Hacker Newsnew | past | comments | ask | show | jobs | submit | spacefight's commentslogin

This case is a brilliant reminder to anyone working in deep packet inspection/blocking/filtering tech that your work negatively affects the safety of millions of people in such countries at once.


This case is a brilliant reminder to anyone working in fiber optics that your work negatively affects the safety of millions of people in such countries at once.

But seriously, deep packet inspection is evil now? It's an extremely useful security tool.


Why do you misquote me?

Yes, it might be useful for some folks - it's really bad for others. People have died because of oppressive regimes targeting dissidents that way.


It wasn't a misquote. It was intentionally exposing the absurdity of the your argument.

The idea that anyone working on technology that could be used for surveillance is morally culpable is flat wrong.

People have died because of fertilizer and particle physics. It does not make chemical engineers or physicists evil.


Your argument reads to me as "people kill people not guns".

Yea I know, morale is a difficult topic these days.


That's trite.

Your argument is essentially "engineers at steel plants make steel, which can be used to make guns, which can be used to kill."

At some point, the chain of causality is so remote that assigning unequivocal judgments of evil becomes logically absurd. Are port scanners evil now too?


This is a ridiculous statement. You do know that this stuff actually enables safety, right?


No it isn't. Blocking encrypted calls for millions of user _disables_ safety for exactly those millions.


Do you possibly just have no idea that deep packet inspection has many legitimate uses, and is critical to security in many networks? Or are you simply ignoring that fact for the sake of your argument?


I am not ignoring the legitimate use cases - and I never said that there weren't any. I simply pointed out that if you work in DPI/filter/blocking and your company sells to those regimes, that you support the oppression of the affected users.

I can help with some real world examples. One is Blue Coat.

https://en.wikipedia.org/wiki/Blue_Coat_Systems#Controversy


That's not actually what you said. You said: "anyone working in deep packet inspection/blocking/filtering".

This is much different than (my own wording): "anyone working in DPI for a company they know is selling their products to a police state".

It is absurd to blame open-source developers, researchers, or even employees at company's whose software has a legitimate purpose but is illegally exported and misused. They're just doing their job, since the technology has legitimate uses, as you've acknowledged. Blame the governments, not the programmers.


Interesting, can you expand on what the legitimate uses for DPI are? I'm not super familiar with their use in network security.


It's mostly useful for production and other corporate networks. It's basically a more powerful firewall, where you can enforce contracts on your network concerning what traffic is allowed to go in or out.

As a quick example, one strategy (although personally I've always questioned it's viability, but it's just one of many examples) is a network admin may install a filter that deep searches packets for common SQL injection or XSS strings. This is done as a secondary measure to possibly prevent malicious requests.

Other examples are if you want to force employees to not be able to send certain documents or information outside of the company for compliance reasons, you can scrub traffic for that information. Obviously more complex.

The general concept is that it's useful for when you know you do not want specific traffic crossing your network. Ironically, it's the same use case scenario with draconian governments preventing encryption, but in the production or corporate scenario the use case is not ethically unsound.


eSports, really? Is that even legal in Germany?

http://www.gamblingsites.org/laws/germany/


There's some room.


Looks like it is piping the queries over to scholar.google.com - getting only timeouts right now though.


It uses scholar as a search engine, but then it replaces the links in the results. e.g.

    http://link.springer.com/link-to-paper
becomes:

    http://link.springer.com.sci-hub.io/link-to-paper
As far as I can tell, it works for some articles.


Just use DOI of the article, then it's instant and bypasses Google search


It's off and on. Last night I could access it but it came back.


US is prob ddosing it...


So it looks like this needs (from EU perspective) another round of lawsuits to get this overthrown again - since the oversight by the US DoC is laughable.


Basically the problem with Safe Harbor is Section 702 of the Foreign Intelligence Surveillance Act and Executive Order 12333. The cumulative effect is that all people non US persons are legitimate targets of mass surveillance under US law.

The fix for Safe Harbor was negotiated with Department of Commerce who has no authority to talk about reforming this policy.

Options were

1. Immediately end the ability of US based digital companies to do business in Europe

2. Cave completely and have a few months of normalcy before Europe Commission kills the deal.


You have a significant misunderstanding of the mechanics of this treaty, FISA, and EO12333.

This treaty: it must be ratified by Congress in order for it to be considered accepted by the EC. Under the U.S. Constitution, this means it would carry the full force of the law. The Commerce Department wouldn't bear the weight of enforcement.

FISA §702: limits collection to targeted non-U.S. persons of foreign intelligence interest at borders (Upstream) and submission of NSLs to U.S. organizations for data on non-U.S. persons. The Privacy Shield agreement only prohibits mass surveillance.

EO12333 does not apply since that collection occurs outside of the United States, and would not be in the jurisdiction of this agreement.

> Department of Commerce who has no authority to talk about reforming this policy.

No, this agreement was made at the behest of the Senate Committee on Commerce, Science, and Transportation [1]. Since this will be ratified by the Senate, it will carry the full weight of the law.

[1] http://www.commerce.senate.gov/public/index.cfm/pressrelease...


This will have to be ratified by the Senate, DoC will not be in charge of policing this.

This agreement was made at the request of senators.

Under the U.S. Constitution, all foreign treaties must be ratified by the Senate. This will carry the full weight of the law.


And we've seen that US laws aren't worth the paper they're printed on when it comes to curbing the mass surveilance apparatus. Leaving the policing of their own hungry three-letter agencies to the US is a laughable proposal.


Who had their first website online back then in 1996 as well?

raises hand

Good memories... Claris Home Page!


That is not only unethical that is also illegal in some countries.

Also, this is the reason why you should have FB platform a) turned off and b) disallow that your friends "bring your data with them when they use apps".


For anyone curious on how to do this:

    1) Click the down arrow (▼) in the top right, then go to 'Settings'.
    2) Click 'Apps' in the bar on the left side.
    3) Click 'Edit' under 'Apps, Websites, and Plugins' then 'Turn Off'
    4) Click 'Edit' under 'Apps Others Use' and uncheck everything, then 'Save'.


Thanks, just did this, really useful info :)


Thank you.



What's next with these corporate shizzles? Do I need to pay a cent each time they detect me just looking at their buildings?


More like $10. Plus you must wear the special goggles which record where you look and automatically deduct the price.


Wow. i think you finally found the business model for Google Glass...


Yes. And there are tons of other startups and probably also YC companies involved in heavy scraping, aggregating and selling that information to other folks.


Well, with all the previous relevations we've seen about various 3 and 4 letter agencies, we should have marched long ago.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: