berkman presentazione

This commit is contained in:
pesceWanda 2016-07-14 22:40:39 -04:00
parent 9a0365b96b
commit 4976f2b27c
74 changed files with 2629 additions and 1003 deletions

View file

@ -58,13 +58,16 @@ Un normale cittadino inglese in due sole occasioni puo\` ascoltare la frase: “
<blockquote class="tr_bq"> <blockquote class="tr_bq">
<p> <p>
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }<span style="font-family: Arial, Helvetica, sans-serif;">Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service <i><span style="font-style: normal;">cannot even count the current number of federal crimes</span></i>. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”</span> Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service <i><span style="font-style: normal;">cannot even count the current number of federal crimes</span></i>. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”</span>
</p> </p>
</blockquote> </blockquote>
<p> <p>
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }<span style="font-family: Arial, Helvetica, sans-serif;">Con le parole di <a href="https://www.schneier.com/essay-114.htm" target="_blank">Bruce Schneier</a>: “se mi dai sei linee scritte di pugno dall&#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.</p> Con le parole di <a href="https://www.schneier.com/essay-114.htm" target="_blank">Bruce Schneier:</a></p>
“se mi dai sei linee scritte di pugno dall&#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.
<p></p>
<p> <p>
A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  <span style="font-size: large;"><br /> </span></span> A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  <span style="font-size: large;"><br /> </span></span>
</p> </p>
@ -99,4 +102,4 @@ Un normale cittadino inglese in due sole occasioni puo\` ascoltare la frase: “
<div style="text-align: right;"> <div style="text-align: right;">
<span style="font-family: Arial, Helvetica, sans-serif;">Francesco Mecca </span> <span style="font-family: Arial, Helvetica, sans-serif;">Francesco Mecca </span>
</div></div> </div></div>

View file

@ -0,0 +1,262 @@
---
title: A short talk about cryptography at the Berkman Klein Center
date: 2016-07-07
author: pesceWanda
layout: post
categories:
- PesceWanda
tags:
- Berkman Klein internship
- Berkman Center internet and society
- cryptography
- TOR
- nothing to hide
- public key private key
- encription
---
The 7th of July me and [Aaron](http://studentprivacy.ca), as intern at the [Berkman Klein for Internet and Society](http://cyber.law.harvard.edu), gave a presentation on the basics of cryptography and a quick overview on the essential tools.
1o
What follows is a short summary of that presentation. The slides are available [here](/wp-content/uploads/2016/fwneas.pptx)
### Whose Security?
Let's define what security is. Security is the possibility to being set free from structural costraints, and as that we can distinguish various levels of security depending on who we are.
Also, if we want to investigate security we should also define our threats: security, as being set free, from intelligence surveillance can be our target. Our concerns as different if we consider instead security from censorship or corporation data mining.
![uber god view](/wp-content/uploads/2016/godmode.png)
![facebook law enforcement form](/wp-content/uploads/2016/fb.png)
What is shown above is the [Uber God View](http://www.theverge.com/2016/1/6/10726004/uber-god-mode-settlement-fine), a tool Uber used to track a Buzzfeed's journalist locations, and the Facebook standard form that is given to law enforcement when requested.
### Security is a state of mind
Security is hard. It is really rare to reach a state of complete security and even in that case, it depends on our target.
What is important is to train ourselves to security. Security is a state of mind and there are no tools that automatically protect us without our active partecipation.
Let's explore that in details.
### The layers of security
We can distinguish four layers of security:
* Device Security;
* Network Security;
* Message Security;
* Human Security.
###### Device Security, where everything happens
Device security is related to the "physical host".
If the computer we use is tampered, at the hardware level, or the phone is bugged, there is no way to escape using higher level tools.
In other words, it doesn't matter if we use a super secure password if our computer is registering all our keystrokes and send them to a third party.
Also, device security is useful if we consider that our device can fall into the hands of attackers that may be able to traceback all the activities.
Some precautions for this purpose:
* full disk encryption;
* minimal set of application installed;
* open source operating systems.
###### Network Security
The network is the infrastructures that our device is attached to. In most of the case, when we consider our computer is the internet (and the GSM network in case of mobile phones).
Network security is essential to evade censorship, behavioural tracking and identity theft.
Some tools that may help in this case:
* vpn;
* tor;
* p2p networks;
* mesh networks.
And for the web:
* opensource web browsers (such as firefox);
* no google apps on android phones;
* https.
###### Message Security
Message security is the level of protection regarding the content that you want to send or receive.
Message security is essential if you want to avoid any third party snooping and the confidentiality of your messages.
The tools we can use in this context:
* OTR;
* opensource messaging protocols (XMPP, matrix);
* Signal;
* PGP.
Also, always remember that encrypting the content of the message doesn't guarantee that your identity and the metadata are hidden.
###### Human Security, the weakest link
Everything comes down to the human level at a certain point.
This is way it is important to train ourselves in security.
If we consider [Kevin Mitnick's history](https://en.wikipedia.org/wiki/Kevin_Mitnick), or the recent [FBI deputy director hack](http://thehackernews.com/2015/11/fbi-cia-director-hack.html) we see that social engineering plays a big role when we want to undermine the security of an individual of interest.
But security matters even if we are not target of interest.
For example let's consider our password. If we use the same password on every site and one cracker manages to gain access to just one of them, our whole activities online can be exposed and our identity stolen. [This is relevant](http://www.nydailynews.com/news/national/mark-zuckerberg-twitter-account-hacked-password-dadada-article-1.2662351). Myspace had its database breached and the password of Zuckerberg (even a simple one) was exposed. Given that he used the same password on twitter and other sites, his multiple accounts were compromised.
### What is TOR and how it works
When you visit a website with your mobile phone or a browser on your computer lots of things go on under the hoods.
Your computer, as a client, makes what is called an [handshake](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment) with the server.
After telling the server that the client is interested in its content, a series of packets containing data is exchanged.
That is the content of a connection. Inside this packets there are a multitude of information of two kinds:
* the web page or the content we are trying to visualize;
* information on the status of both the server and the client.
The informations contained in every packet can be analized to understand the "identity" of the client that is requesting the content on the server, first of all the IP that is a sort of web address that every computer on the net has.
Not only, during the transmission of this packets, various entity on the communication channel can analize the content and mine our data.
![Cute infographic](/wp-content/uploads/2016/tor-https-0.png)
TOR still uses this kind of routine to gather the content of a web page, but instead of connecting directly to the destination server it goes through a series of other servers called relay: instead of going directly from A to B, it goes from A to C to D to E to F to B.
If the web was a kindergarden Alice instead of telling directly her phrase to Bob, she would tell the word to a friend that in turn would tell the word to a friend and so on, until Bob heards the word, without knowing that Alice said that at the beginning.
At this point you should ask yourself: are the data more protected if it goes through a network of relays? It actually is given that every time you send a packet through the TOR network, it gets encrypted so that no one knows it's content.
To tell the truth, actually the relay (called exit node) that will send the packet to the destination server, knows the content of the packet but does not know the origin.
Ultimately a website can be entirely hosted on the TOR network, called the onion network, so that the packets never exit from the relays and the relay don't know the phisycal location of the server, so every entity on the network reach a perfect level of anonimacy.
### Who owns the relays?
Actually every one can host and own a relay if they are willing to do so.
I personally host one right now and there are many others that share a little fraction of their network connection.
![My little raspi is moving some packets right now](/wp-content/uploads/2016/screenraspy.png)
Running a relay node is very easy and everybody should do so. Running an exit node instead is more troublesome and I don't suggest it if you are not a big entity that can handle some sorts of occasional trouble.
### Don't play the fool on the TOR network
Of course TOR doesn't guarantee you perfect anonimacy. At the end it all comes to the human layer.
It's no use to surf the web through TOR if we then log in to our personal blog or our personal facebook page.
But there are other subtle factors that can be exploited by web companies to gather info and track their users.A
Such factors are:
* the size of the screen and the colors supported by it;
* the timezone;
* canvas and images that the server asks your computer to generate;
* information about your OS that are sent through packets;
* the fonts available on your system;
* touch support;
* cookies;
* ads and cross site requests;
In particular, most of these are exploitable using a web programming language, javascript, that lots of web pages uses to render content. TOR users should avoid the use of javascript.
### Public Private Key Encryption
While TOR is recent technology, public key encryption is a concept way older.
What happens when we use public / private key encryption tools is conceptually similar to what happens with our physical correspondence.
A public key is similar to our mailbox.
Everyone that knows the location of a person's mailbox can write a message and put it inside but only the owner of that mailbox, using is own key can open the mailbox and read the various messages.
When we use PGP or GPG (an implementation of the public key encription concept) we generate a pair of key.
A public one that we should broadcast or at least share with our social circle, and a private key that must remain secret at any cost.
Everyone can encrypt every kind of digital content using our public key (that is just a really long string) and only the owner of the private key can proceed to decryption of the content.
This also means that we know who is gonna read the message if encrypted using this kind of technologies.
One easy tool for GPG encryption is [GPA](https://www.gnupg.org/%28en%29/related_software/gpa/index.html)
### Metadata
What would you do if you were asked to put under surveillance one person?
For sure placing a bug with microphone and recording capabilities would be the best option.
But what if, instead of recording every thing the subject does, we just take a note of all his actions, without taking care of the content. For example, if the subject speaks to someone, we record the time, the place, the duration of the conversation and all the info of the person he is talking with.
What if, when the person walks into a mall, we record the time, the location, the shops he entered, the money he spent, the number of things bought, but not the things he bought, in detail.
You can see that you can have a fairly precise idea of the habits of the person under your surveillance.
Actually from metadata is easy to grab all kinds of personal information. Also, if a tiny portions of the information we have on the subject are more detailed (for example social network photos) we have a picture as clear as never.
This is not just one of the biggest concern that should pop into your mind when you are talking about nation wide mass surveillance, it is also the core of the business of corporations like Facebook and Google.
Whatsapp does not read the content of your messages but it stores every single bit of metadata that comes with it.
Metadatas are enought to build a complete profile of the users and they are even more dangerous in the hands of an evil state agency.
### Nothing to hide
Even if we have nothing to hide, we have much to fear.
The "nothing to hide" argument is something that everyone of us in this room has heard, at least one time.
We should fear this sentence because it is the ultimate ammision of a big misunderstanding on the whole debate.
Privacy, first of all, is __control__ over our data, not only the right to secrecy.
###### Transparency should be for everyone
There is a big incoherence when asking to your citizens to handle over their data.
Transparency should be a two way thing, while at the current state big three letter agencies, but high level people as well, cover their tracks and are not transparent on their reports.
This enhance a situation of big inequality between the people and the State.
Even worse, it is not the citizen by himself that can choose if he has something to hide, but the autority.
This may seem a little naive to say, but with Bruce words:
> If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.
This is true even without considering social discrimination and mass media manipolation.
###### The fundamental of society
Every action can be seen as either legal or illegal. When we take a decision this is one of the first, implicit concern.
This is not true in a surveillance system: when you are doing something your concern is all about the possibility of raising suspicion.
An idea not action is what is needed in such a dystopic condition to prove a citizen guilty.
###### Two wrong make a right
In America we are now discussing about weed legalization.
Do you think that such debate would have been possible if no one could had the possibility, even if against the law, to try that substance?
The same goes for gay marriages.
Inside the panopticon every __potential__ criminal would be persecuted.
### To hide is to care
A simple truth is that we don't close the windows to cover up our crimes.
Our innermost experiences become in our intimacy, which is the most secred place.

View file

@ -104,6 +104,10 @@

Binary file not shown.

View file

@ -104,6 +104,10 @@

View file

@ -104,6 +104,10 @@
@ -132,6 +136,7 @@
<h2 id="blog-posts">Blog Posts</h2> <h2 id="blog-posts">Blog Posts</h2>
<ul> <ul>
<li><p>07 Jul 2016 &raquo; <a href="/pescewanda/2016/07/07/pres-berk/"> A short talk about cryptography at the Berkman Klein Center </a></p></li>
<li><p>06 Jul 2016 &raquo; <a href="/pescewanda/2016/07/06/IM-services/"> Phone messaging apps comparison </a></p></li> <li><p>06 Jul 2016 &raquo; <a href="/pescewanda/2016/07/06/IM-services/"> Phone messaging apps comparison </a></p></li>
<li><p>05 Jul 2016 &raquo; <a href="/pescewanda/2016/07/05/arduino_keyboard/"> Arduino Uno as HID keyboard </a></p></li> <li><p>05 Jul 2016 &raquo; <a href="/pescewanda/2016/07/05/arduino_keyboard/"> Arduino Uno as HID keyboard </a></p></li>
<li><p>16 May 2016 &raquo; <a href="/pescewanda/2016/05/16/lifehacks2/"> Lifehacks (2) </a></p></li> <li><p>16 May 2016 &raquo; <a href="/pescewanda/2016/05/16/lifehacks2/"> Lifehacks (2) </a></p></li>

