Feedback and Notes


Imagine No Religion

We are a worldwide social network of freethinkers, atheists, agnostics and secular humanists.



An internet group about The Internet.

The internet is both a telecommunication medium and a culture. We have embraced it because of its immediacy, its pervasiveness and its usefulness.

Even though for most of us its workings is equivalent to magic and it's enough to know that it's very 'complicated and technical,' it has become an intricate part of our life.

Let's talk about this.

Location: #science
Members: 16
Latest Activity: Nov 26, 2018

The Internet

This is a partial portrait of the Internet. Imagine that at the tip of each branch there is one or multiple human brains operating and that each one of these terminals can be instantly connected to any other, anywhere.

If we could map this image to the surface of the Earth it would make it even more obvious that this network of networks is like a new organ that has been grafted onto the biosphere.

Partial map of the Internet based on the January 15, 2005 data found on Each line is drawn between two nodes, representing two IP addresses. The length of the lines are indicative of the delay between those two nodes. This graph represents less than 30% of the Class C networks reachable by the data collection program in early 2005. Lines are color-coded according to their corresponding RFC 1918 allocation as follows:

Dark blue: net, ca, us
Green: com, org
Red: mil, gov, edu
Yellow: jp, cn, tw, au, de
Magenta: uk, it, pl, fr
Gold: br, kr, nl
White: unknown

Click here for a high-resolution 8MB image.

Discussion Forum

The NSA may have won a round but are losing the war!

Started by Davy. Last reply by Chris Oct 13, 2013. 1 Reply

THE CORE INTERNET INSTITUTIONS ABANDON THE US GOVERNMENTIn Montevideo, Uruguay this week, the Directors of all the major Internet organizations – ICANN, the Internet Engineering Task Force, the…Continue

Tags: China, internet, governance, Brazil, Russia

So you think the cloud is Safe?

Started by Davy. Last reply by Chris Sep 26, 2013. 12 Replies

In the digital age, your files and memories are not truly yours any more. They belong to the cloudKYLE GOODWIN wants his stuff back. One day, he decided to set up a company in Ohio to …Continue

Tags: data, storage, computing, Cloud


Started by Doone. Last reply by Neal Sep 5, 2013. 2 Replies

ARE WE SMARTER YET? HOW COLLEGES ARE MISUSING THE INTERNETby Akim ReinhardtWe should all probably be a lot smarter…Continue


Wearable computers challenge human rights

Started by Davy Jul 24, 2013. 0 Replies

The thoughtless adoption of new technologies seduces us into providing more of our personal selves without any concerns for the protection of our personal data, argues Katina Michael an associate…Continue

Tags: sensors, information, technology, computers, rights

Comment Wall

Nice Comment

You need to be a member of Internet to add comments!

Comment by Chris on November 26, 2018 at 3:04am

The Electronic Frontier Foundation

The End of Trust (McSweeney's 54)

EFF and McSweeney’s have teamed up to bring you The End of Trust (McSweeney’s 54). The first all-nonfiction McSweeney’s issue is a collection of essays and interviews focusing on issues related to technology, privacy, and surveillance.

The collection features writing by EFF’s team, including Executive Director Cindy Cohn, Education and Design Lead Soraya Okuda, Senior Investigative Researcher Dave Maass, Special Advisor Cory Doctorow, and board member Bruce Schneier.

We also recruited some of our favorite thinkers on digital rights to contribute to the collection: anthropologist Gabriella Coleman contemplates anonymity; Edward Snowden explains blockchain; journalist Julia Angwin and Pioneer Award-winning artist Trevor Paglen discuss the intersections of their work; Pioneer Award winner Malkia Cyril discusses the historical surveillance of black bodies; and Ken Montenegro and Hamid Khan of Stop LAPD Spying debate author and intelligence contractor Myke Cole on the question of whether there’s a way law enforcement can use surveillance responsibly.

The End of Trust is available to download and read right now under a Creative Commons BY-NC-ND license.

If you’re an EFF member, you can enjoy a $10 discount on a one-year subscription to The McSweeney’s Quarterly. Subscribe before November 29 to start with The End of Trust.

Comment by Chris on November 19, 2018 at 6:24pm

Comment by Chris on November 19, 2018 at 5:04pm

Here's an interesting link about the internet worth looking at

What Is Email Spoofing? How Scammers Forge Fake Emails

It continues with the following and more.

6 Reasons to Avoid Cloud Services and Keep Your Feet on the Ground

Comment by Chris on November 19, 2018 at 10:21am

I'm curious how the scammers got the grandkids name, grandfathers name and telephone number. They don't use facebook, or other social media. I'm looking forward to finding out more about how the scammers got their contact information. The police can't provide that information because they are still looking into it. It's an ongoing investigation. I recommended among other things that they check with their insurance company to see if their home owners policy covers identity theft. ID theft is covered under my home owners policy. I think most home insurance policies cover this. It may be a rider. I understand it's also available with renters insurance. I also understand that if they have such insurance it wouldn't protect them for the loss of the $7,000 in this case. Hopefully the detective and prosecutors will find out how the scammers got their name, telephone number and grandsons name.


