LINUX JOURNAL (ISSN 1075-3583) Is Published Monthly by Linux Journal, LLC

Total Page:16

File Type:pdf, Size:1020Kb

LINUX JOURNAL (ISSN 1075-3583) Is Published Monthly by Linux Journal, LLC Getting Started Review: the A Look at GDPR’s with Nextcloud Librem 13v2 Massive Impact Since 1994: The original magazine of the Linux community PRIVACY HOW TO PROTECT YOUR DATA EFFECTIVE PRIVACY PLUGINS GIVE YOUR SERVERS SOME PRIVACY WITH TOR HIDDEN SERVICES INTERVIEW: PRIVATE INTERNET ACCESS GOES OPEN SOURCE ISSUE 286 | MAY 2018 www.linuxjournal.com MAY 2018 CONTENTS ISSUE 286 82 DEEP DIVE: PRIVACY 83 Data Privacy: Why It Matters and How to Protect Yourself by Petros Koutoupis When it comes to privacy on the internet, 118 Facebook the safest approach is to cut your Ethernet cable or power down your Compartmentalization device. In reality though, most people by Kyle Rankin can’t actually do that and remain productive. This article provides an I don’t always use Facebook, but when overview of the situation, steps you I do, it’s over a compartmentalized can take to mitigate risks and finishes browser over Tor. with a tutorial on setting up a virtual private network. 121 The Fight for Control: 106 Privacy Plugins Andrew Lee on by Kyle Rankin Open-Sourcing PIA by Doc Searls Protect yourself from privacy-defeating ad trackers and malicious JavaScript with When I learned that our sister company, these privacy-protecting plugins. Private Internet Access (PIA) was opening its source code, I immediately wanted to know the backstory, especially since 113 Tor Hidden Services privacy is the theme of this month’s issue. So I contacted Andrew Lee, who founded by Kyle Rankin PIA, and an interview ensued. Why should clients get all the privacy? Give your servers some privacy too! 2 | May 2018 | http://www.linuxjournal.com CONTENTS 6 From the Editor—Doc Searls Privacy Is Still Personal 10 Letters UPFRONT 15 Product Review: GitStorage by Petros Koutoupis 19 Readers’ Choice Awards 23 FOSS Project Spotlight: Sawmill, the Data Processing Project by Daniel Berman 29 FOSS Project Spotlight: CloudMapper, an AWS Visualization Tool by Scott Piper 34 Caption This: May Winner 35 Visualizing Molecules with EasyChem by Joey Bernard 40 Is It Linux or GNU/Linux? by Christine Hall 44 News Briefs COLUMNS 46 Reuven M. Lerner’s At the Forge Examining Data Using Pandas 56 Shawn Powers’ The Open-Source Classroom Review: the Librem 13v2 67 Zack Brown’s diff -u What’s New in Kernel Development 74 Dave Taylor’s Work the Shell Generating Good Passwords 170 Glyn Moody’s Open Sauce The GDPR Takes Open Source to the Next Level LINUX JOURNAL (ISSN 1075-3583) is published monthly by Linux Journal, LLC. Subscription-related correspondence may be sent to 9597 Jones Rd, #331, Houston, TX 77065 USA. Subscription rate is $34.50/year. Subscriptions start with the next issue. 3 | May 2018 | http://www.linuxjournal.com CONTENTS ARTICLES 128 Programming in Color with ncurses by Jim Hall Jim demonstrates color manipulation with curses by adding colors to his terminal adventure game. 142 FOSS as a Part of a Corporate Sustainability Plan by VM (aka Vicky) Brasseur Free and open-source software is a critical part of your company’s supply chain. Here’s why and how you can include it in your corporate sustainability plan. 151 Nextcloud 13: How to Get Started and Why You Should by Marco Fioretti Nextcloud could be the first step toward replacing proprietary services like Dropbox and Skype. AT YOUR SERVICE SUBSCRIPTIONS: Linux Journal is available as a digital magazine, in We've wiped off all old advertising from Linux Journal and are starting with PDF, EPUB and MOBI formats. Renewing your subscription, changing your a clean slate. Ads we feature will no longer be of the spying kind you find on email address for issue delivery, paying your invoice, viewing your account most sites, generally called "adtech". The one form of advertising we have details or other subscription inquiries