View file

@ -4,7 +4,7 @@
<title>Caught in the Net</title> <title>Caught in the Net</title>
<link href="francescomecca.eu/atom.xml" rel="self"/> <link href="francescomecca.eu/atom.xml" rel="self"/>
<link href="francescomecca.eu/"/> <link href="francescomecca.eu/"/>
<updated>2016-07-06T20:05:05-04:00</updated> <updated>2016-07-14T22:39:32-04:00</updated>
<id>francescomecca.eu</id> <id>francescomecca.eu</id>
<author> <author>
<name>Francesco Mecca</name> <name>Francesco Mecca</name>
@ -12,6 +12,271 @@
</author> </author>
<entry>
<title>A short talk about cryptography at the Berkman Klein Center</title>
<link href="francescomecca.eu/pescewanda/2016/07/07/pres-berk/"/>
<updated>2016-07-07T00:00:00-04:00</updated>
<id>francescomecca.eu/pescewanda/2016/07/07/pres-berk</id>
<content type="html">&lt;p&gt;The 7th of July me and &lt;a href=&quot;http://studentprivacy.ca&quot;&gt;Aaron&lt;/a&gt;, as intern at the &lt;a href=&quot;http://cyber.law.harvard.edu&quot;&gt;Berkman Klein for Internet and Society&lt;/a&gt;, gave a presentation on the basics of cryptography and a quick overview on the essential tools.
1o
What follows is a short summary of that presentation. The slides are available &lt;a href=&quot;/wp-content/uploads/2016/fwneas.pptx&quot;&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&quot;whose-security&quot;&gt;Whose Security?&lt;/h3&gt;
&lt;p&gt;Let&amp;#39;s define what security is. Security is the possibility to being set free from structural costraints, and as that we can distinguish various levels of security depending on who we are.&lt;/p&gt;
&lt;p&gt;Also, if we want to investigate security we should also define our threats: security, as being set free, from intelligence surveillance can be our target. Our concerns as different if we consider instead security from censorship or corporation data mining.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/wp-content/uploads/2016/godmode.png&quot; alt=&quot;uber god view&quot;&gt;
&lt;img src=&quot;/wp-content/uploads/2016/fb.png&quot; alt=&quot;facebook law enforcement form&quot;&gt;&lt;/p&gt;
&lt;p&gt;What is shown above is the &lt;a href=&quot;http://www.theverge.com/2016/1/6/10726004/uber-god-mode-settlement-fine&quot;&gt;Uber God View&lt;/a&gt;, a tool Uber used to track a Buzzfeed&amp;#39;s journalist locations, and the Facebook standard form that is given to law enforcement when requested.&lt;/p&gt;
&lt;h3 id=&quot;security-is-a-state-of-mind&quot;&gt;Security is a state of mind&lt;/h3&gt;
&lt;p&gt;Security is hard. It is really rare to reach a state of complete security and even in that case, it depends on our target.&lt;/p&gt;
&lt;p&gt;What is important is to train ourselves to security. Security is a state of mind and there are no tools that automatically protect us without our active partecipation.&lt;/p&gt;
&lt;p&gt;Let&amp;#39;s explore that in details.&lt;/p&gt;
&lt;h3 id=&quot;the-layers-of-security&quot;&gt;The layers of security&lt;/h3&gt;
&lt;p&gt;We can distinguish four layers of security:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Device Security;&lt;/li&gt;
&lt;li&gt;Network Security;&lt;/li&gt;
&lt;li&gt;Message Security;&lt;/li&gt;
&lt;li&gt;Human Security.&lt;/li&gt;
&lt;/ul&gt;
&lt;h6 id=&quot;device-security-where-everything-happens&quot;&gt;Device Security, where everything happens&lt;/h6&gt;
&lt;p&gt;Device security is related to the &amp;quot;physical host&amp;quot;.&lt;/p&gt;
&lt;p&gt;If the computer we use is tampered, at the hardware level, or the phone is bugged, there is no way to escape using higher level tools.&lt;/p&gt;
&lt;p&gt;In other words, it doesn&amp;#39;t matter if we use a super secure password if our computer is registering all our keystrokes and send them to a third party.&lt;/p&gt;
&lt;p&gt;Also, device security is useful if we consider that our device can fall into the hands of attackers that may be able to traceback all the activities.&lt;/p&gt;
&lt;p&gt;Some precautions for this purpose:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;full disk encryption;&lt;/li&gt;
&lt;li&gt;minimal set of application installed;&lt;/li&gt;
&lt;li&gt;open source operating systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;h6 id=&quot;network-security&quot;&gt;Network Security&lt;/h6&gt;
&lt;p&gt;The network is the infrastructures that our device is attached to. In most of the case, when we consider our computer is the internet (and the GSM network in case of mobile phones).&lt;/p&gt;
&lt;p&gt;Network security is essential to evade censorship, behavioural tracking and identity theft.&lt;/p&gt;
&lt;p&gt;Some tools that may help in this case:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;vpn;&lt;/li&gt;
&lt;li&gt;tor;&lt;/li&gt;
&lt;li&gt;p2p networks;&lt;/li&gt;
&lt;li&gt;mesh networks.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;And for the web:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;opensource web browsers (such as firefox);&lt;/li&gt;
&lt;li&gt;no google apps on android phones;&lt;/li&gt;
&lt;li&gt;https.&lt;/li&gt;
&lt;/ul&gt;
&lt;h6 id=&quot;message-security&quot;&gt;Message Security&lt;/h6&gt;
&lt;p&gt;Message security is the level of protection regarding the content that you want to send or receive.&lt;/p&gt;
&lt;p&gt;Message security is essential if you want to avoid any third party snooping and the confidentiality of your messages.&lt;/p&gt;
&lt;p&gt;The tools we can use in this context:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;OTR;&lt;/li&gt;
&lt;li&gt;opensource messaging protocols (XMPP, matrix);&lt;/li&gt;
&lt;li&gt;Signal;&lt;/li&gt;
&lt;li&gt;PGP.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Also, always remember that encrypting the content of the message doesn&amp;#39;t guarantee that your identity and the metadata are hidden.&lt;/p&gt;
&lt;h6 id=&quot;human-security-the-weakest-link&quot;&gt;Human Security, the weakest link&lt;/h6&gt;
&lt;p&gt;Everything comes down to the human level at a certain point.&lt;/p&gt;
&lt;p&gt;This is way it is important to train ourselves in security.&lt;/p&gt;
&lt;p&gt;If we consider &lt;a href=&quot;https://en.wikipedia.org/wiki/Kevin_Mitnick&quot;&gt;Kevin Mitnick&amp;#39;s history&lt;/a&gt;, or the recent &lt;a href=&quot;http://thehackernews.com/2015/11/fbi-cia-director-hack.html&quot;&gt;FBI deputy director hack&lt;/a&gt; we see that social engineering plays a big role when we want to undermine the security of an individual of interest.&lt;/p&gt;
&lt;p&gt;But security matters even if we are not target of interest.&lt;/p&gt;
&lt;p&gt;For example let&amp;#39;s consider our password. If we use the same password on every site and one cracker manages to gain access to just one of them, our whole activities online can be exposed and our identity stolen. &lt;a href=&quot;http://www.nydailynews.com/news/national/mark-zuckerberg-twitter-account-hacked-password-dadada-article-1.2662351&quot;&gt;This is relevant&lt;/a&gt;. Myspace had its database breached and the password of Zuckerberg (even a simple one) was exposed. Given that he used the same password on twitter and other sites, his multiple accounts were compromised.&lt;/p&gt;
&lt;h3 id=&quot;what-is-tor-and-how-it-works&quot;&gt;What is TOR and how it works&lt;/h3&gt;
&lt;p&gt;When you visit a website with your mobile phone or a browser on your computer lots of things go on under the hoods.&lt;/p&gt;
&lt;p&gt;Your computer, as a client, makes what is called an &lt;a href=&quot;https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment&quot;&gt;handshake&lt;/a&gt; with the server.&lt;/p&gt;
&lt;p&gt;After telling the server that the client is interested in its content, a series of packets containing data is exchanged.&lt;/p&gt;
&lt;p&gt;That is the content of a connection. Inside this packets there are a multitude of information of two kinds:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the web page or the content we are trying to visualize;&lt;/li&gt;
&lt;li&gt;information on the status of both the server and the client.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The informations contained in every packet can be analized to understand the &amp;quot;identity&amp;quot; of the client that is requesting the content on the server, first of all the IP that is a sort of web address that every computer on the net has.&lt;/p&gt;
&lt;p&gt;Not only, during the transmission of this packets, various entity on the communication channel can analize the content and mine our data.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/wp-content/uploads/2016/tor-https-0.png&quot; alt=&quot;Cute infographic&quot;&gt;&lt;/p&gt;
&lt;p&gt;TOR still uses this kind of routine to gather the content of a web page, but instead of connecting directly to the destination server it goes through a series of other servers called relay: instead of going directly from A to B, it goes from A to C to D to E to F to B.&lt;/p&gt;
&lt;p&gt;If the web was a kindergarden Alice instead of telling directly her phrase to Bob, she would tell the word to a friend that in turn would tell the word to a friend and so on, until Bob heards the word, without knowing that Alice said that at the beginning.&lt;/p&gt;
&lt;p&gt;At this point you should ask yourself: are the data more protected if it goes through a network of relays? It actually is given that every time you send a packet through the TOR network, it gets encrypted so that no one knows it&amp;#39;s content.&lt;/p&gt;
&lt;p&gt;To tell the truth, actually the relay (called exit node) that will send the packet to the destination server, knows the content of the packet but does not know the origin.&lt;/p&gt;
&lt;p&gt;Ultimately a website can be entirely hosted on the TOR network, called the onion network, so that the packets never exit from the relays and the relay don&amp;#39;t know the phisycal location of the server, so every entity on the network reach a perfect level of anonimacy.&lt;/p&gt;
&lt;h3 id=&quot;who-owns-the-relays&quot;&gt;Who owns the relays?&lt;/h3&gt;
&lt;p&gt;Actually every one can host and own a relay if they are willing to do so.
I personally host one right now and there are many others that share a little fraction of their network connection.&lt;/p&gt;
&lt;p&gt;&lt;img src=&quot;/wp-content/uploads/2016/screenraspy.png&quot; alt=&quot;My little raspi is moving some packets right now&quot;&gt;&lt;/p&gt;
&lt;p&gt;Running a relay node is very easy and everybody should do so. Running an exit node instead is more troublesome and I don&amp;#39;t suggest it if you are not a big entity that can handle some sorts of occasional trouble.&lt;/p&gt;
&lt;h3 id=&quot;don-39-t-play-the-fool-on-the-tor-network&quot;&gt;Don&amp;#39;t play the fool on the TOR network&lt;/h3&gt;
&lt;p&gt;Of course TOR doesn&amp;#39;t guarantee you perfect anonimacy. At the end it all comes to the human layer.&lt;/p&gt;
&lt;p&gt;It&amp;#39;s no use to surf the web through TOR if we then log in to our personal blog or our personal facebook page.&lt;/p&gt;
&lt;p&gt;But there are other subtle factors that can be exploited by web companies to gather info and track their users.A&lt;/p&gt;
&lt;p&gt;Such factors are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the size of the screen and the colors supported by it;&lt;/li&gt;
&lt;li&gt;the timezone;&lt;/li&gt;
&lt;li&gt;canvas and images that the server asks your computer to generate;&lt;/li&gt;
&lt;li&gt;information about your OS that are sent through packets;&lt;/li&gt;
&lt;li&gt;the fonts available on your system;&lt;/li&gt;
&lt;li&gt;touch support;&lt;/li&gt;
&lt;li&gt;cookies;&lt;/li&gt;
&lt;li&gt;ads and cross site requests;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In particular, most of these are exploitable using a web programming language, javascript, that lots of web pages uses to render content. TOR users should avoid the use of javascript.&lt;/p&gt;
&lt;h3 id=&quot;public-private-key-encryption&quot;&gt;Public Private Key Encryption&lt;/h3&gt;
&lt;p&gt;While TOR is recent technology, public key encryption is a concept way older.&lt;/p&gt;
&lt;p&gt;What happens when we use public / private key encryption tools is conceptually similar to what happens with our physical correspondence.&lt;/p&gt;
&lt;p&gt;A public key is similar to our mailbox.&lt;/p&gt;
&lt;p&gt;Everyone that knows the location of a person&amp;#39;s mailbox can write a message and put it inside but only the owner of that mailbox, using is own key can open the mailbox and read the various messages.&lt;/p&gt;
&lt;p&gt;When we use PGP or GPG (an implementation of the public key encription concept) we generate a pair of key.&lt;/p&gt;
&lt;p&gt;A public one that we should broadcast or at least share with our social circle, and a private key that must remain secret at any cost.&lt;/p&gt;
&lt;p&gt;Everyone can encrypt every kind of digital content using our public key (that is just a really long string) and only the owner of the private key can proceed to decryption of the content.&lt;/p&gt;
&lt;p&gt;This also means that we know who is gonna read the message if encrypted using this kind of technologies.&lt;/p&gt;
&lt;p&gt;One easy tool for GPG encryption is &lt;a href=&quot;https://www.gnupg.org/%28en%29/related_software/gpa/index.html&quot;&gt;GPA&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&quot;metadata&quot;&gt;Metadata&lt;/h3&gt;
&lt;p&gt;What would you do if you were asked to put under surveillance one person?&lt;/p&gt;
&lt;p&gt;For sure placing a bug with microphone and recording capabilities would be the best option.&lt;/p&gt;
&lt;p&gt;But what if, instead of recording every thing the subject does, we just take a note of all his actions, without taking care of the content. For example, if the subject speaks to someone, we record the time, the place, the duration of the conversation and all the info of the person he is talking with.
What if, when the person walks into a mall, we record the time, the location, the shops he entered, the money he spent, the number of things bought, but not the things he bought, in detail.&lt;/p&gt;
&lt;p&gt;You can see that you can have a fairly precise idea of the habits of the person under your surveillance.&lt;/p&gt;
&lt;p&gt;Actually from metadata is easy to grab all kinds of personal information. Also, if a tiny portions of the information we have on the subject are more detailed (for example social network photos) we have a picture as clear as never.&lt;/p&gt;
&lt;p&gt;This is not just one of the biggest concern that should pop into your mind when you are talking about nation wide mass surveillance, it is also the core of the business of corporations like Facebook and Google.&lt;/p&gt;
&lt;p&gt;Whatsapp does not read the content of your messages but it stores every single bit of metadata that comes with it.&lt;/p&gt;
&lt;p&gt;Metadatas are enought to build a complete profile of the users and they are even more dangerous in the hands of an evil state agency.&lt;/p&gt;
&lt;h3 id=&quot;nothing-to-hide&quot;&gt;Nothing to hide&lt;/h3&gt;
&lt;p&gt;Even if we have nothing to hide, we have much to fear.&lt;/p&gt;
&lt;p&gt;The &amp;quot;nothing to hide&amp;quot; argument is something that everyone of us in this room has heard, at least one time.&lt;/p&gt;
&lt;p&gt;We should fear this sentence because it is the ultimate ammision of a big misunderstanding on the whole debate.&lt;/p&gt;
&lt;p&gt;Privacy, first of all, is &lt;strong&gt;control&lt;/strong&gt; over our data, not only the right to secrecy.&lt;/p&gt;
&lt;h6 id=&quot;transparency-should-be-for-everyone&quot;&gt;Transparency should be for everyone&lt;/h6&gt;
&lt;p&gt;There is a big incoherence when asking to your citizens to handle over their data. &lt;/p&gt;
&lt;p&gt;Transparency should be a two way thing, while at the current state big three letter agencies, but high level people as well, cover their tracks and are not transparent on their reports. &lt;/p&gt;
&lt;p&gt;This enhance a situation of big inequality between the people and the State.&lt;/p&gt;
&lt;p&gt;Even worse, it is not the citizen by himself that can choose if he has something to hide, but the autority.&lt;/p&gt;
&lt;p&gt;This may seem a little naive to say, but with Bruce words:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This is true even without considering social discrimination and mass media manipolation.&lt;/p&gt;
&lt;h6 id=&quot;the-fundamental-of-society&quot;&gt;The fundamental of society&lt;/h6&gt;
&lt;p&gt;Every action can be seen as either legal or illegal. When we take a decision this is one of the first, implicit concern.&lt;/p&gt;
&lt;p&gt;This is not true in a surveillance system: when you are doing something your concern is all about the possibility of raising suspicion.&lt;/p&gt;
&lt;p&gt;An idea not action is what is needed in such a dystopic condition to prove a citizen guilty.&lt;/p&gt;
&lt;h6 id=&quot;two-wrong-make-a-right&quot;&gt;Two wrong make a right&lt;/h6&gt;
&lt;p&gt;In America we are now discussing about weed legalization.&lt;/p&gt;
&lt;p&gt;Do you think that such debate would have been possible if no one could had the possibility, even if against the law, to try that substance?&lt;/p&gt;
&lt;p&gt;The same goes for gay marriages.&lt;/p&gt;
&lt;p&gt;Inside the panopticon every &lt;strong&gt;potential&lt;/strong&gt; criminal would be persecuted.&lt;/p&gt;
&lt;h3 id=&quot;to-hide-is-to-care&quot;&gt;To hide is to care&lt;/h3&gt;
&lt;p&gt;A simple truth is that we don&amp;#39;t close the windows to cover up our crimes. &lt;/p&gt;
&lt;p&gt;Our innermost experiences become in our intimacy, which is the most secred place.&lt;/p&gt;
</content>
</entry>
<entry> <entry>
<title>Phone messaging apps comparison</title> <title>Phone messaging apps comparison</title>
<link href="francescomecca.eu/pescewanda/2016/07/06/IM-services/"/> <link href="francescomecca.eu/pescewanda/2016/07/06/IM-services/"/>
@ -3022,13 +3287,16 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette
&lt;blockquote class=&quot;tr_bq&quot;&gt; &lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;p&gt; &lt;p&gt;
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service &lt;i&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;cannot even count the current number of federal crimes&lt;/span&gt;&lt;/i&gt;. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”&lt;/span&gt; Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service &lt;i&gt;&lt;span style=&quot;font-style: normal;&quot;&gt;cannot even count the current number of federal crimes&lt;/span&gt;&lt;/i&gt;. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”&lt;/span&gt;
&lt;/p&gt; &lt;/p&gt;
&lt;/blockquote&gt; &lt;/blockquote&gt;
&lt;p&gt; &lt;p&gt;
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Con le parole di &lt;a href=&quot;https://www.schneier.com/essay-114.htm&quot; target=&quot;_blank&quot;&gt;Bruce Schneier&lt;/a&gt;: “se mi dai sei linee scritte di pugno dall&amp;#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.&lt;/p&gt; Con le parole di &lt;a href=&quot;https://www.schneier.com/essay-114.htm&quot; target=&quot;_blank&quot;&gt;Bruce Schneier:&lt;/a&gt;&lt;/p&gt;
“se mi dai sei linee scritte di pugno dall&amp;#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;p&gt;
A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  &lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt; &lt;/span&gt;&lt;/span&gt; A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  &lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt; &lt;/span&gt;&lt;/span&gt;
&lt;/p&gt; &lt;/p&gt;

