:04

>>9
Wow, you are fucking retarded.

>>10
It's not that far off of a reality.
That depends on how vigilant not-completely-brain-dead the citizens in a particular country are. Of course, if the country is ruled by a dictatorship, it doesn't really matter.

Encrypted traffic can be detected, and if the user does not have a license, they can be prosecuted.
Steganography.

This is how it is done in some places in the world.
It's usually the same places where people don't really enjoy most of the rights on the UDHR.

Fighting crypto is a losing battle, and even the USA gov't was smart enough to know that back in the late nineties.

Name: Anonymous 2012-12-07 0:08

Name: Anonymous 2012-12-07 0:35

Why are there so few sex scandals in the UN? Hint:JEWS!

Name: Anonymous 2012-12-07 0:53

>>15
The UN has rules that say that anyone who reports about a UN sex scandal is a terrorist.

Name: Anonymous 2012-12-07 5:11

>>3
forgot to cite:
http://thehill.com/blogs/floor-action/house/271153-house-approves-resolution-to-keep-internet-control-out-of-un-hands

>>8,11-1005
Also, we still have chaosnet and hesiod we can always use. And now days, most p2p like I2P, still works if the most oppressive ISPs.

>>10
concurred. And knowing reality, people will ignore them until forced. But Again, I still remember the USENET ban, and how effective it was.

why is human behavior so parasitic when you are the alpha mammal that controls countries?

Name: Anonymous 2012-12-07 13:35

looks like the 1990's of the USA finally hit the authoritarian niggerlands (e.g. almost every asian country). let's see how they deal with it.

Name: Anonymous 2012-12-07 13:45

>>18
Don't forget about prison state UK and retarded piece of shit France.

Name: Anonymous 2012-12-07 14:07

>>10
The government can require parties to apply for a license to use encryption.
Not this shit again. Your average 6th fucking grader can understand and implement strong pubkey crypto, how fucking thick-skulled must you be to even suggest the banishment of mathematics?

fucking sage

Name: Anonymous 2012-12-07 14:11

Your average 6th fucking grader can understand and implement strong pubkey crypto
That's not how it works, fagshit.

Using sage rudely considered harmful.

Name: fagshit 2012-12-07 14:26

>>21
Then how does it work, shotgun-san? Please, enlighten me.

Name: Anonymous 2012-12-07 14:31

>>22
I'm not the retarded shotgun cocksucker.

A 6th fucking grader can't even do algebra for shit, that's why it doesn't work like that.

Name: Anonymous 2012-12-07 14:34

>>23
A 6th fucking grader can't even do algebra for shit, that's why it doesn't work like that.
What country are you in?

Name: Anonymous 2012-12-07 14:59

>>23
Modular arithmetic is easy to explain, and they already know what exponentiation is, so you should be able to teach them e.g. ElGamal encryption.

Name: Anonymous 2012-12-07 15:53

fucking stupid retarded shotgun cocksucker

Name: Anonymous 2012-12-07 16:09

>>26
Freedom-hating piece of shit, go back to soviet russia.

Name: Anonymous 2012-12-07 16:40

The guy who regulates fraud is called a mafia boss

Name: Anonymous 2012-12-07 16:48

>>27
shotguns are for fagshits

get a rifle freedom-hating fagshit

Name: Anonymous 2012-12-07 16:52

Name: Anonymous 2012-12-07 17:21

ur all posting in a troll thread, niggas
if you weren't so stupid youll'be licking UTI's ass already
more unencrypted traffic -> fatter covert channels
steganography and shit provides plausible deniability, that conjecture seems to be strong enough to rely on.
can't you see what that means? UTI is forcing differentiation into categories of greygoo and steganoleet. that's the end of eternal september, faggots!

Name: Anonymous 2012-12-07 17:58

>>20
you are confusing ability with legality. It's easy enough for me park a vehicle on a sidewalk that's painted red, but that doesn't make it legal. What is and isn't legal is up to the country, and in some places the use of encryption is banned, in others it is allowed with a license, and in others there is no regulation whatsoever.  I wasn't suggesting that it should be banned, just stating that it is in some places, and using it in such places would be putting yourself at risk.

Name: Anonymous 2012-12-07 18:39

>>32
Doing mathematics is about as private as masturbation (being its mental counterpart and all that). A country that bans cryptography would probably have no problems banning masturbation either.

