Latest Activity

Profile IconTerry Christensen , micomascho and Theresa Kappos joined Atheist Universe
6 hours ago
Davy left a comment for Kristalyn Mowers
13 hours ago
Davy left a comment for micomascho
13 hours ago
Stephen Brodie left a comment for micomascho
14 hours ago
Stephen Brodie posted a photo
19 hours ago
Carolyn Barratt and Neal are now friends
21 hours ago
Neal left a comment for Theresa Kappos
23 hours ago
Neal left a comment for Theresa Kappos
yesterday
Neal posted a photo
yesterday
Chris commented on Stephen Brodie's blog post Maybe I'm soft but this made me cry
yesterday
Davy left a comment for Jeff Sauvageau
yesterday
Neal commented on Michel's group Our Climate
yesterday
Stephen Brodie posted a blog post
yesterday
Chris replied to Sassan K.'s discussion How does one go from atheism to religion?
yesterday
Chris commented on Abdussalam A. Aljoffe's status
yesterday
Chris left a comment for Danielle Zana
Monday

We are a worldwide social network of freethinkers, atheists, agnostics and secular humanists.

Information

Internet

An internet group about The Internet.

The internet is both a telecommunication medium and a culture. We have embraced it because of its immediacy, its pervasiveness and its usefulness.

Even though for most of us its workings is equivalent to magic and it's enough to know that it's very 'complicated and technical,' it has become an intricate part of our life.

Let's talk about this.

Location: #science
Members: 14
Latest Activity: Oct 25, 2013

The Internet

This is a partial portrait of the Internet. Imagine that at the tip of each branch there is one or multiple human brains operating and that each one of these terminals can be instantly connected to any other, anywhere.

If we could map this image to the surface of the Earth it would make it even more obvious that this network of networks is like a new organ that has been grafted onto the biosphere.

Partial map of the Internet based on the January 15, 2005 data found on opte.org. Each line is drawn between two nodes, representing two IP addresses. The length of the lines are indicative of the delay between those two nodes. This graph represents less than 30% of the Class C networks reachable by the data collection program in early 2005. Lines are color-coded according to their corresponding RFC 1918 allocation as follows:

Dark blue: net, ca, us
Green: com, org
Red: mil, gov, edu
Yellow: jp, cn, tw, au, de
Magenta: uk, it, pl, fr
Gold: br, kr, nl
White: unknown

Click here for a high-resolution 8MB image.

Discussion Forum

The NSA may have won a round but are losing the war!

Started by Davy. Last reply by Chris Oct 13, 2013. 1 Reply

THE CORE INTERNET INSTITUTIONS ABANDON THE US GOVERNMENTIn Montevideo, Uruguay this week, the Directors of all the major Internet organizations – ICANN, the Internet Engineering Task Force, the…Continue

Tags: China, internet, governance, Brazil, Russia

So you think the cloud is Safe?

Started by Davy. Last reply by Chris Sep 26, 2013. 12 Replies

In the digital age, your files and memories are not truly yours any more. They belong to the cloudKYLE GOODWIN wants his stuff back. One day, he decided to set up a company in Ohio to …Continue

Tags: data, storage, computing, Cloud

ARE WE SMARTER YET? HOW COLLEGES ARE MISUSING THE INTERNET

Started by doone. Last reply by Neal Sep 5, 2013. 2 Replies

ARE WE SMARTER YET? HOW COLLEGES ARE MISUSING THE INTERNETby Akim ReinhardtWe should all probably be a lot smarter…Continue

Tags: MISUSING, THE, INTERNET, COLLEGES, HOW

Wearable computers challenge human rights

Started by Davy Jul 24, 2013. 0 Replies

The thoughtless adoption of new technologies seduces us into providing more of our personal selves without any concerns for the protection of our personal data, argues Katina Michael an associate…Continue

Tags: sensors, information, technology, computers, rights

Your Daily Dot

Loading… Loading feed

Comment Wall

Comment

You need to be a member of Internet to add comments!

Comment by Chris on October 25, 2013 at 7:39am

September 6, 2013 | By Maira Sutton

International Criticism Escalates Against TPP as Negotiations Go Fu...

This week, trade delegates met in San Francisco to discuss the Trans-Pacific Partnership (TPP) agreement's e-commerce chapter. It's likely that this secret chapter carries provisions that whittle away at user data protections [pdf]. But we weren't able to say so at this meeting. Not only have they neglected to notify digital rights groups—including EFF, which is based in San Francisco—about the meeting, we could not even discover where it was taking place.

Delegates from TPP countries are right now holding these secretive "inter-sessional" meetings here and in other undisclosed cities around the world. Trade reps for specific issue areas are hammering out "unresolved" issues that are holding up the conclusion of the agreement, and doing so by becoming even more secretive and evasive than ever.

We only heard about a TPP meeting on intellectual property in Mexico City in September through the diplomatic rumor-mill, since the US Trade Rep is no longer bothering to announce the dates or locations of these closed-door side meetings. During this round in Mexico, countries that have been resistant to U.S. demands to sign onto highly restrictive copyright enforcement standards may ultimately be strong-armed into doing so.

More Here

Comment by Davy on October 2, 2013 at 5:32pm

Microsoft is just lucky they ain't being sued for the same thing!

Comment by Chris on October 2, 2013 at 1:33pm

Google Is Being Sued For Reading Email To Target Ads

A U.S. judge has agreed to allow a class action lawsuit against Google to proceed.

In the suit, nine plaintiffs say that Google violated several laws, such as federal anti-wiretapping laws, by reading email messages in order to target ads, reports Reuters' Dan Levine.