View file

@ -104,6 +104,10 @@

View file

@ -104,6 +104,10 @@
@ -129,6 +133,275 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
</a>
</h1>
<span class="post-date">07 Jul 2016</span>
<p>The 7th of July me and <a href="http://studentprivacy.ca">Aaron</a>, as intern at the <a href="http://cyber.law.harvard.edu">Berkman Klein for Internet and Society</a>, gave a presentation on the basics of cryptography and a quick overview on the essential tools.
1o
What follows is a short summary of that presentation. The slides are available <a href="/wp-content/uploads/2016/fwneas.pptx">here</a></p>
<h3 id="whose-security">Whose Security?</h3>
<p>Let&#39;s define what security is. Security is the possibility to being set free from structural costraints, and as that we can distinguish various levels of security depending on who we are.</p>
<p>Also, if we want to investigate security we should also define our threats: security, as being set free, from intelligence surveillance can be our target. Our concerns as different if we consider instead security from censorship or corporation data mining.</p>
<p><img src="/wp-content/uploads/2016/godmode.png" alt="uber god view">
<img src="/wp-content/uploads/2016/fb.png" alt="facebook law enforcement form"></p>
<p>What is shown above is the <a href="http://www.theverge.com/2016/1/6/10726004/uber-god-mode-settlement-fine">Uber God View</a>, a tool Uber used to track a Buzzfeed&#39;s journalist locations, and the Facebook standard form that is given to law enforcement when requested.</p>
<h3 id="security-is-a-state-of-mind">Security is a state of mind</h3>
<p>Security is hard. It is really rare to reach a state of complete security and even in that case, it depends on our target.</p>
<p>What is important is to train ourselves to security. Security is a state of mind and there are no tools that automatically protect us without our active partecipation.</p>
<p>Let&#39;s explore that in details.</p>
<h3 id="the-layers-of-security">The layers of security</h3>
<p>We can distinguish four layers of security:</p>
<ul>
<li>Device Security;</li>
<li>Network Security;</li>
<li>Message Security;</li>
<li>Human Security.</li>
</ul>
<h6 id="device-security-where-everything-happens">Device Security, where everything happens</h6>
<p>Device security is related to the &quot;physical host&quot;.</p>
<p>If the computer we use is tampered, at the hardware level, or the phone is bugged, there is no way to escape using higher level tools.</p>
<p>In other words, it doesn&#39;t matter if we use a super secure password if our computer is registering all our keystrokes and send them to a third party.</p>
<p>Also, device security is useful if we consider that our device can fall into the hands of attackers that may be able to traceback all the activities.</p>
<p>Some precautions for this purpose:</p>
<ul>
<li>full disk encryption;</li>
<li>minimal set of application installed;</li>
<li>open source operating systems.</li>
</ul>
<h6 id="network-security">Network Security</h6>
<p>The network is the infrastructures that our device is attached to. In most of the case, when we consider our computer is the internet (and the GSM network in case of mobile phones).</p>
<p>Network security is essential to evade censorship, behavioural tracking and identity theft.</p>
<p>Some tools that may help in this case:</p>
<ul>
<li>vpn;</li>
<li>tor;</li>
<li>p2p networks;</li>
<li>mesh networks.</li>
</ul>
<p>And for the web:</p>
<ul>
<li>opensource web browsers (such as firefox);</li>
<li>no google apps on android phones;</li>
<li>https.</li>
</ul>
<h6 id="message-security">Message Security</h6>
<p>Message security is the level of protection regarding the content that you want to send or receive.</p>
<p>Message security is essential if you want to avoid any third party snooping and the confidentiality of your messages.</p>
<p>The tools we can use in this context:</p>
<ul>
<li>OTR;</li>
<li>opensource messaging protocols (XMPP, matrix);</li>
<li>Signal;</li>
<li>PGP.</li>
</ul>
<p>Also, always remember that encrypting the content of the message doesn&#39;t guarantee that your identity and the metadata are hidden.</p>
<h6 id="human-security-the-weakest-link">Human Security, the weakest link</h6>
<p>Everything comes down to the human level at a certain point.</p>
<p>This is way it is important to train ourselves in security.</p>
<p>If we consider <a href="https://en.wikipedia.org/wiki/Kevin_Mitnick">Kevin Mitnick&#39;s history</a>, or the recent <a href="http://thehackernews.com/2015/11/fbi-cia-director-hack.html">FBI deputy director hack</a> we see that social engineering plays a big role when we want to undermine the security of an individual of interest.</p>
<p>But security matters even if we are not target of interest.</p>
<p>For example let&#39;s consider our password. If we use the same password on every site and one cracker manages to gain access to just one of them, our whole activities online can be exposed and our identity stolen. <a href="http://www.nydailynews.com/news/national/mark-zuckerberg-twitter-account-hacked-password-dadada-article-1.2662351">This is relevant</a>. Myspace had its database breached and the password of Zuckerberg (even a simple one) was exposed. Given that he used the same password on twitter and other sites, his multiple accounts were compromised.</p>
<h3 id="what-is-tor-and-how-it-works">What is TOR and how it works</h3>
<p>When you visit a website with your mobile phone or a browser on your computer lots of things go on under the hoods.</p>
<p>Your computer, as a client, makes what is called an <a href="https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment">handshake</a> with the server.</p>
<p>After telling the server that the client is interested in its content, a series of packets containing data is exchanged.</p>
<p>That is the content of a connection. Inside this packets there are a multitude of information of two kinds:</p>
<ul>
<li>the web page or the content we are trying to visualize;</li>
<li>information on the status of both the server and the client.</li>
</ul>
<p>The informations contained in every packet can be analized to understand the &quot;identity&quot; of the client that is requesting the content on the server, first of all the IP that is a sort of web address that every computer on the net has.</p>
<p>Not only, during the transmission of this packets, various entity on the communication channel can analize the content and mine our data.</p>
<p><img src="/wp-content/uploads/2016/tor-https-0.png" alt="Cute infographic"></p>
<p>TOR still uses this kind of routine to gather the content of a web page, but instead of connecting directly to the destination server it goes through a series of other servers called relay: instead of going directly from A to B, it goes from A to C to D to E to F to B.</p>
<p>If the web was a kindergarden Alice instead of telling directly her phrase to Bob, she would tell the word to a friend that in turn would tell the word to a friend and so on, until Bob heards the word, without knowing that Alice said that at the beginning.</p>
<p>At this point you should ask yourself: are the data more protected if it goes through a network of relays? It actually is given that every time you send a packet through the TOR network, it gets encrypted so that no one knows it&#39;s content.</p>
<p>To tell the truth, actually the relay (called exit node) that will send the packet to the destination server, knows the content of the packet but does not know the origin.</p>
<p>Ultimately a website can be entirely hosted on the TOR network, called the onion network, so that the packets never exit from the relays and the relay don&#39;t know the phisycal location of the server, so every entity on the network reach a perfect level of anonimacy.</p>
<h3 id="who-owns-the-relays">Who owns the relays?</h3>
<p>Actually every one can host and own a relay if they are willing to do so.
I personally host one right now and there are many others that share a little fraction of their network connection.</p>
<p><img src="/wp-content/uploads/2016/screenraspy.png" alt="My little raspi is moving some packets right now"></p>
<p>Running a relay node is very easy and everybody should do so. Running an exit node instead is more troublesome and I don&#39;t suggest it if you are not a big entity that can handle some sorts of occasional trouble.</p>
<h3 id="don-39-t-play-the-fool-on-the-tor-network">Don&#39;t play the fool on the TOR network</h3>
<p>Of course TOR doesn&#39;t guarantee you perfect anonimacy. At the end it all comes to the human layer.</p>
<p>It&#39;s no use to surf the web through TOR if we then log in to our personal blog or our personal facebook page.</p>
<p>But there are other subtle factors that can be exploited by web companies to gather info and track their users.A</p>
<p>Such factors are:</p>
<ul>
<li>the size of the screen and the colors supported by it;</li>
<li>the timezone;</li>
<li>canvas and images that the server asks your computer to generate;</li>
<li>information about your OS that are sent through packets;</li>
<li>the fonts available on your system;</li>
<li>touch support;</li>
<li>cookies;</li>
<li>ads and cross site requests;</li>
</ul>
<p>In particular, most of these are exploitable using a web programming language, javascript, that lots of web pages uses to render content. TOR users should avoid the use of javascript.</p>
<h3 id="public-private-key-encryption">Public Private Key Encryption</h3>
<p>While TOR is recent technology, public key encryption is a concept way older.</p>
<p>What happens when we use public / private key encryption tools is conceptually similar to what happens with our physical correspondence.</p>
<p>A public key is similar to our mailbox.</p>
<p>Everyone that knows the location of a person&#39;s mailbox can write a message and put it inside but only the owner of that mailbox, using is own key can open the mailbox and read the various messages.</p>
<p>When we use PGP or GPG (an implementation of the public key encription concept) we generate a pair of key.</p>
<p>A public one that we should broadcast or at least share with our social circle, and a private key that must remain secret at any cost.</p>
<p>Everyone can encrypt every kind of digital content using our public key (that is just a really long string) and only the owner of the private key can proceed to decryption of the content.</p>
<p>This also means that we know who is gonna read the message if encrypted using this kind of technologies.</p>
<p>One easy tool for GPG encryption is <a href="https://www.gnupg.org/%28en%29/related_software/gpa/index.html">GPA</a></p>
<h3 id="metadata">Metadata</h3>
<p>What would you do if you were asked to put under surveillance one person?</p>
<p>For sure placing a bug with microphone and recording capabilities would be the best option.</p>
<p>But what if, instead of recording every thing the subject does, we just take a note of all his actions, without taking care of the content. For example, if the subject speaks to someone, we record the time, the place, the duration of the conversation and all the info of the person he is talking with.
What if, when the person walks into a mall, we record the time, the location, the shops he entered, the money he spent, the number of things bought, but not the things he bought, in detail.</p>
<p>You can see that you can have a fairly precise idea of the habits of the person under your surveillance.</p>
<p>Actually from metadata is easy to grab all kinds of personal information. Also, if a tiny portions of the information we have on the subject are more detailed (for example social network photos) we have a picture as clear as never.</p>
<p>This is not just one of the biggest concern that should pop into your mind when you are talking about nation wide mass surveillance, it is also the core of the business of corporations like Facebook and Google.</p>
<p>Whatsapp does not read the content of your messages but it stores every single bit of metadata that comes with it.</p>
<p>Metadatas are enought to build a complete profile of the users and they are even more dangerous in the hands of an evil state agency.</p>
<h3 id="nothing-to-hide">Nothing to hide</h3>
<p>Even if we have nothing to hide, we have much to fear.</p>
<p>The &quot;nothing to hide&quot; argument is something that everyone of us in this room has heard, at least one time.</p>
<p>We should fear this sentence because it is the ultimate ammision of a big misunderstanding on the whole debate.</p>
<p>Privacy, first of all, is <strong>control</strong> over our data, not only the right to secrecy.</p>
<h6 id="transparency-should-be-for-everyone">Transparency should be for everyone</h6>
<p>There is a big incoherence when asking to your citizens to handle over their data. </p>
<p>Transparency should be a two way thing, while at the current state big three letter agencies, but high level people as well, cover their tracks and are not transparent on their reports. </p>
<p>This enhance a situation of big inequality between the people and the State.</p>
<p>Even worse, it is not the citizen by himself that can choose if he has something to hide, but the autority.</p>
<p>This may seem a little naive to say, but with Bruce words:</p>
<blockquote>
<p>If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.</p>
</blockquote>
<p>This is true even without considering social discrimination and mass media manipolation.</p>
<h6 id="the-fundamental-of-society">The fundamental of society</h6>
<p>Every action can be seen as either legal or illegal. When we take a decision this is one of the first, implicit concern.</p>
<p>This is not true in a surveillance system: when you are doing something your concern is all about the possibility of raising suspicion.</p>
<p>An idea not action is what is needed in such a dystopic condition to prove a citizen guilty.</p>
<h6 id="two-wrong-make-a-right">Two wrong make a right</h6>
<p>In America we are now discussing about weed legalization.</p>
<p>Do you think that such debate would have been possible if no one could had the possibility, even if against the law, to try that substance?</p>
<p>The same goes for gay marriages.</p>
<p>Inside the panopticon every <strong>potential</strong> criminal would be persecuted.</p>
<h3 id="to-hide-is-to-care">To hide is to care</h3>
<p>A simple truth is that we don&#39;t close the windows to cover up our crimes. </p>
<p>Our innermost experiences become in our intimacy, which is the most secred place.</p>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -426,93 +699,6 @@ Anyway for simple cases the GA yields good results, as an example for points (0
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/05/03/satoshisignature/">
Why Wright's proof is a fake
</a>
</h1>
<span class="post-date">03 May 2016</span>
<p>I explained in my previous <a href="http://francescomecca.eu/pescewanda/2016/04/17/wright-nakamoto/">post</a> (in italian) that the signature that Wright provided as a public proof is in fact invalid.
I want to explain briefly how you could check this claim.
The key in Wright&#39;s <a href="http://www.drcraigwright.net/jean-paul-sartre-signing-significance/">post</a> is this:</p>
<div class="highlight"><pre><code class="language-" data-lang="">------------------------- Signature File -------------------------
MEUCIQDBKn1Uly8m0UyzETObUSL4wYdBfd4ejvtoQfVcNCIK4AIgZmMsXNQWHvo6KDd2Tu6euEl1
3VTC3ihl6XUlhcU+fM4=
------------------------- End Signature --------------------------
</code></pre></div>
<p>Now we can use some bash utilities:</p>
<ul>
<li>base64, that translates encoded ASCII text;</li>
<li>hexdump, that displays hexadecimal contents from the input;</li>
<li>cut, used to remove the binary part of the input;</li>
<li>tr, used to delete spaces and carriage return from the input;</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">base64 -d &lt;&lt;&lt;'MEUCIQDBKn1Uly8m0UyzETObUSL4wYdBfd4ejvtoQfVcNCIK4AIgZmMsXNQWHvo6KDd2Tu6euEl13VTC3ihl6XUlhcU+fM4=' | hexdump -C| cut -b 11-60| tr -d ' \n'
3045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce
</code></pre></div>
<p>Let&#39;s analyze the command one by one:</p>
<ul>
<li><code>base64 -d</code> decodes the redirected string, the output is some gibberish characters so I won&#39;t display them here;</li>
<li><code>hexdump -C</code> is used with a pipe to convert to hexadecimal:</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">00000000 30 45 02 21 00 c1 2a 7d 54 97 2f 26 d1 4c b3 11 |0E.!..*}T./&amp;.L..|
00000010 33 9b 51 22 f8 c1 87 41 7d de 1e 8e fb 68 41 f5 |3.Q"...A}....hA.|
00000020 5c 34 22 0a e0 02 20 66 63 2c 5c d4 16 1e fa 3a |\4"... fc,\....:|
00000030 28 37 76 4e ee 9e b8 49 75 dd 54 c2 de 28 65 e9 |(7vN...Iu.T..(e.|
00000040 75 25 85 c5 3e 7c ce |u%..&gt;|.|
</code></pre></div>
<ul>
<li>cut -b 11-60 displays only the characters from column 11 to 60:</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">30 45 02 21 00 c1 2a 7d 54 97 2f 26 d1 4c b3 11
33 9b 51 22 f8 c1 87 41 7d de 1e 8e fb 68 41 f5
5c 34 22 0a e0 02 20 66 63 2c 5c d4 16 1e fa 3a
28 37 76 4e ee 9e b8 49 75 dd 54 c2 de 28 65 e9
75 25 85 c5 3e 7c ce
</code></pre></div>
<ul>
<li><code>tr -d &#39; \n&#39;</code> is used to delete spaces and carriage returns from the output so that is shown in one line and it gives us the final result:</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">3045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce
</code></pre></div>
<p>If you noticed, there is also another cleartext string at the beginning of Wright&#39;s post:</p>
<div class="highlight"><pre><code class="language-" data-lang="">$ base64 -d &lt;&lt;&lt;'IFdyaWdodCwgaXQgaXMgbm90IHRoZSBzYW1lIGFzIGlmIEkgc2lnbiBDcmFpZyBXcmlnaHQsIFNhdG9zaGkuCgo='
Wright, it is not the same as if I sign Craig Wright, Satoshi.
</code></pre></div>
<p>Now let&#39;s head to blockchain.info.
Blockchain.info has a little <a href="https://blockchain.info/decode-tx">utility</a> to get hexadecimal informations out of a transaction on the blockchain, so let&#39;s use it to get the related info about this transaction:</p>
<p><a href="https://blockchain.info/tx/828ef3b079f9c23829c56fe86e85b4a69d9e06e5b54ea597eef5fb3ffef509fe">tx/828ef3b079f9c23829c56fe86e85b4a69d9e06e5b54ea597eef5fb3ffef509fe</a>
<a href="https://blockchain.info/tx/828ef3b079f9c23829c56fe86e85b4a69d9e06e5b54ea597eef5fb3ffef509fe?format=hex">tx/828ef3b079f9... in hexadecimal</a></p>
<p>As you can see the entire output of the first bash command, that is
<code>
3045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce
</code>
is contained in:
<code>
&quot;script&quot;:&quot;483045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce01&quot;
</code>
except for the 48 at the beginning and the 01 at the end.</p>
<p>That is a signature hash:
this <a href="https://en.bitcoin.it/wiki/List_of_address_prefixes">page</a> explains that the 48 is just a decimal prefix given to uncompressed transactions, and the 01 at the end is just a SIGHASH_ALL <a href="https://bitcoin.org/en/glossary/signature-hash">code</a> that flags the end of the signature.</p>
<h2 id="so-is-it-a-fake">So, is it a fake?</h2>
<p>Yes, indeed.
At the end, I ask, why would you choose anything else than the easiest and most conclusive way to prove something?</p>
<p><img src="/wp-content/uploads/2016/satosh.jpg" alt="Wright &quot;signs&quot; the blockchain"></p>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">