can be done instantly online: brought back is sponsorship. That's where advertisers support Linux Journal http://www.linuxjournal.com/subs. Email us at [email protected] or reach because they like what we do and want to reach our readers in general. us via postal mail at Linux Journal, 9597 Jones Rd #331, Houston, TX 77065 USA. At their best, ads in a publication and on a site like Linux Journal provide Please remember to include your complete name and address when contacting us. useful information as well as financial support. There is symbiosis there. For further information, email: [email protected] or call ACCESSING THE DIGITAL ARCHIVE: Your monthly download notifications +1-281-944-5188. will have links to the different formats and to the digital archive. To access the digital archive at any time, log in at http://www.linuxjournal.com/digital. WRITING FOR US: We always are looking for contributed articles, tutorials and real-world stories for the magazine. An author’s guide, a list of topics and LETTERS TO THE EDITOR: We welcome your letters and encourage you due dates can be found online: http://www.linuxjournal.com/author. to submit them at http://www.linuxjournal.com/contact or mail them to Linux Journal, 9597 Jones Rd #331, Houston, TX 77065 USA. Letters may NEWSLETTERS: Receive late-breaking news, technical tips and tricks, be edited for space and clarity. an inside look at upcoming issues and links to in-depth stories featured on http://www.linuxjournal.com. Subscribe for free today: SPONSORSHIP: We take digital privacy and digital responsibility seriously. http://www.linuxjournal.com/enewsletters. 4 | May 2018 | http://www.linuxjournal.com EDITOR IN CHIEF: Doc Searls, [email protected] EXECUTIVE EDITOR: Jill Franklin, [email protected] TECH EDITOR: Kyle Rankin, [email protected] ASSOCIATE EDITOR: Shawn Powers, [email protected] CONTRIBUTING EDITOR: Petros Koutoupis, [email protected] CONTRIBUTING EDITOR: Zack Brown, [email protected] SENIOR COLUMNIST: Reuven Lerner, [email protected] SENIOR COLUMNIST: Dave Taylor, [email protected] PUBLISHER: Carlie Fairchild, [email protected] Join a ASSOCIATE PUBLISHER: Mark Irgang, [email protected] community DIRECTOR OF DIGITAL EXPERIENCE: Katherine Druckman, [email protected] GRAPHIC DESIGNER: Garrick Antikajian, [email protected] with a deep ACCOUNTANT: Candy Beauchamp, [email protected] appreciation COMMUNITY ADVISORY BOARD John Abreau, Boston Linux & UNIX Group; John Alexander, Shropshire Linux User Group; Robert Belnap, Classic Hackers UGA Users Group; Aaron Chantrill, Bellingham Linux Users Group; for open-source Lawrence D’Oliveiro, Waikato Linux Users Group; Chris Ebenezer, Silicon Corridor Linux User Group; David Egts, Akron Linux Users Group; Michael Fox, Peterborough Linux User Group; Braddock Gaskill, San Gabriel Valley Linux Users’ Group; Roy Lindauer, Reno Linux Users Group; Scott Murphy, Ottawa Canada Linux Users Group; Andrew Pam, Linux Users of Victoria; philosophies, Bob Proulx, Northern Colorado Linux User's Group; Ian Sacklow, Capital District Linux Users Group; Ron Singh, Kitchener-Waterloo Linux User Group; Jeff Smith, Kitchener-Waterloo Linux User Group; Matt Smith, North Bay Linux Users’ Group; James Snyder, Kent Linux User Group; Paul Tansom, Portsmouth and South East Hampshire Linux User Group; digital Gary Turner, Dayton Linux Users Group; Sam Williams, Rock River Linux Users Group; Stephen Worley, Linux Users’ Group at North Carolina State University; Lukas Yoder, Linux Users Group at Georgia Tech freedoms Linux Journal is published by, and is a registered trade name of, Linux Journal, LLC. 4643 S. Ulster St. Ste 1120 Denver, CO 80237 and privacy. SUBSCRIPTIONS E-MAIL: [email protected] URL: www.linuxjournal.com/subscribe Mail: 9597 Jones Rd, #331, Houston, TX 77065 Subscribe to SPONSORSHIPS Linux Journal E-MAIL: [email protected] Contact: Publisher Carlie Fairchild Digital Edition Phone: +1-281-944-5188 for only $2.88 an issue. LINUX is a registered trademark of Linus Torvalds. SUBSCRIBE Private Internet Access is a proud sponsor of Linux Journal. TODAY! 5 | May 2018 | http://www.linuxjournal.com FROM THE EDITOR Privacy Is Still Personal Doc Searls is a veteran We solved privacy in the natural world with journalist, author and part-time academic who spent more than clothing, shelter, manners and laws. So far in two decades elsewhere on the the digital world, we have invisibility cloaks Linux Journal masthead before becoming Editor in Chief when and the GDPR. The fastest way to get the rest the magazine was reborn in of what we need is to recognize that privacy January 2018. His two books are The Cluetrain Manifesto, isn’t a grace of platforms or governments. which he co-wrote for Basic Books in 2000 and updated in 2010, and The Intention By Doc Searls Economy: When Customers Take Charge, which he wrote for Harvard Business Review Press In the physical world, privacy isn’t controversial. In the digital in 2012. On the academic front, world, it is. Doc runs ProjectVRM, hosted at Harvard’s Berkman Klein Center for Internet and Society, The difference is that we’ve had thousands of years to work out where he served as a fellow privacy in the physical world, and about 20 in the digital one. So from 2006–2010. He was also it should help to cut ourselves a little slack while we come up a visiting scholar at NYU’s graduate school of journalism with the tech, plus the manners and laws to go with it—in that from 2012–2014, and he has order. (Even though the gun has been jumped in some cases.) been a fellow at UC Santa Barbara’s Center for Information Technology and Society since To calibrate a starting perspective, it might help to start with 2006, studying the internet as what Yuval Noah Harari says in his book Sapiens: A Brief History a form of infrastructure. of Humankind: Judicial systems are rooted in common legal myths. Two lawyers who have never met can nevertheless combine efforts to defend a complete stranger because they both believe in 6 | May 2018 | http://www.linuxjournal.com FROM THE EDITOR the existence of laws, justice, human rights—and the money paid out in fees.
Recommended publications
  • A Usability Evaluation of Privacy Add-Ons for Web Browsers
    A Usability Evaluation of Privacy Add-ons for Web Browsers Matthew Corner1, Huseyin Dogan1, Alexios Mylonas1 and Francis Djabri2 1 Bournemouth University, Bournemouth, United Kingdom {i7241812,hdogan,amylonas}@bournemouth.ac.uk 2 Mozilla Corporation, San Francisco, United States of America [email protected] Abstract. The web has improved our life and has provided us with more oppor- tunities to access information and do business. Nonetheless, due to the preva- lence of trackers on websites, web users might be subject to profiling while ac- cessing the web, which impairs their online privacy. Privacy browser add-ons, such as DuckDuckGo Privacy Essentials, Ghostery and Privacy Badger, extend the privacy protection that the browsers offer by default, by identifying and blocking trackers. However, the work that focuses on the usability of the priva- cy add-ons, as well as the users’ awareness, feelings, and thoughts towards them, is rather limited. In this work, we conducted usability evaluations by uti- lising System Usability Scale and Think-Aloud Protocol on three popular priva- cy add-ons, i.e., DuckDuckGo Privacy Essentials, Ghostery and Privacy Badg- er. Our work also provides insights into the users’ awareness of online privacy and attitudes towards the abovementioned privacy add-ons; in particular trust, concern, and control. Our results suggest that the participants feel safer and trusting of their respective add-on. It also uncovers areas for add-on improve- ment, such as a more visible toolbar logo that offers visual feedback, easy ac- cess to thorough help resources, and detailed information on the trackers that have been found. Keywords: Usability, Privacy, Browser Add-ons.
    [Show full text]
  • Hipeac Conference 2021 Virtual Event
    62 JANUARY 2021 HiPEAC conference 2021 Virtual event HiPEAC Vision roadmap 2021: taking a whole systems approach Tulika Mitra on taking edge computing to the next stage Evangelos Eleftheriou on the possibilities of in-memory computing Brad McCredie on exascale and beyond contents 16 18 19 IBM’s Evangelos Eleftheriou on AMD’s Brad McCredie on HPC Tulika Mitra on the way forward in-memory computing and exascale for edge computing 3 Welcome 32 Technology transfer Koen De Bosschere Signaloid: A new approach to computation that interacts with the physical world 4 Policy corner Vasileios Tsoutsouras Two very different twins Sandro D’Elia 34 Technology transfer Nostrum Biodiscovery pyDock: specialised software 6 News enabling drug design and discovery 16 HiPEAC voices Ezequiel Mas Del Molino ‘It’s not that often that you get involved in developing 36 SME snapshot and nurturing a new computing paradigm’ Nosh Technologies Evangelos Eleftheriou Somdip Dey 18 HiPEAC voices 37 SME snapshot ‘Our biggest challenges in the world today are limited by Maspatechnologies: supporting regulatory compliance in what is computationally possible’ safety-critical industries Brad McCredie Jaume Abella and Francisco J. Cazorla 19 HiPEAC voices 38 Peac performance Pushing the frontiers of edge computing Accemic Technologies: CEDARtools – look inside your Tulika Mitra processor (without affecting it) 20 The future Alexander Weiss and Thomas Preusser HiPEAC Vision 39 Peac performance The HiPEAC Vision editorial board PreVIous: a useful tool for decision making in the
    [Show full text]
  • SYNDICATION Partner with Future OUR PURPOSE
    SYNDICATION Partner With Future OUR PURPOSE We change people’s lives through “sharing our knowledge and expertise with others, making it easy and fun for them to do what they want ” CONTENTS ● The Future Advantage ● Syndication ● Our Portfolio ● Company History THE FUTURE ADVANTAGE Syndication Our award-winning specialist content can be used to further enrich the experience of your audience. Whilst at the same time saving money on editorial costs. We have 4 million+ images and 670,000 articles available for reuse. And with the support of our dedicated in-house licensing team, this content can be seamlessly adapted into a range of formats such as newspapers, magazines, websites and apps. The Core Benefits: ● Internationally transferable content for a global audience ● Saving costs on editorial budget so improving profit margin ● Immediate, automated and hassle-free access to content via our dedicated content delivery system – FELIX – or custom XML feeds ● Friendly, dynamic and forward-thinking licensing team available to discuss editorial requirements #1 ● Rich and diverse range of material to choose from ● Access to exclusive content written by in-house expert editorial teams Monthly Bookazines Global monthly Social Media magazines users Fans 78 2000+ 148m 52m Source: Google Search 2018 SYNDICATION ACCESS the entire Future portfolio of market leading brands within one agreement. Our in context licence gives you the ability to publish any number of features, reviews or interviews to boost the coverage and quality of your publications. News Features Interviews License the latest news from all our Our brands speak to the moovers and area’s of interest from a single shakers within every subject we write column to a Double Page spread.
