Monthly Archives: December 2011

Your IP Address is not anonymous!

There was a thread on Slashdot today about an “Anonymous hacker” who got caught by the FBI after launching a Denial of Service attack. As explained in this news report, this young man downloaded the “Low Orbit Ion Cannon” tool … Continue reading

Posted in Uncategorized | Leave a comment

Walled gardens, walled spyware

Steve Jobs justified the “walled garden” approach of the IPhone’s App Store by saying that it provided freedom, freedom from spam, freedom from viruses, freedom from porn. In theory, he had a point about viruses. In theory, if all apps … Continue reading

Posted in Uncategorized | 1 Comment

Can Telex.CC build censorship evasion in the network?

A colleague pointed me to Telex.CC, a project from the University of Michigan that proposes “a new approach to circumventing Internet censorship that is intended to help citizens of repressive governments freely access online services and information.” They start from … Continue reading

Posted in Uncategorized | Leave a comment

Can we achieve private publication in a public DHT?

Many peer-to-peer systems rely on Distributed Hash Tables. DHT allow publication of indexed data through a set of cooperating nodes. For example, in the P2P SIP design, a SIP node can publish its current location, e.g. “host-29.some-network.net,” indexed by the … Continue reading

Posted in Uncategorized | 1 Comment