View file

@ -104,6 +104,10 @@
@ -220,6 +224,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -238,15 +251,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -250,6 +254,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -268,15 +281,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -214,6 +218,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -232,15 +245,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -204,6 +208,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -222,15 +235,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -208,6 +212,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -226,15 +239,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -173,6 +177,15 @@ David Gomez, un ex agente dell&#8217;FBI , ha detto che il velivolo di sorveglia
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -191,15 +204,6 @@ David Gomez, un ex agente dell&#8217;FBI , ha detto che il velivolo di sorveglia
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -146,6 +150,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -164,15 +177,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -190,6 +194,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -208,15 +221,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -263,6 +267,15 @@ Command successful.</pre>
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -281,15 +294,6 @@ Command successful.</pre>
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -166,6 +170,15 @@ perl-cleaner --all</pre>
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -184,15 +197,6 @@ perl-cleaner --all</pre>
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -227,6 +231,15 @@ The original idea for the Buridan&#39;s donkey came from my mentor <a href="http
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -245,15 +258,6 @@ The original idea for the Buridan&#39;s donkey came from my mentor <a href="http
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -182,6 +186,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -200,15 +213,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -205,6 +209,15 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -223,15 +236,6 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -764,6 +768,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -782,15 +795,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -189,6 +193,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -207,15 +220,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -165,6 +169,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -183,15 +196,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -281,6 +285,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -299,15 +312,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -202,6 +206,15 @@ Alcuni <a href="https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs" t
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -220,15 +233,6 @@ Alcuni <a href="https://trac.torproject.org/projects/tor/wiki/doc/GoodBadISPs" t
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -156,6 +160,15 @@ L&#8217;opera si trova a Berlino.</p>
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -174,15 +187,6 @@ L&#8217;opera si trova a Berlino.</p>
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -210,6 +214,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -228,15 +241,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -158,6 +162,15 @@ L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza l
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -176,15 +189,6 @@ L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza l
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -246,6 +250,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -264,15 +277,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -168,6 +172,15 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -186,15 +199,6 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -168,13 +172,16 @@
<blockquote class="tr_bq"> <blockquote class="tr_bq">
<p> <p>
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }<span style="font-family: Arial, Helvetica, sans-serif;">Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service <i><span style="font-style: normal;">cannot even count the current number of federal crimes</span></i>. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”</span> Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service <i><span style="font-style: normal;">cannot even count the current number of federal crimes</span></i>. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”</span>
</p> </p>
</blockquote> </blockquote>
<p> <p>
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }<span style="font-family: Arial, Helvetica, sans-serif;">Con le parole di <a href="https://www.schneier.com/essay-114.htm" target="_blank">Bruce Schneier</a>: “se mi dai sei linee scritte di pugno dall&#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.</p> Con le parole di <a href="https://www.schneier.com/essay-114.htm" target="_blank">Bruce Schneier:</a></p>
“se mi dai sei linee scritte di pugno dall&#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.
<p></p>
<p> <p>
A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  <span style="font-size: large;"><br /> </span></span> A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  <span style="font-size: large;"><br /> </span></span>
</p> </p>
@ -217,6 +224,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -235,15 +251,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -186,6 +190,15 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -204,15 +217,6 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -235,6 +239,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -253,15 +266,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -158,6 +162,15 @@ Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrut
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -176,15 +189,6 @@ Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrut
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -160,6 +164,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -178,15 +191,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -210,6 +214,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -228,15 +241,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -197,6 +201,15 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -215,15 +228,6 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -187,6 +191,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -205,15 +218,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -176,6 +180,15 @@ echo Complete.
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -194,15 +207,6 @@ echo Complete.
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -147,6 +151,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -165,15 +178,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -189,6 +193,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -207,15 +220,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