Google asked the judge to dismiss the suit, arguing that users consented to this when they agreed to Google's terms of

service. But the U.S. District Judge Lucy Koh in San Jose, Calif., didn't see it that way.

"Nothing in the policies suggests that Google intercepts email communication in transit between users, [of course not, they do it while the email rests on their servers before you download it (emphasis and comment mine)] and in fact, the policies obscure Google's intent to engage in such interceptions," Koh wrote.

Obviously, just because a trial may take place doesn't mean Google won't settle out-of-court or, if it fights,

A Google spokesperson told us: "We're disappointed in this decision and are considering our options. Automated scanning lets us provide Gmail users with security and spam protection, as well as great features like Priority Inbox."

Even so, Microsoft has got to be doing the happy dance.

It's been engaged in a sometimes witty, sometimes vicious, marketing campaign called "Don't Get Scroogled," which blasts Google for scanning emails and tries to convince people to switch to Outlook.com instead.

Comment by Chris on October 2, 2013 at 1:26pm

My ISP uses Yahoo email. The privacy policy says: "Yahoo's automated systems scan and analyze all email..." The embedded link is broken but I Was able to find the information below. I think it's important to note that opting out of advertising doesn't stop the scanning of your email. With the government shutdown I can't go to to http://www.broadbandmap.gov/ to see which other companies offer broadband where I live so perhaps I can find an ISP that doesn't read  email. I doubt I'll find an ISP that doesn't read email with the duopoly in place brought to you by the FCC and Congress. The customer is fucked because Congress on behalf of the big telecom companies killed real competition.

Why is content scanning mentioned in the Terms of Service?

In the newest version of Yahoo Mail, we use automated systems to scan your email to bring you product features, abuse detection, and relevant advertising.

Please be assured that at Yahoo, we take your privacy seriously. Analyzing your email serves a number of important purposes: it allows us to bring great new product features to your Inbox and it helps us combat spam and provide you with a safer email experience. As an example of a new product feature, we're able to identify photos and videos and format them so that you can view them directly in your inbox.

We may also use content scanning to provide you with more relevant advertising based on your interests. You can learn more about how our automated systems use email content in advertising by reading our Privacy Policy.

You can always opt-out of interest-based advertising by visiting our opt-out page.


Additional Information

The Yahoo Terms of Service and Privacy Policy vary slightly by country. If you signed up for your Yahoo account from a different country's Yahoo site, learn how to look up your Terms of Service and Privacy Policy.

Comment by Chris on September 25, 2013 at 12:14am

Here's the link to AT&T's advertising choices and controls.

YOUR CHOICES & CONTROLS

  1. You can choose not to receive some types of advertising online or on your wireless device.

    • Opt-out of all Relevant Advertising delivered by AT&T AdWorks online here, and on your mobile device here. You'll need to opt-out on each computer browser and mobile device you want to exclude.

    • Opt-out of online behavioral advertising provided by AT&T and other advertisers by clicking the "Advertising Choices" link at the bottom of our web pages.

    • Opt-out of interest-based advertising on att.net powered by Yahoo! here.

    • Opt-out of online behavioral advertising from many other ad networks at the Network Advertising Initiative (NAI) site..

    • When you see online ads for AT&T products and services that display this icon Ad Info icon, click and you will get information on how to opt-out.

    • To limit collection of data on web sites that may be used for advertising, go here for information on how to manage cookies and other similar technologies on your computer.

    More here

Comment by Chris on September 24, 2013 at 11:48pm

Here are some ways to eliminate advertisements from Yahoo that I found on Web Beacons  under the Yahoo Privacy Center.

Your Choices Regarding Yahoo’s Use of Web Beacons

Comment by doone on September 22, 2013 at 9:34pm

Top ten inventions of all time

Comment by Chris on September 16, 2013 at 1:18pm

Time to tame the NSA behemoth trampling our rights

...Last week, we learned that the NSA's strategy to enhance its surveillance capabilities was to weaken internet security in general. The NSA infiltrated the social-professional standard-setting organizations on which the whole internet relies, from National Institute of Standards and Technology to the Internet Engineering Task Force itself, the very institutional foundation of the internet, to weaken the security standards. Moreover, the NSA combined persuasion and legal coercion to compromise the commercial systems and standards that offer the most basic security systems on which the entire internet runs. The NSA undermined the security of the SSL standard critical to online banking and shopping, VPN products central to secure corporate, research, and healthcare provider networks, and basic email utilities...

More Here

Comment by Chris on September 16, 2013 at 1:14pm

Apple’s Fingerprint ID May Mean You Can’t ‘Take the Fifth’

There’s a lot of talk around biometric authentication since Apple introduced its newest iPhone, which will let users unlock their device with a fingerprint. Given Apple’s industry-leading position, it’s probably not a far stretch to expect this kind of authentication to take off. Some even argue that Apple’s move is a death knell for authenticators based on what a user knows (like passwords and PIN numbers).

While there’s a great deal of discussion around the pros and cons of fingerprint authentication — from the hackability of the technique to the reliability of readers — no one’s focusing on the legal effects of moving from PINs to fingerprints.

Because the constitutional protection of the Fifth Amendment, which guarantees that “no person shall be compelled in any criminal case to be a witness against himself,” may not apply when it comes to biometric-based fingerprints (things that reflect who we are) as opposed to memory-based passwords and PINs (things we need to know and remember).

More Here

Comment by doone on September 3, 2013 at 8:17pm

Sholims GIFs

Wie Cyriak, nur anders: Sholims GIFs(via Who Killed Bambi)

 

Members (14)

 
 
 

© 2014   Created by Atheist Universe.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service