    [Show full text]
  • Downloading Additional Components of the Webpage
    Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning Muhammad Ikramy1, Hassan Jameel Asghary, Balachander Krishnamurthy Mohamed Ali Kaafary, Anirban Mahantiy AT&T Labs–Research, USA 1 School of EET UNSW, Australia y NICTA, Australia Abstract—Numerous tools have been developed to aggressively and tailor advertisements on websites to the browsing history block the execution of popular JavaScript programs in Web and web activities of users [1], [2], [3]. The class of tools browsers. Such blocking also affects functionality of webpages (including web browser plugins), developed in an attempt to and impairs user experience. As a consequence, many privacy preserve user privacy (e.g., NoScript [4], Ghostery [5], and preserving tools that have been developed to limit online tracking, Adblock Plus [6]), aims to block JavaScript programs and other often executed via JavaScript programs, may suffer from poor components of a webpage that may compromise user privacy performance and limited uptake. A mechanism that can isolate JavaScript programs necessary for proper functioning of the and enable tracking. However, aggressive blocking can hinder website from tracking JavaScript programs would thus be useful. proper functioning of the website and impact user’s browsing Through the use of a manually labelled dataset composed of 2,612 experience [7], [8] (See AppendixE for an example of how JavaScript programs, we show how current privacy preserving a tool blocks content necessary for proper website function.). tools are ineffective in finding the right balance between blocking A mechanism that can properly isolate JavaScript programs tracking JavaScript programs and allowing functional JavaScript necessary for “legitimate” web functioning of the website from code.
    [Show full text]
  • Privacy Badger One-Pager-1
    EFF DEVELOPS SOFTWARE TO ENHANCE PRIVACY AND SECURE COMMUNICATIONS ONLINE Stop Creepy Online Tracking with Privacy Badger • Some companies quietly track you as you browse the web, recording what webpages you visit, for how long, and more—even if you’ve opted out by using Do Not Track! • Privacy Badger is a browser add-on that automatically stops these “third-party” trackers. To the trackers, it's like you suddenly disappeared from the web. • Privacy Badger is different from other add-ons like Disconnect, Ad-Block Plus, and Ghostery because Privacy Badger focuses on blocking tracking, not blocking ads (though some ad-blocking may occur if the tracker is actually an advertiser.) How Does Privacy Badger Work? • As you browse the web, Privacy Badger observes which third-party sources ask to load possible tracking content in your browser. • If the same source shows up repeatedly across multiple different websites asking your browser to set unique tracking cookies, Privacy Badger flags that source and tells your browser not to load any more content from it. • When your browser stops loading content from a source, that source can no longer track you. Voila—you’re now free from creepy tracking. Get Privacy Badger Today! • Visit https://www.eff.org/privacybadger to download Privacy Badger for Chrome or Firefox, or to learn more. • Also check out our other awesome add-on, HTTPS Everywhere. https://www.eff.org/https-everywhere Support EFF’s creation of even more tools to enhance privacy and security online by becoming a member today! https://www.eff.org/join .
    [Show full text]
  • A Deep Dive Into the Technology of Corporate Surveillance
    Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Author: Bennett Cyphers and Gennie Gebhart ​ A publication of the Electronic Frontier Foundation, 2019. “Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). View this report online: https://www.eff.org/wp/behind-the-one-way-mirror ELECTRONIC FRONTIER FOUNDATION 1 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Behind the One-Way Mirror A Deep Dive Into the Technology of Corporate Surveillance BENNETT CYPHERS AND GENNIE GEBHART December 2, 2019 ELECTRONIC FRONTIER FOUNDATION 2 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction 4 First-party vs. third-party tracking 4 What do they know? 5 Part 1: Whose Data is it Anyway: How Do Trackers Tie Data to People? 6 Identifiers on the Web 8 Identifiers on mobile devices 17 Real-world identifiers 20 Linking identifiers over time 22 Part 2: From bits to Big Data: What do tracking networks look like? 22 Tracking in software: Websites and Apps 23 Passive, real-world tracking 27 Tracking and corporate power 31 Part 3: Data sharing: Targeting, brokers, and real-time bidding 33 Real-time bidding 34 Group targeting and look-alike audiences 39 Data brokers 39 Data consumers 41 Part 4: Fighting back 43 On the web 43 On mobile phones 45 IRL 46 In the legislature 46 ELECTRONIC FRONTIER FOUNDATION 3 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction Trackers are hiding in nearly every corner of today’s Internet, which is to say nearly every corner of modern life.