173
_site/page10/index.html Normal file
View file

@ -0,0 +1,173 @@
<!DOCTYPE html>
<html lang="en-us">
<head>
<link href="http://gmpg.org/xfn/11" rel="profile">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta http-equiv="content-type" content="text/html; charset=utf-8">
<!-- Enable responsiveness on mobile devices-->
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1">
<title>
Caught in the Net &middot; La rete ti cattura ma libera il pensiero
</title>
<!-- CSS -->
<link rel="stylesheet" href="/public/css/poole.css">
<link rel="stylesheet" href="/public/css/syntax.css">
<link rel="stylesheet" href="/public/css/hyde.css">
<!-- Icons -->
<link rel="apple-touch-icon-precomposed" sizes="144x144" href="/public/apple-touch-icon-144-precomposed.png">
<link rel="shortcut icon" href="/public/favicon.ico">
<!-- RSS -->
<link rel="alternate" type="application/rss+xml" title="RSS" href="/atom.xml">
</head>
<body class="theme-base-09">
<div class="sidebar">
<div class="container sidebar-sticky">
<div class="sidebar-about">
<h1>
<a href="/">
Caught in the Net
</a>
</h1>
<p class="lead"></p>
</div>
<nav class="sidebar-nav">
<a class="sidebar-nav-item" href="/">Home</a>
<a class="sidebar-nav-item" href="/about/">About</a>
<a class="sidebar-nav-item" href="/archive/">Archive</a>
<a class="sidebar-nav-item" href="/contattami/">Contattami</a>
<a class="sidebar-nav-item" href="/atom.xml">RSS</a>
<a class="sidebar-nav-item" href="http://francescomecca.eu:3000">Personal Git</a>
<a cleass="sidebar-nav-item" href="https://github.com/s211897-studentipolito">github</a>
<span class="sidebar-nav-item" href="" >Powered by Jekyll and Hyde</span>
</nav>
<p>&copy; 2016. CC BY-SA 4.0 International </p>
</div>
</div>
<h3 class="masthead-title">
<a href="/" title="Home">Caught in the Net</a>
</h3>
<div class="content container">
<div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/90">
Chiave PGP
</a>
</h1>
<span class="post-date">31 Mar 2015</span>
<p>Questa e` la nostra chiave PGP con la quale possiamo essere contattati all&#8217;indirizzo<br>
<strong>pescewanda3 [at] gmail.com</strong></p>
<div class="code">
&#8212;&#8211;BEGIN PGP PUBLIC KEY BLOCK&#8212;&#8211;<br />Version: GnuPG v2</p>
<p>
mQENBFUa5j4BCAC8clTqI75PkKJ+YewmyXqjBtlsqXCWlunS4CkQTaaI3I5c13yz<br />+Nc+gibHrxhQZcOULYhjlhe9PNv/8Bnj4i2qBMjJNORAlJycjgyzCTy3OY+Hkt6Q<br />c/6uXp5ObnLblKwnPSgaij9GuH4PD1fe+fN0LORMqNJ8PNdk1a5qNJ7fuH8/nIus<br />F2+Rv6qej0OcLIUUebeiMLu+Nc52tDX76kjdvq9cG7AyAXpo478Xr4EnhPDB0sXc<br />TAGJ3I93caVXa9lqP+njI9mPDTyrl+lobLgQhdIOsW50JZmbG/EHMHFKahcaEssM<br />50lz+PtqZ0VblIDTe9xjukdcPaKhPaGuW2OxABEBAAG0KWNhdWdodF9pbl90aGVf<br />bmV0IDxwZXNjZXdhbmRhM0BnbWFpbC5jb20+iQE5BBMBCAAjBQJVGuY+AhsDBwsJ<br />CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQ12NuZ5rBCRLsOgf9EhR2I0M30jzP<br />rDYU5jFwyaFzWheiKO9yAiHHj2+iJXYsPcyNEIa0E+IqqMWu9e7AksscRe/rkq7U<br />wOANtiYMVTfdqnPE13c4KqKTXjikua/j4lE3fDU4IF5+sRgK62H+Ee64flP1ReO8<br />Zo4z2mwcYxqag+uSNBE0pnuICSd9NCCOiKjS0HRaG0CbpyDQ+fuqjulfn9zpU1a2<br />6y/Lg1uixIDZZICmVKfZkl5ZqkS/1Sdx4AK6rnnFH0gZ1k2J6LsE4cqvazIroRgr<br />opnuSQsfwMNiu6oaBe/+kzlhSZy/vb/vw0HT5oZHtY2so/dZe42v40weyxroZgaY<br />SR2wE5wsM7kBDQRVGuY+AQgArq1F9dl61MOSQi/SYTgmPYjptcgm0L5QBmsOeN1v<br />9YWPFn/AR8GOiGRF1//TI+ECjfL8uAdzbK1xJURXcBTrO0BdgRBlaZgSRiq+KFGT<br />pmyjj+q1toVLPwIZmsxHL6j7doSnt9Z4oesKIJ2hrdEGZ3hpFBekxMR2lmHk3zQB<br />e/qsSUwS/rIk/BBWtdifdEzcK7AJb0nRAJzQu6kyEdOGOuEprtSkG8789SkKGFxz<br />HuEIyRxoLz/KQJ7FGINQwNYXM6+5pjNt7vu5knFGF71TjVN0UjFck/mxWObxwxO3<br />EoZtW6tNgkxdOoFBIo8hhSxsVqIHoyztf58Ppo/IOgSCyQARAQABiQEfBBgBCAAJ<br />BQJVGuY+AhsMAAoJENdjbmeawQkSx/EIAK26MGlFMzviE9mWRF09vljESVbfRcnE<br />ybMZNlq/w6AdU1R6g2nbooKX1KuB8uBTZYegLJByj+ssiZagrW7rASLLVADzfP3D<br />m2TFCqE/LeOJzgMtaUfEAgvee4jNVHFvAJ2k5fejk9aQ+r3EskqACqfnY4y5SE30<br />tFsS+Wwz1C+NHFv0EnVyJaDUGKq7ZX7BQHGlxW0AFz17l4hMQztgx6Il36yC5EQr<br />BQULGVPCHpadUGpzPWIqKhIg33P3FlCqzSVBGB9aXqfBQYAUjP2MrieWcaLdJbRM<br />MBR29ROibDEd8qOPvcHrRg3cb2OPw9/Ia19VqEE9/tjn094CCuVkDPU=<br />=/XCq<br />&#8212;&#8211;END PGP PUBLIC KEY BLOCK&#8212;&#8211;
</p>
</div>
</div>
</div>
<div class="pagination">
<span class="pagination-item older">Older</span>
<a class="pagination-item newer" href="/page9">Newer</a>
</div>
</div>
</body>
</html>

View file

@ -104,6 +104,10 @@
@ -129,6 +133,93 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/05/03/satoshisignature/">
Why Wright's proof is a fake
</a>
</h1>
<span class="post-date">03 May 2016</span>
<p>I explained in my previous <a href="http://francescomecca.eu/pescewanda/2016/04/17/wright-nakamoto/">post</a> (in italian) that the signature that Wright provided as a public proof is in fact invalid.
I want to explain briefly how you could check this claim.
The key in Wright&#39;s <a href="http://www.drcraigwright.net/jean-paul-sartre-signing-significance/">post</a> is this:</p>
<div class="highlight"><pre><code class="language-" data-lang="">------------------------- Signature File -------------------------
MEUCIQDBKn1Uly8m0UyzETObUSL4wYdBfd4ejvtoQfVcNCIK4AIgZmMsXNQWHvo6KDd2Tu6euEl1
3VTC3ihl6XUlhcU+fM4=
------------------------- End Signature --------------------------
</code></pre></div>
<p>Now we can use some bash utilities:</p>
<ul>
<li>base64, that translates encoded ASCII text;</li>
<li>hexdump, that displays hexadecimal contents from the input;</li>
<li>cut, used to remove the binary part of the input;</li>
<li>tr, used to delete spaces and carriage return from the input;</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">base64 -d &lt;&lt;&lt;'MEUCIQDBKn1Uly8m0UyzETObUSL4wYdBfd4ejvtoQfVcNCIK4AIgZmMsXNQWHvo6KDd2Tu6euEl13VTC3ihl6XUlhcU+fM4=' | hexdump -C| cut -b 11-60| tr -d ' \n'
3045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce
</code></pre></div>
<p>Let&#39;s analyze the command one by one:</p>
<ul>
<li><code>base64 -d</code> decodes the redirected string, the output is some gibberish characters so I won&#39;t display them here;</li>
<li><code>hexdump -C</code> is used with a pipe to convert to hexadecimal:</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">00000000 30 45 02 21 00 c1 2a 7d 54 97 2f 26 d1 4c b3 11 |0E.!..*}T./&amp;.L..|
00000010 33 9b 51 22 f8 c1 87 41 7d de 1e 8e fb 68 41 f5 |3.Q"...A}....hA.|
00000020 5c 34 22 0a e0 02 20 66 63 2c 5c d4 16 1e fa 3a |\4"... fc,\....:|
00000030 28 37 76 4e ee 9e b8 49 75 dd 54 c2 de 28 65 e9 |(7vN...Iu.T..(e.|
00000040 75 25 85 c5 3e 7c ce |u%..&gt;|.|
</code></pre></div>
<ul>
<li>cut -b 11-60 displays only the characters from column 11 to 60:</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">30 45 02 21 00 c1 2a 7d 54 97 2f 26 d1 4c b3 11
33 9b 51 22 f8 c1 87 41 7d de 1e 8e fb 68 41 f5
5c 34 22 0a e0 02 20 66 63 2c 5c d4 16 1e fa 3a
28 37 76 4e ee 9e b8 49 75 dd 54 c2 de 28 65 e9
75 25 85 c5 3e 7c ce
</code></pre></div>
<ul>
<li><code>tr -d &#39; \n&#39;</code> is used to delete spaces and carriage returns from the output so that is shown in one line and it gives us the final result:</li>
</ul>
<div class="highlight"><pre><code class="language-" data-lang="">3045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce
</code></pre></div>
<p>If you noticed, there is also another cleartext string at the beginning of Wright&#39;s post:</p>
<div class="highlight"><pre><code class="language-" data-lang="">$ base64 -d &lt;&lt;&lt;'IFdyaWdodCwgaXQgaXMgbm90IHRoZSBzYW1lIGFzIGlmIEkgc2lnbiBDcmFpZyBXcmlnaHQsIFNhdG9zaGkuCgo='
Wright, it is not the same as if I sign Craig Wright, Satoshi.
</code></pre></div>
<p>Now let&#39;s head to blockchain.info.
Blockchain.info has a little <a href="https://blockchain.info/decode-tx">utility</a> to get hexadecimal informations out of a transaction on the blockchain, so let&#39;s use it to get the related info about this transaction:</p>
<p><a href="https://blockchain.info/tx/828ef3b079f9c23829c56fe86e85b4a69d9e06e5b54ea597eef5fb3ffef509fe">tx/828ef3b079f9c23829c56fe86e85b4a69d9e06e5b54ea597eef5fb3ffef509fe</a>
<a href="https://blockchain.info/tx/828ef3b079f9c23829c56fe86e85b4a69d9e06e5b54ea597eef5fb3ffef509fe?format=hex">tx/828ef3b079f9... in hexadecimal</a></p>
<p>As you can see the entire output of the first bash command, that is
<code>
3045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce
</code>
is contained in:
<code>
&quot;script&quot;:&quot;483045022100c12a7d54972f26d14cb311339b5122f8c187417dde1e8efb6841f55c34220ae0022066632c5cd4161efa3a2837764eee9eb84975dd54c2de2865e9752585c53e7cce01&quot;
</code>
except for the 48 at the beginning and the 01 at the end.</p>
<p>That is a signature hash:
this <a href="https://en.bitcoin.it/wiki/List_of_address_prefixes">page</a> explains that the 48 is just a decimal prefix given to uncompressed transactions, and the 01 at the end is just a SIGHASH_ALL <a href="https://bitcoin.org/en/glossary/signature-hash">code</a> that flags the end of the signature.</p>
<h2 id="so-is-it-a-fake">So, is it a fake?</h2>
<p>Yes, indeed.
At the end, I ask, why would you choose anything else than the easiest and most conclusive way to prove something?</p>
<p><img src="/wp-content/uploads/2016/satosh.jpg" alt="Wright &quot;signs&quot; the blockchain"></p>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/pescewanda/2016/04/17/wright-nakamoto/"> <a href="/pescewanda/2016/04/17/wright-nakamoto/">
@ -335,45 +426,6 @@ instantaneously.</p></li>
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/04/02/buridan_donkey/">
The Buridan's donkey in python
</a>
</h1>
<span class="post-date">02 Apr 2016</span>
<p>During the final weeks of my exam session I started reading a bit about python 3 using an excellent book: <a href="http://www.diveintopython.net/">Dive into Python</a>.
When I noted that python uses the <a href="https://en.wikipedia.org/wiki/Mersenne_Twister">Mersenne Twister PRNG</a> as well I decided to write another version of my <a href="http://francescomecca.eu/index.php/archives/207">Buridan&#39;s donkey program</a>.</p>
<figure class="highlight"><pre><code class="language-python" data-lang="python"> <span class="kn">import</span> <span class="nn">random</span><span class="o">,</span> <span class="nn">sys</span>
<span class="k">if</span> <span class="n">__name__</span> <span class="o">==</span> <span class="s">'__main__'</span><span class="p">:</span>
<span class="n">args</span> <span class="o">=</span> <span class="nb">list</span><span class="p">()</span>
<span class="k">if</span> <span class="ow">not</span> <span class="n">sys</span><span class="o">.</span><span class="n">stdin</span><span class="o">.</span><span class="n">isatty</span><span class="p">():</span>
<span class="k">for</span> <span class="n">line</span> <span class="ow">in</span> <span class="n">sys</span><span class="o">.</span><span class="n">stdin</span><span class="p">:</span>
<span class="k">if</span> <span class="n">line</span><span class="p">[</span><span class="o">-</span><span class="mi">1</span><span class="p">]</span> <span class="ow">is</span> <span class="s">'</span><span class="se">\n</span><span class="s">'</span><span class="p">:</span>
<span class="n">line</span> <span class="o">=</span> <span class="n">line</span><span class="p">[:</span><span class="o">-</span><span class="mi">1</span><span class="p">]</span>
<span class="n">args</span><span class="o">.</span><span class="n">append</span><span class="p">(</span><span class="n">line</span><span class="p">)</span>
<span class="k">else</span><span class="p">:</span>
<span class="n">args</span> <span class="o">=</span> <span class="n">sys</span><span class="o">.</span><span class="n">argv</span><span class="p">[</span><span class="mi">1</span><span class="p">:]</span>
<span class="n">argRange</span> <span class="o">=</span> <span class="nb">len</span><span class="p">(</span><span class="n">args</span><span class="p">)</span>
<span class="k">for</span> <span class="n">i</span> <span class="ow">in</span> <span class="nb">range</span><span class="p">(</span><span class="n">argRange</span><span class="p">):</span>
<span class="k">print</span><span class="p">(</span><span class="nb">str</span><span class="p">(</span><span class="n">i</span><span class="o">+</span><span class="mi">1</span><span class="p">)</span> <span class="o">+</span> <span class="s">'.'</span><span class="p">,</span> <span class="n">args</span><span class="o">.</span><span class="n">pop</span><span class="p">(</span><span class="n">random</span><span class="o">.</span><span class="n">randrange</span><span class="p">(</span><span class="mi">0</span><span class="p">,</span> <span class="nb">len</span><span class="p">(</span><span class="n">args</span><span class="p">))))</span></code></pre></figure>
<p>This script works in a different way than the one in c++.
Rather than shuffling a list made by the entries in the arguments, it pops randomly one entry from the list till the list is empty.</p>
<p>Not satisfied enough, I wrote also a telegram bot using the <a href="https://github.com/eternnoir/pyTelegramBotAPI">telebot library</a> that works as the script above but inside the telegram app.
The bot can be added to your contact list by simply searching for <a href="http://telegram.me/duridan_donkey_bot">@duridan_donkey_bot</a> (yes, a typo!)</p>
<p>All the code is opensource and can be found on my github page.</p>
<p>Francesco Mecca</p>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">