Name: Anonymous 2012-12-07 19:39

>>5
Perhaps you aren't paranoid enough.

>>8
Then darknet
Useless with DPI for sharing anything less trivial than pie recipes, unencrypted. It also isn't a publishing method like the internet proper is, but a sharing platform where you already have to know the people to allow them to connect\connect to their darknet.

mesh network
Same problem, and also expensive. You also require licenses for the frequencies that you use. Also, the state could simply require licenses for encryption (for example, HAM radio operators can't encrypt anything (or so I'm told)).

sneakernet
Slow as balls. Not only can you not publish, you can't share with strangers either. If you do, you have to communicate somehow and use the postal system, most often run by the government. It would be like fansubs in the 90s, where you had to write some faggot that you meet on Usenet, mail him a tape, and hope that he sends it back to you in four to six weeks. It would work fine for sharing with local friends I guess, but then you have to actually have friends.

Also, the ISP has fuck-all to do with encrypted traffic; the government is the one that has the authority to interfere, and it doesn't do it because it would violate over 9000 constitutional amendments (unless you live in some retarded niggerland).
That's why the AT&T never took the NSA's money in exchange for letting them set up an office next to their routers, right? The constitution stopped that, and Congress certainly never gave them immunity, right? Even now, the police is trying to have the government force telecoms to keep verbose logs of traffic and shit for years on end.

Finally, the existence of steganography proves the futility of Internet censorship, no matter how draconian.
How exactly will steganography help? Mass inspection of internet traffic is not an investigation itself, it is a survey to see who should be investigated more closely. Even if you can only need 8 bits of stegotext for 1 bit of plaintext, to transfer that 500KB mohammed_goatfuck.png you would need an entire four megabytes! That's going to look pretty fucking suspicious to be transferring to an internet that is only supposed to be used for Facebook and Walmart.com. Then there is the fact that it isn't exactly hard to extract data from known algorithms, so you'd better encrypt before you upload! But once again, that's not publishing, that's sharing, and you could probably just print it out and mail it to your friends instead.

But before I get too involved, please detail your plans of how exactly steganography would be useful.

>>13
That depends on how vigilant not-completely-brain-dead the citizens in a particular country are. Of course, if the country is ruled by a dictatorship, it doesn't really matter.
You don't have to be stupid to trade freedom for protection against evil terrorist and pedophiles and blasphemers, you just have to be scared and trusting. That is the trade that is being offered to the people, and they just don't know that they will be fucked.

Fighting crypto is a losing battle, and even the USA gov't was smart enough to know that back in the late nineties.
It's a losing battle for a civilized government. A government that doesn't really care about hitting a few innocents in the head and ruining a few lives for THE GREATER GOOD might prove to be much more successful.

>>20,33
Not this shit again. Your average 6th fucking grader can understand and implement strong pubkey crypto, how fucking thick-skulled must you be to even suggest the banishment of mathematics?
You are already required to turn over keys and passwords to the government when requested. You are already required to have a license to use the airwaves (It's just an EM wave! How can they possibly regulate an natural phenomenon and a fundamental force of nature?!?!?!?). It's illegal to export software, including cryptographic software, to many countries.

The idea that math can't be banned or that information wants to be free is purely academic. Governments operate in the real world, and if you don't follow their laws, they will send scary men to to take you and put you in prison. It doesn't really matter how much you tell the judge (it's just a number!), they won't care any more about what you say that they care about potheads who keep saying that it's wrong to ban a naturally growing plant.

Name: Anonymous 2012-12-07 20:43

Cryptography considered JEWISH

Name: Anonymous 2012-12-07 23:51

>>35
[citation needed]

Name: Anonymous 2012-12-08 0:17

>>23,30
LOL, sucks to be you. I touched prealgebra concepts on 4th, and on 6th actually learn it. So much so, was half into trig at the end. Homescholed although. Took for creditation on 7th Algebra and aced ith witha 124% (extra credit, something Americunt only has)

Name: Anonymous 2012-12-08 0:44

You also require licenses for the frequencies that you use.
directional antenna + spread spectrum + minimum required power to make contact
Anyone who doesn't know exactly where to look and exactly what to look for will probably never detect your transmissions if you do it right. They can't enforce licensing for signals they can't detect.