    [Show full text]
  • People's Tech Movement to Kick Big Tech out of Africa Could Form a Critical Part of the Global Protests Against the Enduring Legacy of Racism and Colonialism
    CONTENTS Acronyms ................................................................................................................................................ 1 1 Introduction: The Rise of Digital Colonialism and Surveillance Capitalism ..................... 2 2 Threat Modeling .......................................................................................................................... 8 3 The Basics of Information Security and Software ............................................................... 10 4 Mobile Phones: Talking and Texting ...................................................................................... 14 5 Web Browsing ............................................................................................................................ 18 6 Searching the Web .................................................................................................................... 23 7 Sharing Data Safely ................................................................................................................... 25 8 Email Encryption ....................................................................................................................... 28 9 Video Chat ................................................................................................................................... 31 10 Online Document Collaboration ............................................................................................ 34 11 Protecting Your Data ................................................................................................................
    [Show full text]
  • BIG DATA Handbook a Guide for Lawyers
    W BIG DATA Handbook A Guide for Lawyers Robert Maier, Partner, Baker Botts Joshua Sibble, Senior Associate, Baker Botts BIG DATA Handbook—A Guide for Lawyers Executive Summary BIG DATA AND THE FUTURE OF COMMERCE Big Data is the future. Each year Big Data—large sets of data processed to reveal previously unseen trends, behaviors, and other patterns—takes on an increasingly important role in the global economy. In 2010, the Big Data market was valued at $100 billion worldwide, and it is expected to grow to over $200 billion by 2020. The power of Big Data and artificial intelligence to crunch vast amounts of information to gain insights into the world around us, coupled with the emerging ubiquity of the Internet of Things (IoT) to sense and gather that data about nearly everything on earth and beyond, has triggered a revolution the likes of which have not been seen since the advent of the personal computer. These technologies have the potential to shatter the norms in nearly every aspect of society—from the research into what makes a workforce happier and more productive, to healthcare, to the ways we think about climate change, and to the ways we bank and do business. Not surprisingly, it seems everyone is getting into the Big Data game, from the expected—multinational computer hardware, software, and digital storage manufacturers—to the unexpected—real estate agents, small businesses, and even wildlife conservationists. Within a few years, every sector of the global economy will be touched in some way by Big Data, its benefits, and its pitfalls.
    [Show full text]
  • Tracking the Cookies a Quantitative Study on User Perceptions About Online Tracking
    Bachelor of Science in Computer Science Mars 2019 Tracking the cookies A quantitative study on user perceptions about online tracking. Christian Gribing Arlfors Simon Nilsson Faculty of Computing, Blekinge Institute of Technology, 371 79 Karlskrona, Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. The authors declare that they are the sole authors of this thesis and that they have not used any sources other than those listed in the bibliography and identified as references. They further declare that they have not submitted this thesis at any other institution to obtain a degree. Contact Information: Author(s): Christian Gribing Arlfors E-mail: [email protected] Simon Nilsson E-mail: [email protected] University advisor: Fredrik Erlandsson Department of Computer Science Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE–371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 Abstract Background. Cookies and third-party requests are partially implemented to en- hance user experience when traversing the web, without them the web browsing would be a tedious and repetitive task. However, their technology also enables com- panies to track users across the web to see which sites they visit, which items they buy and their overall browsing habits which can intrude on users privacy. Objectives. This thesis will present user perceptions and thoughts on the tracking that occurs on their most frequently visited websites.
    [Show full text]
  • The Elephant in the Background: a Quantitative Approach to Empower Users Against Web Browser Fingerprinting
    The Elephant in the Background: A Quantitative Approach to Empower Users Against Web Browser Fingerprinting Anonymous Abstract—Tracking users is a ubiquitous practice in the web Furthermore, other researchers have concentrated their ef- today. User activity is recorded on a large scale and analyzed forts on creating new fingerprinting techniques, e.g. by using by various actors to create personalized products, forecast future canvas [24] and audio objects [30] or via CSS [37]. Others behavior, and prevent online fraud. While so far HTTP cookies have significantly improved known techniques with machine have been the weapon of choice, new and more pervasive learning [42] or by extracting fingerprinting features more techniques such as browser fingerprinting are gaining traction. passively via extension activity tracking [36]. Hence, in this paper, we describe how users can be empowered against JavaScript fingerprinting by showing them when, how, The sheer diversity of fingerprinting techniques available and who is tracking them. To this end, we conduct a systematic analysis of various JavaScript fingerprinting tools. Based on this to us begs the question of which techniques are really being analysis, we design and develop FPMON: a light-weight and used and which ones are not? So far, large scale studies have comprehensive fingerprinting monitor that measures and rates only uncovered specific instances of fingerprinting and these JavaScript fingerprinting activity on any given website in real- are over 5-10 years old [1,2]. In particular, we currently lack time. Using FPMON, we evaluate the Alexa 10k most popular a comprehensive view of fingerprinting activity on the web websites to i) study the pervasiveness of JavaScript fingerprinting; today.