View file

@ -104,6 +104,10 @@
@ -129,6 +133,45 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/pescewanda/2016/04/02/buridan_donkey/">
The Buridan's donkey in python
</a>
</h1>
<span class="post-date">02 Apr 2016</span>
<p>During the final weeks of my exam session I started reading a bit about python 3 using an excellent book: <a href="http://www.diveintopython.net/">Dive into Python</a>.
When I noted that python uses the <a href="https://en.wikipedia.org/wiki/Mersenne_Twister">Mersenne Twister PRNG</a> as well I decided to write another version of my <a href="http://francescomecca.eu/index.php/archives/207">Buridan&#39;s donkey program</a>.</p>
<figure class="highlight"><pre><code class="language-python" data-lang="python"> <span class="kn">import</span> <span class="nn">random</span><span class="o">,</span> <span class="nn">sys</span>
<span class="k">if</span> <span class="n">__name__</span> <span class="o">==</span> <span class="s">'__main__'</span><span class="p">:</span>
<span class="n">args</span> <span class="o">=</span> <span class="nb">list</span><span class="p">()</span>
<span class="k">if</span> <span class="ow">not</span> <span class="n">sys</span><span class="o">.</span><span class="n">stdin</span><span class="o">.</span><span class="n">isatty</span><span class="p">():</span>
<span class="k">for</span> <span class="n">line</span> <span class="ow">in</span> <span class="n">sys</span><span class="o">.</span><span class="n">stdin</span><span class="p">:</span>
<span class="k">if</span> <span class="n">line</span><span class="p">[</span><span class="o">-</span><span class="mi">1</span><span class="p">]</span> <span class="ow">is</span> <span class="s">'</span><span class="se">\n</span><span class="s">'</span><span class="p">:</span>
<span class="n">line</span> <span class="o">=</span> <span class="n">line</span><span class="p">[:</span><span class="o">-</span><span class="mi">1</span><span class="p">]</span>
<span class="n">args</span><span class="o">.</span><span class="n">append</span><span class="p">(</span><span class="n">line</span><span class="p">)</span>
<span class="k">else</span><span class="p">:</span>
<span class="n">args</span> <span class="o">=</span> <span class="n">sys</span><span class="o">.</span><span class="n">argv</span><span class="p">[</span><span class="mi">1</span><span class="p">:]</span>
<span class="n">argRange</span> <span class="o">=</span> <span class="nb">len</span><span class="p">(</span><span class="n">args</span><span class="p">)</span>
<span class="k">for</span> <span class="n">i</span> <span class="ow">in</span> <span class="nb">range</span><span class="p">(</span><span class="n">argRange</span><span class="p">):</span>
<span class="k">print</span><span class="p">(</span><span class="nb">str</span><span class="p">(</span><span class="n">i</span><span class="o">+</span><span class="mi">1</span><span class="p">)</span> <span class="o">+</span> <span class="s">'.'</span><span class="p">,</span> <span class="n">args</span><span class="o">.</span><span class="n">pop</span><span class="p">(</span><span class="n">random</span><span class="o">.</span><span class="n">randrange</span><span class="p">(</span><span class="mi">0</span><span class="p">,</span> <span class="nb">len</span><span class="p">(</span><span class="n">args</span><span class="p">))))</span></code></pre></figure>
<p>This script works in a different way than the one in c++.
Rather than shuffling a list made by the entries in the arguments, it pops randomly one entry from the list till the list is empty.</p>
<p>Not satisfied enough, I wrote also a telegram bot using the <a href="https://github.com/eternnoir/pyTelegramBotAPI">telebot library</a> that works as the script above but inside the telegram app.
The bot can be added to your contact list by simply searching for <a href="http://telegram.me/duridan_donkey_bot">@duridan_donkey_bot</a> (yes, a typo!)</p>
<p>All the code is opensource and can be found on my github page.</p>
<p>Francesco Mecca</p>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/pescewanda/2016/04/02/blog-migrated/"> <a href="/pescewanda/2016/04/02/blog-migrated/">
@ -392,27 +435,6 @@ perl-cleaner --all</pre>
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/171">
Addio Blogspot
</a>
</h1>
<span class="post-date">25 Aug 2015</span>
<p><a href="http://dashburst.com/nsa-needs-google-eye-in-sky/"><img class="aligncenter wp-image-172 size-medium" src="http://francescomecca.eu/wp-content/uploads/2015/08/googlebigbrother-296x300.jpg" alt="" width="296" height="300" srcset="http://francescomecca.eu/wp-content/uploads/2015/08/googlebigbrother-296x300.jpg 296w, http://francescomecca.eu/wp-content/uploads/2015/08/googlebigbrother.jpg 669w" sizes="(max-width: 296px) 100vw, 296px" /></a>Ho deciso di abbandonare Blogspot per le stesse ragioni per cui ho smesso di utilizzare i servizi Google due anni fa: privacy e controllo.</p>
<p>Ora il blog e` disponibile a questo indirizzo ed e` fisicamente sul mio Raspberry PI che utilizza Raspbian + WordPress.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">

View file

@ -104,6 +104,10 @@
@ -129,6 +133,27 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/171">
Addio Blogspot
</a>
</h1>
<span class="post-date">25 Aug 2015</span>
<p><a href="http://dashburst.com/nsa-needs-google-eye-in-sky/"><img class="aligncenter wp-image-172 size-medium" src="http://francescomecca.eu/wp-content/uploads/2015/08/googlebigbrother-296x300.jpg" alt="" width="296" height="300" srcset="http://francescomecca.eu/wp-content/uploads/2015/08/googlebigbrother-296x300.jpg 296w, http://francescomecca.eu/wp-content/uploads/2015/08/googlebigbrother.jpg 669w" sizes="(max-width: 296px) 100vw, 296px" /></a>Ho deciso di abbandonare Blogspot per le stesse ragioni per cui ho smesso di utilizzare i servizi Google due anni fa: privacy e controllo.</p>
<p>Ora il blog e` disponibile a questo indirizzo ed e` fisicamente sul mio Raspberry PI che utilizza Raspbian + WordPress.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/index.php/archives/99"> <a href="/index.php/archives/99">
@ -502,57 +527,6 @@
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/9">
Script per il bulk download da Archive.org
</a>
</h1>
<span class="post-date">30 Jun 2015</span>
<p>In questi giorni mi e` capitato di dover scaricare varie collezioni da <a href="https://en.wikipedia.org/wiki/Internet_Archive">archive.org</a>, una libreria digitale multimediale la cui missione e` l&#8217;accesso universale a tutta la conoscenza.</p>
<p>Principalmente lo uso per scaricare tantissime registrazioni live di vari concerti registrati a mio avviso in maniera impeccabile.</p>
<p>Nel sito si trova una guida per scaricare in bulk usando wget e gli strumenti del sito, ma risulta piuttosto prolissa e complicata se si vuole fare un download al volo.</p>
<p>Questo e` lo script che uso, modificato da <a href="https://github.com/ghalfacree/bash-scripts/blob/master/archivedownload.sh">questo</a> script: e` scritto in bash e funziona su tutte le distribuzioni sulle quali e` installato wget, tail e sed.</p>
<pre class="wp-code-highlight prettyprint linenums:1">#!/bin/bash
# Write here the extension of the file that you want to accept
#filetype =.flac
#append this to line 24
#-A .$filetype
#Write here the extension of the file that you want to reject, divided by a comma
fileremove = .null
if [ “$1” = “” ]; then
echo USAGE: archivedownload.sh collectionname
echo See Archive.org entry page for the collection name.
echo Collection name must be entered exactly as shown: lower case, with hyphens.
exit
fi
echo Downloading list of entries for collection name $1…
wget -nd -q “http://archive.org/advancedsearch.php?q=collection%3A$1&amp;fl%5B%5D=identifier&amp;sort%5B%5D=identifier+asc&amp;sort%5B%5D=&amp;sort%5B%5D=&amp;rows=9999&amp;page=1&amp;callback=callback&amp;save=yes&amp;output=csv” -O identifiers.txt
echo Processing entry list for wget parsing…
tail -n +2 identifiers.txt | sed s/”//g &gt; processedidentifiers.txt
if [ “`cat processedidentifiers.txt | wc -l`” = “0” ]; then
echo No identifiers found for collection $1. Check name and try again.
rm processedidentifiers.txt identifiers.txt
exit
fi
echo Beginning wget download of `cat processedidentifiers.txt | wc -l` identifiers…
wget -r -H -nc -np -nH -nd -e -R $fileremove robots=off -i processedidentifiers.txt -B http://archive.org/download/
rm identifiers.txt processedidentifiers.txt
echo Complete.
</pre>
<p>Francesco Mecca</p>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">

View file

@ -104,6 +104,10 @@
@ -129,6 +133,57 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/9">
Script per il bulk download da Archive.org
</a>
</h1>
<span class="post-date">30 Jun 2015</span>
<p>In questi giorni mi e` capitato di dover scaricare varie collezioni da <a href="https://en.wikipedia.org/wiki/Internet_Archive">archive.org</a>, una libreria digitale multimediale la cui missione e` l&#8217;accesso universale a tutta la conoscenza.</p>
<p>Principalmente lo uso per scaricare tantissime registrazioni live di vari concerti registrati a mio avviso in maniera impeccabile.</p>
<p>Nel sito si trova una guida per scaricare in bulk usando wget e gli strumenti del sito, ma risulta piuttosto prolissa e complicata se si vuole fare un download al volo.</p>
<p>Questo e` lo script che uso, modificato da <a href="https://github.com/ghalfacree/bash-scripts/blob/master/archivedownload.sh">questo</a> script: e` scritto in bash e funziona su tutte le distribuzioni sulle quali e` installato wget, tail e sed.</p>
<pre class="wp-code-highlight prettyprint linenums:1">#!/bin/bash
# Write here the extension of the file that you want to accept
#filetype =.flac
#append this to line 24
#-A .$filetype
#Write here the extension of the file that you want to reject, divided by a comma
fileremove = .null
if [ “$1” = “” ]; then
echo USAGE: archivedownload.sh collectionname
echo See Archive.org entry page for the collection name.
echo Collection name must be entered exactly as shown: lower case, with hyphens.
exit
fi
echo Downloading list of entries for collection name $1…
wget -nd -q “http://archive.org/advancedsearch.php?q=collection%3A$1&amp;fl%5B%5D=identifier&amp;sort%5B%5D=identifier+asc&amp;sort%5B%5D=&amp;sort%5B%5D=&amp;rows=9999&amp;page=1&amp;callback=callback&amp;save=yes&amp;output=csv” -O identifiers.txt
echo Processing entry list for wget parsing…
tail -n +2 identifiers.txt | sed s/”//g &gt; processedidentifiers.txt
if [ “`cat processedidentifiers.txt | wc -l`” = “0” ]; then
echo No identifiers found for collection $1. Check name and try again.
rm processedidentifiers.txt identifiers.txt
exit
fi
echo Beginning wget download of `cat processedidentifiers.txt | wc -l` identifiers…
wget -r -H -nc -np -nH -nd -e -R $fileremove robots=off -i processedidentifiers.txt -B http://archive.org/download/
rm identifiers.txt processedidentifiers.txt
echo Complete.
</pre>
<p>Francesco Mecca</p>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/index.php/archives/104"> <a href="/index.php/archives/104">
@ -471,63 +526,6 @@ Command successful.</pre>
questa opzione non richiede password ed e` irreversibile. questa opzione non richiede password ed e` irreversibile.
</p> </p>
<p style="text-align: right;">
Francesco Mecca
</p>
</div>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/23">
La taglia unica del Web 2.0
</a>
</h1>
<span class="post-date">01 Jun 2015</span>
<p><a href="https://www.youtube.com/embed/e3Zs74IH0mc?feature=player_embedded">In questo discorso</a> al summit Web 2.0 del 2011 Chris Poole, il fondatore di 4chan, riflette sul concetto di identita` e di come stia cambiando con l&#8217;introduzione del Web 2.0.</p>
<p>Nel mare di Internet assistiamo a due spiagge molto lontane che delimitano lo spazio della nostra attivita`: l&#8217;anonimato e l&#8217;identita` virtuale (che ci identifica nel mondo reale).</p>
<p>E` un po` come misurare i due poli opposti, Facebook e Google Plus che richiedono il tuo nome vero e quindi ogni attivita` online e` un riflesso del proprio io reale, e 4chan, una delle poche risorse anonime nel Web che permette a ciascun utente di fare post anonimi e discutere quindi senza una forma di censura.</p>
<h3 id="><span style="font-size: large;"><span style="font-weight: normal;"> </span></span></h3>
<h4 id="the-core-problem-is-not-the-audience-is-who-you-share-out"><span style="font-size: large;"><span style="font-weight: normal;">The core problem is not the audience, is who you share out</span></span></h4>
<p>Secondo Chris Poole, quando Google introdusse sul proprio social network la feature “circles”, ovvero la possibilita` di condividere i propri post solo con una parte dei propri followers (l&#8217;equivalente delle smart list di Facebook), si e` perso di vista il problema principale, ovvero che non importa l&#8217;audience bensi` quale versione di te condividi ).</p>
<table class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;" cellspacing="0" cellpadding="0" align="center">
<tr>
<td style="text-align: center;">
<a style="margin-left: auto; margin-right: auto;" href="http://francescomecca.eu/wp-content/uploads/2015/08/d574d-twoheads.png"><img src="http://francescomecca.eu/wp-content/uploads/2015/08/d574d-twoheads.png?w=300" alt="" width="400" height="200" border="0" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align: center;">
<a href="http://www.jisc.ac.uk/blog/whats-the-cost-of-curating-content-in-the-digital-age-01-apr-2015">fonte</a>
</td>
</tr>
</table>
<p>Il Chris che parla al summit e` un Chris diverso dal Chris figlio, Chris fondatore di una startup, Chris admin di 4chan e magari, in un ipotetico futuro, Chris padre.</p>
<p><u>L&#8217; identita` e` un prisma.</u></p>
<p>Facebook e gli altri giganti del web vogliono invece essere uno specchio della nostra identita`.</p>
<h4 id="one-size-fits-all"><span style="font-size: large;"><span style="font-weight: normal;">One size fits all</span></span></h4>
<p>Il modello della taglia unica e` completamente opposto al principio per cui molte persone gestiscono vari account online. Su ogni account scegli di mostrare una parte di te e con il tempo ti costruisci un&#8217;identita` unica ed altrettanto vera.</p>
<p>E` preoccupante che con il passare del tempo queste possibilita` vengano erose dai giganti del web.</p>
<p>Spostiamo la nostra attenzione sulle generazioni future: da giovani si compiono naturalmente degli errori che poi ci lasciamo alle spalle crescendo.</p>
<p>In un mondo dove la linea offline/online sta sbiadendo e non si puo` prendere le distanze da una monolitica identita` virtuale non solo perdiamo la possibilita` di lasciarci alle spalle delle scelte o degli sbagli, ma corriamo incontro al rischio di veder scomparire ogni sfumatura della nostra personalita`.</p>
<p style="text-align: right;"> <p style="text-align: right;">
Francesco Mecca Francesco Mecca
</p> </p>