Thank you for sharing the details of how this works this is very interesting. I work in Tech and saw a similar scam done at the corporate level where they fake that the CEO sends an email asking the finance person to wire money to a specific person and the finance person believed it was the CEO and sent thousands of dollars to the person via Western Union. They never got the money back and no one was ever able to be prosecuted. Note you can fake the address where an email comes from. Just because someone sends you an email doesn.t mean it is really them.

Comment by Chris on November 19, 2018 at 10:20am

My great cousin was taken by one of the 'Grandson' scams I heard about somewhere. 

Her husband answered a call from what he thought was his 'grandson' who said he was in the hospital after an accident and needed $7,000.  

I'm told  then a 'representative' of the 'grandson'  called back and told them to send $7,000 in cash using overnight express with a signature required for delivery. 

Being caught off guard they did that.  After getting the cash and sending  the package they called the grandson who was fine.  

They called the local police department who directed them through appropriate law enforcement agencies to the law enforcement agency in the county the package was delivered.

The package was delivered to a vacant house  with signature required for delivery. The carrier went to the neighbors house to inquire about the delivery and vacant house..  The neighbor reported it to the local police department who came and retrieved the package with the money.

My cousin said a detective called her back saying the suspects were arrested and the case is going to court next week after which the money will be returned. She verified the detective who called her wasn't part of the scam.

Had the scammers not requested a signed return receipt for the package they may have gotten away with it.

It will be interesting to hear more about it as my cousin finds out more.  She was still sorting out the details about what happened when I spoke with her.  I hope her money is returned.

I'm writing about this without editing and much information to warn others  about scams.

Comment by Chris on November 18, 2018 at 3:44am

Imagine the following with a video link from a camera on a computer, cell phone, or with a whole house security system.

This family's Echo sent a private conversation to a random contact.


A Portland family tells KIRO news that their Echo recorded and then sent a private conversation to someone on its list of contacts without telling them. Amazon called it an “extremely rare occurrence.” (And provided a more detailed explanation, below.)

Portlander Danielle said that she got a call from one of her husband’s employees one day telling her to “unplug your Alexa devices right now,” and suggesting she’d been hacked. He said that he had received recordings of the couple talking about hardwood floors, which Danielle confirmed.

Amazon, when she eventually got hold of the company, had an engineer check the logs, and he apparently discovered what they said was true. In a statement, Amazon said, “We investigated what happened and determined this was an extremely rare occurrence. We are taking steps to avoid this from happening in the future.”

What could have happened? It seems likely that the Echo’s voice recognition service misheard something, interpreting it as instructions to record the conversation like a note or message. And then it apparently also misheard them say to send the recording to this particular person. And it did all this without saying anything back.

The house reportedly had multiple Alexa devices, so it’s also possible that the system decided to ask for confirmation on the wrong device — saying “All right, I’ve sent that to Steve” on the living room Echo because the users’ voices carried from the kitchen. Or something.

Naturally no one expects to have their conversations sent out to an acquaintance, but it must also be admitted that the Echo is, fundamentally, a device that listens to every conversation you have and constantly sends that data to places on the internet. It also remembers more stuff now. If something does go wrong, “sending your conversation somewhere it isn’t supposed to go” seems a pretty reasonable way for it to happen.

Update: I asked Amazon for more details on what happened, and after this article was published it issued the following explanation, which more or less confirms how I suspected this went down:

Echo woke up due to a word in background conversation sounding like “Alexa.” Then, the subsequent conversation was heard as a “send message” request. At which point, Alexa said out loud “To whom?” At which point, the background conversation was interpreted as a name in the customers contact list. Alexa then asked out loud, “[contact name], right?” Alexa then interpreted background conversation as “right”. As unlikely as this string of events is, we are evaluating options to make this case even less likely.

Comment by Chris on November 15, 2018 at 2:01am

The best scam in the world is grants for "not-for-Profits"

I received one today to donate to disabled veterans.

The terrible thing is without regulation and oversight it's difficult to impossible to distinguish between valid requests and scams.

Some may think deregulation is great. I don't.

I wonder how many people in prison make calls for donations. An effective way to use slave (that may be offensive) labor for profit.

How about rather than slave indentured servitude. - that doesn't cover it either.

Prison workforce.

I'm sure there is another term linguaphiles may come up with. 

Comment by Chris on October 22, 2018 at 6:10am

Who trusts internet companies to store unencripted hard drive data on 'the cloud?'

Google+? a remarkable faulure.

Comment by Chris on January 20, 2018 at 3:00am
Comment by Chris on December 25, 2017 at 12:55pm

Is this "Equal time?"

C-Span Book TV rebroadcast today. In Depth with Annie Jacobsen Anni... talked about her life and career and responded to viewer comments and questions. Ms. Jacobsen is the author of Area 51: An Uncensored History of America’s Top Secret Military Base, Operation Paperclip: The Secret Intelligence Program that Brought Nazi Scientists to America, The Pentagon’s Brain: An Uncensored History of DARPA, America’s Top-Secret Military Research Agency, and Phenomena: The Secret History of the U.S. Government’s Investigations into Extrasensory Perception and Psychokinesis.

Ten to fifteen minutes you will begin to know about extasensory perception and psycokonisis.    


Members (15)


© 2019   Created by Atheist Universe.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service