HAM radio operators can't encrypt anything
http://www.qsl.net/kb9mwr/projects/wireless/hsmm.html
Encryption on ham radio

While IEEE 802.11b allows WEP, an encryption algorithm, Amateur Radio transmissions are characterized as being an open media. That is, amateur radio operators expect and assume that their transmissions are being listened to around the world with no presumption of privacy. And, the FCC even mandates that hams will not encode/encrypt to obscure meaning.

Encryption is a subject for debate but the League feels that encryption is ok as long as the purpose is NOT TO HIDE the message content is within Part 97.  Again, the encryption's purpose is not to "obscure" but to provide security and authentication.  To further this, an amendment made to Article 25.2A (1A) at the 2003 World radio Conference no longer specifically prohibits the use of encryption and other strong security measures on transmissions between Amateur Radio stations within the same jurisdiction.

The FCC, under non-emergency situations does NOT want stations of one service routinely communicating with stations of another service  So many saw encryption as required to be used, and the ARRL attorney (Chris Imlay, W3KD) asked the FCC if that was acceptable and they said "yes". The FCC's reasoning was that it was NOT our INTENT (an important legal concept) to obscure the communications.

Some agree, some don't.  As far as I know the FCC is aware or should be as the HSMM and ARRL have made no secret that hams are using 802.11x with WEP for the  purpose of control of the access to Part 97 operations and thus far have not issued any citations.  It is my understanding that some hams have sent letters to the FCC telling them that they are running WEP and 802.11x on a certain 2.4 GHz frequency and at what location and times and the individual(s) have not received a citation.

This probably isn't much of an issue for a private network, but I can see it being an issue when porting traffic over the internet. Keep in mind how the FCC rules are stated: "An amateur station shall not intentionally obscure the meaning ..." Encrypting just login & password strings doesn't obscure the meaning does it? Also using encryption can be classified as an "unspecified" digital code, which is permitted as long as you provide public documentation for it.   Which can be fulfilled much the way the ARRL HSMM created a standardized WEP key that they posted on their webpage.

The use of encryption has actually been legal all along.  For the communications purposes of; network security and access control, emergency communications, and practice for same—our purposes in using encryption are the security of the network and the privacy of third-party information. In either case, the purpose is not to obscure meaning.

It should also be clarified that whatever encryption methods you use —WEP, WPA, WPA2, or whatever—it must be publicly documented. Please note that this specifically means the encryption algorithm, not the encryption key.

Name: Anonymous 2012-12-08 2:05

>>38
It should also be clarified that whatever encryption methods you use —WEP, WPA, WPA2, or whatever—it must be publicly documented. Please note that this specifically means the encryption algorithm, not the encryption key.
What if you super-encrypt?

Name: Anonymous 2012-12-08 2:07

>>34
Same problem, and also expensive. You also require licenses for the frequencies that you use.
Yeah, right, banning the 2.4GHz band. Why not ban knives too, those can be used by criminals.

But before I get too involved, please detail your plans of how exactly steganography would be useful.
For short messages (under, say, 10KB, so perfectly suitable for email), steganography (used in conjunction with cryptography) completely defeats DPI and any kind of crypto regulations. Simply that fact alone is enough to prove that surveillance and crypto legislation are nothing but a mere hindrance to ``hardcore cybercriminals''.

You are already required to turn over keys and passwords to the government when requested.
Depends on the country. Also, that kind of request requires a warrant (except in prison state UK), so if they have a keys/passwords warrant they could probably have gotten a hardware keylogger warrant anyway.

You are already required to have a license to use the airwaves (It's just an EM wave! How can they possibly regulate an natural phenomenon and a fundamental force of nature?!?!?!?).
That one actually makes sense, because the spectrum crosses property boundaries easily and, generally, waves emitted by someone on their private property will travel far beyond that, into public space, potentially interfering with other people's communications. Someone needs to arbitrate that, so naturally the public servants do it.

It's illegal to export software, including cryptographic software, to many countries.
I heard Zimmerman still sells his OpenPGP source code book overseas.

The idea that math can't be banned or that information wants to be free is purely academic.
And it is entirely correct.

Governments
You mean public servants?

operate in the real world, and if you don't follow their laws, they will send scary men to to take you and put you in prison.
Good old confinement torture.

they won't care any more about what you say that they care about potheads who keep saying that it's wrong to ban a naturally growing plant.
And they are also absolutely right. Most [i]possession[/u] crimes are idiotic by definition (maybe with the exception of loaded guns and bombs).

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List