View file

@ -104,6 +104,10 @@
@ -129,6 +133,63 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/23">
La taglia unica del Web 2.0
</a>
</h1>
<span class="post-date">01 Jun 2015</span>
<p><a href="https://www.youtube.com/embed/e3Zs74IH0mc?feature=player_embedded">In questo discorso</a> al summit Web 2.0 del 2011 Chris Poole, il fondatore di 4chan, riflette sul concetto di identita` e di come stia cambiando con l&#8217;introduzione del Web 2.0.</p>
<p>Nel mare di Internet assistiamo a due spiagge molto lontane che delimitano lo spazio della nostra attivita`: l&#8217;anonimato e l&#8217;identita` virtuale (che ci identifica nel mondo reale).</p>
<p>E` un po` come misurare i due poli opposti, Facebook e Google Plus che richiedono il tuo nome vero e quindi ogni attivita` online e` un riflesso del proprio io reale, e 4chan, una delle poche risorse anonime nel Web che permette a ciascun utente di fare post anonimi e discutere quindi senza una forma di censura.</p>
<h3 id="><span style="font-size: large;"><span style="font-weight: normal;"> </span></span></h3>
<h4 id="the-core-problem-is-not-the-audience-is-who-you-share-out"><span style="font-size: large;"><span style="font-weight: normal;">The core problem is not the audience, is who you share out</span></span></h4>
<p>Secondo Chris Poole, quando Google introdusse sul proprio social network la feature “circles”, ovvero la possibilita` di condividere i propri post solo con una parte dei propri followers (l&#8217;equivalente delle smart list di Facebook), si e` perso di vista il problema principale, ovvero che non importa l&#8217;audience bensi` quale versione di te condividi ).</p>
<table class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;" cellspacing="0" cellpadding="0" align="center">
<tr>
<td style="text-align: center;">
<a style="margin-left: auto; margin-right: auto;" href="http://francescomecca.eu/wp-content/uploads/2015/08/d574d-twoheads.png"><img src="http://francescomecca.eu/wp-content/uploads/2015/08/d574d-twoheads.png?w=300" alt="" width="400" height="200" border="0" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align: center;">
<a href="http://www.jisc.ac.uk/blog/whats-the-cost-of-curating-content-in-the-digital-age-01-apr-2015">fonte</a>
</td>
</tr>
</table>
<p>Il Chris che parla al summit e` un Chris diverso dal Chris figlio, Chris fondatore di una startup, Chris admin di 4chan e magari, in un ipotetico futuro, Chris padre.</p>
<p><u>L&#8217; identita` e` un prisma.</u></p>
<p>Facebook e gli altri giganti del web vogliono invece essere uno specchio della nostra identita`.</p>
<h4 id="one-size-fits-all"><span style="font-size: large;"><span style="font-weight: normal;">One size fits all</span></span></h4>
<p>Il modello della taglia unica e` completamente opposto al principio per cui molte persone gestiscono vari account online. Su ogni account scegli di mostrare una parte di te e con il tempo ti costruisci un&#8217;identita` unica ed altrettanto vera.</p>
<p>E` preoccupante che con il passare del tempo queste possibilita` vengano erose dai giganti del web.</p>
<p>Spostiamo la nostra attenzione sulle generazioni future: da giovani si compiono naturalmente degli errori che poi ci lasciamo alle spalle crescendo.</p>
<p>In un mondo dove la linea offline/online sta sbiadendo e non si puo` prendere le distanze da una monolitica identita` virtuale non solo perdiamo la possibilita` di lasciarci alle spalle delle scelte o degli sbagli, ma corriamo incontro al rischio di veder scomparire ogni sfumatura della nostra personalita`.</p>
<p style="text-align: right;">
Francesco Mecca
</p>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/index.php/archives/27"> <a href="/index.php/archives/27">
@ -952,162 +1013,6 @@ Truecrypt permette di creare un volume crittografico che si presenta come un fil
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/44">
La prima volta non si scorda mai!
</a>
</h1>
<span class="post-date">08 May 2015</span>
<p><span style="font-family:inherit;">Questa e` un&#8217; intervista fatta da noi del blog per noi del blog dove descriviamo la nostra prima esperienza nel Web, le nostre prime impressioni e le avventure che in questi anni ci hanno aiutato a maturare confidenza e consapevolezza in Internet. </span></p>
<h4 id="><strong><span style="font-weight:normal;"><span style="font-family:inherit;"> </span></span></strong></h4>
<h4 id="a-che-eta-hai-utilizzato-per-la-prima-volta-il-computer"><strong><span style="font-weight:normal;"><span style="font-family:inherit;"></span></span></strong><span style="font-weight:normal;"><span style="font-family:inherit;">A che eta` hai utilizzato per la prima volta il computer?</span></span></h4>
<h4 id="><span style="font-weight:normal;"><span style="font-family:inherit;"> </span></span></h4>
<p><span style="font-family:inherit;"><b>Francesco: </b>Mi ricordo che la prima volta che un computer varco<code>la soglia di casa era l&amp;#8217;anno 2000 poiche</code> i miei genitori per lavoro si son trovati e si trovano tutt&#8217;ora ad usare giornalmente il computer ed ogni tanto permettevano anche a me di giocarci un pochino. A 6 anni ricevetti come regalo un grigio computer fisso che divenne da allora il mio personale. </span><br>
<span style="font-family:inherit;"><b><br />Eugenio: </b>La prima volta che utilizzai il computer avevo circa 10 anni, prima l&#8217;avevo visto solo utilizzare ai miei genitori, poi quando incominciai a fare le medie iniziai a utilizzare il computer per imparare a usare power point, con il quale scrissi e presentai la tesina degli esami di terza media, e questo mi fece acquisire una certa familiarita&#8217; con il computer, anche se molto limitata. <br /> </span><br>
<span style="font-family:inherit;"><b>Gabriele:</b> La prima volta che ho utilizzato il computer ero un po piccolo, risale a nove anni fa e avevo dieci anni, spinto dalla curiosità di questo nuovo oggetto misterioso, mi piacque molto sin da subito, ovviamente a causa della presenza dei giochi, che erano le uniche cose che a quellepoca usavo, naturalmente ero ignaro del suo vero potenziale e lo vedevo solo come un oggetto di divertimento. </span></p>
<h4 id="><span style="font-family:inherit;"> <br /></h4>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left:auto;margin-right:auto;text-align:center;">
<tr>
<td style="text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/dac55-9297-windows-start-button-on-a-computer-screen-pv.jpg" style="margin-left:auto;margin-right:auto;"><img border="0" height="265" src="http://francescomecca.eu/wp-content/uploads/2015/08/dac55-9297-windows-start-button-on-a-computer-screen-pv.jpg?w=300" width="400" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="http://www.publicdomainpictures.net/view-image.php?image=1829&picture=internet-browsing" target="_blank"><span style="font-family:inherit;">f<span style="font-family:inherit;">onte</span></span></a>
</td>
</tr>
</table>
<div class="separator" style="clear:both;text-align:center;">
</div>
<p>
<div class="separator" style="clear:both;text-align:center;">
</div>
<p>
</span></h4>
<h4>
<span style="font-family:inherit;">Quando ti sei approcciato ad Internet la prima volta e cosa ti ha spinto? </span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;"></span>
</h4>
<p>
<span style="font-family:inherit;"><b><span style="font-family:inherit;"><span style="font-size:small;">Francesco: </span></span></b>Facevo la seconda elementare quando in casa arrivo` un modem ISDN 128kb/s e nel 2004 adottammo la banda larga con Telecom. Ero incuriosito dal mondo del Web che per me rappresentava il grande mare che Ulisse navigava con il suo equipaggio. </span><br /><span style="font-family:inherit;">La curiosita` e` stat<span style="font-family:inherit;">o</span> <span style="font-family:inherit;">il</span> principale <span style="font-family:inherit;">motivo </span>del mio approdo nel mondo del Web e tutt&#8217;ora mi spinge ad affrontare nuove sfide tecnologiche. <br /> </span><br /><span style="font-family:inherit;"><span style="font-size:small;"><b>Eugenio:</b></span> Risale al periodo in cui iniziai le medie la prima volta che andai su internet, il motivo fu che I professori chiedevano di fare ricerce su vari tipi di argomenti e io trovai comodo andare su Internet per trovare le informazioni che mi servivano, visto che sapevo di poterle trovare istantaneamente li&#8217;. Così, dopo aver chiesto il permesso ai miei genitori, aprii internet explorer e iniziai a navigare nel Web. <br /> </span><br /><span style="font-family:inherit;"><span style="font-size:small;"><b>Gabriele:</b></span> Qualche tempo dopo aver iniziato a utilizzare il computer venni a conoscenza di questo immenso mondo virtuale al quale si poteva accedere avendo una connessione. Il motivo principale era quello di dover fare una ricerca per la scuola, e internet risultava lo strumento perfetto per ciò a causa della grande quantità di dati che contiene e dellimmediatezza con cui si possono reperire. </span><br />
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;">Internet e Web: come si e` sviluppata in te la consapevolezza che non fossero la stessa cosa? </span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;"></span>
</h4>
<p>
<span style="font-family:inherit;"><b>Francesco:</b> Inizialmente non ero cosciente che Internet fosse solo la base su cui si fonda il Web e che in realta` si completa con molti altri strumenti; quando organizzavo con i miei compagni LAN party e giocavamo in rete locale iniziai a chiedermi se effettivamente Internet avesse molto altro da offrire che le sole pagine online (indicizzate dai motori di ricerca) e cosa c&#8217;era al di la` del Web che fino ad allora conoscevo. <br /> </span><br /><span style="font-family:inherit;"><b>Eugenio:</b> Questa consapevolezza l&#8217;ho sviluppata non all&#8217;inizio, ma con il passare del tempo aumentando la mia esperienza con il computer, ma fin dai primi anni di utilizzo capivo che c&#8217;era una distinzione tra I due grazie anche al fatto dell&#8217;utilizzo di messanger o la posta elettronica, in breve mi rendevo sempre piu&#8217; conto che il web era solo una piccola parte di Internet e dei servizi che puo&#8217; offrire che va oltre le pagine Web da visitare. <br /><u> </u></span><br /><span style="font-family:inherit;"><b><span style="font-size:small;">Gabriele:</span> </b>Col passare del tempo e usando sempre più il computer, mi resi conto che quello che io chiamavo internet era un insieme più vasto di quel che pensavo. La consapevolezza venne quando scoprii che non si poteva solo visitare siti, ma anche che esistevano servizi di posta elettronica per poter inviare le e-mail, oppure altri dove poter scaricare tutto ciò di cui avevo bisogno. </span><br />
<h4>
 <br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left:auto;margin-right:auto;text-align:center;">
<tr>
<td style="text-align:center;">
<a href="http://planeta.wikispaces.com/digitalnatives" style="margin-left:auto;margin-right:auto;" target="_blank"><img alt=" fonte" border="0" height="480" src="http://francescomecca.eu/wp-content/uploads/2015/08/f2a10-url.jpe" width="640" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="http://planeta.wikispaces.com/digitalnatives">fonte</a>
</td>
</tr>
</table>
</h4>
<h4>
 <span style="font-family:inherit;">Ti sei mai reso sentito di far parte di una nuova classe che molti definiscono con il termine “nativi digitali”? </span>
</h4>
<h4>
</h4>
<h4>
<span style="font-family:inherit;"></span>
</h4>
<p>
<span style="font-family:inherit;"><b>Francesco:</b> Sono cresciuto con il computer e i computer sono cresciuti con me. Tecnicamente sono un nativo digitale, mi sono sempre approcciato alle nuove tecnologie con molto interesse e un&#8217; innata naturalezza. Mi sento figlio del digitale ma non mi sento allineato con la visione che i grandi giganti della rete hanno adottato e stanno cercando di diffondere. Spesso il web mi offre rifugio, spesso sono io stesso che lo rifuggo. </span><br /><span style="font-family:inherit;"><b><br />Eugenio:</b> All&#8217;inizio no, pensavo che usare il computer e saperne utilizzare gli strumenti base fosse una cosa normale che tutti sapessero fare, ma poi mi accorsi che non era cosi<span style="font-family:inherit;">`</span>, il fatto che io sapessi utilzzare il computer sin da bambino e che mi ci trovassi a mio agio era legato al fatto di far parte di un periodo storico che ha visto I computer sempre piu<span style="font-family:inherit;">`</span> presenti nella vita quotidiana delle persone. Quindi quelli nati nel mio stesso periodo vedevano <span style="font-family:inherit;">i</span> computer come una cosa che e<span style="font-family:inherit;">`</span> sempre stata presente nella nosta quotidianita<span style="font-family:inherit;">`</span>,per questo molti ci definiscono con il termine &#8220;nativi digitali&#8221;, mentre le persone che appartengono a generazioni passate si sono trovate a fare <span style="font-family:inherit;">i</span> conti con questa nuova tecnologia a loro poco familiare e con cui, magari, hanno avuto difficolta&#8217; ad approcciarsi. </span><br /><span style="font-family:inherit;"><br /><b>Gabriele: </b>Non <span style="font-family:inherit;">e<span style="font-family:inherit;">`</span></span> un pensiero che <span style="font-family:inherit;">e`</span> nato subito quello di far parte della classe dei nativi digitali, si riscontra col tempo, quando scopri che il modo di crescere delle persone di generazioni precedenti era diverso, perch<span style="font-family:inherit;">e`</span> non avevano nessun rapporto con la tecnologia perché era meno presente, infatti per noi <span style="font-family:inherit;">e`</span> qualcosa che siamo abituati a vedere sin da piccoli e ci cresciamo, mentre le altre generazioni hanno visto e vissuto il cambiamento dovendosi adattare. </span><br />
<h4>
  <br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float:left;margin-right:1em;text-align:left;">
<tr>
<td style="text-align:center;">
<a href="http://www.allpurposeguru.com/2011/09/information-seeking-the-internet-vs-bookstores-vs-the-library" style="clear:left;margin-bottom:1em;margin-left:auto;margin-right:auto;"><img alt="" border="0" height="566" src="http://francescomecca.eu/wp-content/uploads/2015/08/035d8-5727308332_8635bee3d9_o.jpg" title="" width="640" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="http://www.allpurposeguru.com/2011/09/information-seeking-the-internet-vs-bookstores-vs-the-library/">fonte</a><a href="http://www.allpurposeguru.com/2011/09/information-seeking-the-internet-vs-bookstores-vs-the-library"></a>
</td>
</tr>
</table>
</h4>
<h4>
<span style="font-family:inherit;">In questi anni il tuo rapporto con Internet e` sicuramente cambiato. Che punto di vista hai maturato? Pensi di aver maturato una “coscienza digitale” consapevole?</span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<p>
<span style="font-family:inherit;"><b>Francesco: </b>Ne<span style="font-family:inherit;">i</span> primi anni tutta la mia attivita` informatica si concentrava <span style="font-family:inherit;">nello</span> scoprire cosa internet aveva da offrire. Appena venni a conoscenza del protocollo Bittorrent (era appena il 2004) iniziai ad approfondire il vasto campo del p2p e la condivisione online dei contenuti. La maggior parte del tempo la trascorrevo provando e approfondendo vari protocolli di messaggistica, scambio dati e successivamente, con gli strumenti necessari, algoritmi crittografici. </span><br /><span style="font-family:inherit;"><span style="font-family:inherit;">Nei p<span style="font-family:inherit;">rimi anni</span></span> Internet e` stato per me un cappello magico dal quale potevo estrarre conigli o nascondere me stesso. Dalle scuole medie in poi scopri nel mondo digitale un tempio di cultura e di conoscenza (non sempre ortodossa e ancora piu` affascinante). A partire dalla diffusione del “Web 2.0” la mia coscienza digitale e` evoluta sempre piu` in fretta mentre vedevo una piccola parte del mio mondo invasa dai “colossi” dell&#8217;industria moderna che per <span style="font-family:inherit;">p<span style="font-family:inherit;">er <span style="font-family:inherit;">un ingenuo ragazzo liceale, quale io ero,</span></span></span> non avevano ancora peso. Mentre lo spazio in rete si <span style="font-family:inherit;">re</span>stringeva la mia consapevolezza del mondo digitale aumentava: tutt&#8217;ora assisto a cambiamenti forti nel panorama dell&#8217;informatica che si discostano dalla mia visione<span style="font-family:inherit;">, </span>e dal mio utilizzo del web<span style="font-family:inherit;">,</span> ma che per il principio di azione e reazione mi fanno comprendere chi sono e che tipo di nativo digitale voglio essere. </p>
<div class="highlight"><pre><code class="language-" data-lang=""> &lt;p&gt;
&lt;b&gt;Eugenio:&lt;/b&gt; Sicuramente il mio rapporto con internet e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; cambiato nel corso degli anni, infatti nei primi tempi usavo internet per fare ricerche sul web o chattare con I miei amici tramite servizi quali messenger, ma con il passare del tempo divenni sempre piu&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; consapevole dei servizi che internet offriva, iniziai a informarmi su argomenti di attualita&amp;#8217; o che mi interessavano, giocare a giochi online o anche in rete locale con amici, fare acquisti su vari siti di e-commerce e intrattenermi sulle varie piattaforme che si possono trovare che si sono sostituite alla televisione. Posso dire dal mio punto di vista che internet e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; senz&amp;#8217;altro un vastissimo luogo che offre molte occasioni sia di crescita culturale, vista la quantita&amp;#8217; di informazioni che vi si possono trovare, sia personale, poiche&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; anche un luogo di incontro tra persone che si confrontano tra loro, anche se a volte possono trovarsi contenuti espliciti. Vista l&amp;#8217;importanza di internet e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; bene maturare una coscienza diditale quanto piu&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; consapevole per far in modo che le nostre azioni sulla rete siano eticamente corrette e quindi evitare di scaricare file piratati, o evitare azioni di cyberbullismo contro altre persone e tutti quei comportamenti che possono danneggiare gli altri. &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:inherit;"&gt;&lt;br /&gt;&lt;b&gt;Gabriele:&lt;/b&gt; Crescendo ovviamente il mio rapporto con Internet &lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; cambiato, mentre prima quando ero piccolo lo usavo per giocare, col passare del tempo ho scoperto che Internet &lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; molto di pi&lt;span style="font-family:inherit;"&gt;u`&lt;/span&gt;, mette in contatto le persone, è un mezzo per la diffusione di informazioni, musica e molto altro. Oggi lo uso principalmente per &lt;span style="font-family:inherit;"&gt;i&lt;/span&gt; social, ascoltare musica, comprare articoli e anche quando posso restare informato. Durante questi anni &lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; cambiata anche la mia considerazione su Internet, infatti pensavo erroneamente che fosse un posto innocuo, ma mi dovetti ricredere perch&lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; non è un luogo adatto a tutti a causa dei contenuti espliciti che contiene. Per quanto riguarda la coscienza digitale questa è una caratteristica che si può sviluppare una volta che si è a conoscenza di averla, perché ogni cosa che facciamo su Internet ha un peso, grande o piccolo che sia, e dobbiamo esserne a conoscenza per limitare eventuali danni o per trarne beneficio, infatti personalmente ogni volta che faccio qualcosa su Internet mi chiedo sempre quali potrebbero essere le conseguenze della mia azione, cosa che dovrebbe fare chiunque. &lt;/span&gt;
&lt;/p&gt;
&lt;div style="text-align:right;"&gt;
&lt;span style="font-family:inherit;"&gt;Fran&lt;span style="font-family:inherit;"&gt;cesco &lt;span style="font-family:inherit;"&gt;Mecca&lt;/span&gt;, Eugenio Corso, Gabriele&lt;/span&gt; &lt;span style="font-family:inherit;"&gt;Cor&lt;span style="font-family:inherit;"&gt;so&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
</code></pre></div>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">

