Follow Slashdot stories on Twitter
'They're going after people who are really not criminals,' said David Smith, a former federal prosecutor who is now a forfeiture expert and lawyer in Virginia. 'They're middle-class citizens who have never had any trouble with the law.'" The article describes several specific cases, all of which are beyond egregious and are in fact entirely unconstitutional. The Bill of Rights is very clear about this: The federal government cannot take private property without just compensation."
Some interesting segments from the interview include: Snowden's assertion that mass domestic intercept is an "unreasonable seizure" under the 4th Amendment; that it also violates "natural rights" that cannot be voted away even by the majority; a claim that broad surveillance detracts from the ability to monitor specific targets such as the Boston Marathon bombers; him calling out Congress for not holding Clapper accountable for misstatements; and his lament that contractors are exempt from whistleblower protection though they do swear an oath to defend the Constitution from enemies both foreign and domestic.
These points have been brought up before. But what may be most interesting to these students is Snowden's suggestion that a defendant under the Espionage Act should be permitted to present an argument before a jury that the act was committed "in the public interest." Could this help ensure a fair trial for whistleblowers whose testimony reveals Constitutional violation?
The National Strategy for Trusted Identities in Cyberspace (NSTIC) is working towards a distributed identity ecosystem that facilitates authentication and authorization without compromising privacy. NSTIC points out that this is a great opportunity to leverage the technology to enable a wide array of new citizen-facing digital services while reducing costs and hassles for individuals and government agencies alike.
What Pitts found during his research is that an attacker with a MITM position can actively patch binaries–if not security updates–with his own code. In terms of defending against the sort of attack, Pitts suggested that encrypted download channels are the best option, both for users and site operators. "SSL/TLSis the only way to prevent this from happening. End-users may want to consider installing HTTPS Everywhere or similar plugins for their browser to help ensure their traffic is always encrypted," he said via email.
- Sell user-specific data to a third party
- Enter into an agreement to display paid advertising on behalf of a third party; and
- In the event of an acquisition or asset transfer, the Company shall require any acquiring entity to adopt these requirements with respect to the operation of Ello or its assets.
While that might turn off some potential revenue flows (the company says it will make money by selling optional features), as the linked article points out, it hasn't turned off investors; Ello has now raised $5.5 million from investors.