    [Show full text]
  • Haggart EFF and the Political Economy of the American Digital
    1 The Electronic Frontier Foundation and the Political Economy of the American Digital Rights Movement Abstract: As one of the world’s most prominent (if not the most prominent) digital-rights group, and one with a reputation for principled stands, EFF’s views on digital-platform regulation have an outsized influence on policy options not only in the United States, but abroad. Systematically outlining EFF’s digital political economy thus helps to highlight how it defines the issue, and whose interests it promotes. To analyze the EFF’s economic ideology, this paper proposes a five- point framework for assessing the political economy of knowledge that draws on Susan Strange’s theories of structural power and the knowledge structure. It focuses on the control of key forms of knowledge, the role of the state and borders, and attitudes toward surveillance. The paper applies this framework primarily to four years (2015-2018) of EFF blog postings in its annual “Year in Review” series on its “Deeplinks” blog (www.eff.org/deeplinks), drawing out the specific themes and focuses of the organization, including the relative prevalence of economic versus non-economic (such as, for example, state surveillance) issues. The revealed ideology – favouring American-based self-regulation, individual responsibility for privacy, relative support for corporate surveillance, minimalist intellectual property protection, and free cross-border data flows – mirrors the interests of the large American internet platforms. Blayne Haggart Associate Professor, Department of Political Science Brock University St. Catharines, Canada Research Fellow Centre for Global Cooperation Research University of Duisburg-Essen Duisburg, Germany [email protected] Paper presented at the annual International Studies Association Meeting, Toronto, ON, March 27-30, 2019 2 Draft paper.
    [Show full text]
  • Curriculum Vitae
    William Weinberg 408-568-2492 [email protected] May 2010 The following resume details my professional experience in the IT industry. Highlights include ♦ Two-decade track record in embedded/mobile, desktop and enterprise computing; over thirteen years hands-on experience with Linux, Open Source, and Open Systems ♦ Executive and thought-leadership roles at both start-ups and established firms, including General Manager, Country Manager, and Director of Marketing ♦ Market and technology know-how targeting mobile, consumer electronics, data and tele- communications, industrial control, instrumentation and aerospace/defense ♦ Expertise in Open Source practices, licensing and distribution, Linux kernel and OS tech- nology, s/w and h/w ecosystems ♦ Deep knowledge of tools, OSes (Linux/UNIX, Android, Symbian, RTOSes), middleware and applications development ♦ Extensive US and international experience “on the ground” in North America, Asia, Europe, and Latin America; strong communications skills in Portuguese, Italian and French ♦ Consulting experience in open source, business strategy and market analysis with clients including FT/Orange, HP, Intel, Mentor Graphics, MIPS, Palm, Synopsys, Wind River and other segment leaders ♦ Evangelist and author of over 160 articles, on topics ranging from mobile and embedded computing to open source and software licensing, virtualization and security ♦ Faculty chair and track manager for mobile/embedded at Linux Collaboration Summit and Open Source World; top-rated speaker at Informa Open Mobility, LinuxWorld, O’Reilly E- Tel and other conferences; frequent panelist and panel leader Looking forward Bill Weinberg Additional background information at http://www.linuxpundit.com William Weinberg 408-568-2492 [email protected] Professional Experience Olliance Group Palo Alto, CA : 2009-present Senior Executive / Mobile Open Source Practice Partner Responsible for definition, marketing and execution of mobile/embedded practice engage- ments.
    [Show full text]