View file

@ -104,6 +104,10 @@
@ -129,6 +133,162 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/44">
La prima volta non si scorda mai!
</a>
</h1>
<span class="post-date">08 May 2015</span>
<p><span style="font-family:inherit;">Questa e` un&#8217; intervista fatta da noi del blog per noi del blog dove descriviamo la nostra prima esperienza nel Web, le nostre prime impressioni e le avventure che in questi anni ci hanno aiutato a maturare confidenza e consapevolezza in Internet. </span></p>
<h4 id="><strong><span style="font-weight:normal;"><span style="font-family:inherit;"> </span></span></strong></h4>
<h4 id="a-che-eta-hai-utilizzato-per-la-prima-volta-il-computer"><strong><span style="font-weight:normal;"><span style="font-family:inherit;"></span></span></strong><span style="font-weight:normal;"><span style="font-family:inherit;">A che eta` hai utilizzato per la prima volta il computer?</span></span></h4>
<h4 id="><span style="font-weight:normal;"><span style="font-family:inherit;"> </span></span></h4>
<p><span style="font-family:inherit;"><b>Francesco: </b>Mi ricordo che la prima volta che un computer varco<code>la soglia di casa era l&amp;#8217;anno 2000 poiche</code> i miei genitori per lavoro si son trovati e si trovano tutt&#8217;ora ad usare giornalmente il computer ed ogni tanto permettevano anche a me di giocarci un pochino. A 6 anni ricevetti come regalo un grigio computer fisso che divenne da allora il mio personale. </span><br>
<span style="font-family:inherit;"><b><br />Eugenio: </b>La prima volta che utilizzai il computer avevo circa 10 anni, prima l&#8217;avevo visto solo utilizzare ai miei genitori, poi quando incominciai a fare le medie iniziai a utilizzare il computer per imparare a usare power point, con il quale scrissi e presentai la tesina degli esami di terza media, e questo mi fece acquisire una certa familiarita&#8217; con il computer, anche se molto limitata. <br /> </span><br>
<span style="font-family:inherit;"><b>Gabriele:</b> La prima volta che ho utilizzato il computer ero un po piccolo, risale a nove anni fa e avevo dieci anni, spinto dalla curiosità di questo nuovo oggetto misterioso, mi piacque molto sin da subito, ovviamente a causa della presenza dei giochi, che erano le uniche cose che a quellepoca usavo, naturalmente ero ignaro del suo vero potenziale e lo vedevo solo come un oggetto di divertimento. </span></p>
<h4 id="><span style="font-family:inherit;"> <br /></h4>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left:auto;margin-right:auto;text-align:center;">
<tr>
<td style="text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/dac55-9297-windows-start-button-on-a-computer-screen-pv.jpg" style="margin-left:auto;margin-right:auto;"><img border="0" height="265" src="http://francescomecca.eu/wp-content/uploads/2015/08/dac55-9297-windows-start-button-on-a-computer-screen-pv.jpg?w=300" width="400" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="http://www.publicdomainpictures.net/view-image.php?image=1829&picture=internet-browsing" target="_blank"><span style="font-family:inherit;">f<span style="font-family:inherit;">onte</span></span></a>
</td>
</tr>
</table>
<div class="separator" style="clear:both;text-align:center;">
</div>
<p>
<div class="separator" style="clear:both;text-align:center;">
</div>
<p>
</span></h4>
<h4>
<span style="font-family:inherit;">Quando ti sei approcciato ad Internet la prima volta e cosa ti ha spinto? </span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;"></span>
</h4>
<p>
<span style="font-family:inherit;"><b><span style="font-family:inherit;"><span style="font-size:small;">Francesco: </span></span></b>Facevo la seconda elementare quando in casa arrivo` un modem ISDN 128kb/s e nel 2004 adottammo la banda larga con Telecom. Ero incuriosito dal mondo del Web che per me rappresentava il grande mare che Ulisse navigava con il suo equipaggio. </span><br /><span style="font-family:inherit;">La curiosita` e` stat<span style="font-family:inherit;">o</span> <span style="font-family:inherit;">il</span> principale <span style="font-family:inherit;">motivo </span>del mio approdo nel mondo del Web e tutt&#8217;ora mi spinge ad affrontare nuove sfide tecnologiche. <br /> </span><br /><span style="font-family:inherit;"><span style="font-size:small;"><b>Eugenio:</b></span> Risale al periodo in cui iniziai le medie la prima volta che andai su internet, il motivo fu che I professori chiedevano di fare ricerce su vari tipi di argomenti e io trovai comodo andare su Internet per trovare le informazioni che mi servivano, visto che sapevo di poterle trovare istantaneamente li&#8217;. Così, dopo aver chiesto il permesso ai miei genitori, aprii internet explorer e iniziai a navigare nel Web. <br /> </span><br /><span style="font-family:inherit;"><span style="font-size:small;"><b>Gabriele:</b></span> Qualche tempo dopo aver iniziato a utilizzare il computer venni a conoscenza di questo immenso mondo virtuale al quale si poteva accedere avendo una connessione. Il motivo principale era quello di dover fare una ricerca per la scuola, e internet risultava lo strumento perfetto per ciò a causa della grande quantità di dati che contiene e dellimmediatezza con cui si possono reperire. </span><br />
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;">Internet e Web: come si e` sviluppata in te la consapevolezza che non fossero la stessa cosa? </span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<h4>
<span style="font-family:inherit;"></span>
</h4>
<p>
<span style="font-family:inherit;"><b>Francesco:</b> Inizialmente non ero cosciente che Internet fosse solo la base su cui si fonda il Web e che in realta` si completa con molti altri strumenti; quando organizzavo con i miei compagni LAN party e giocavamo in rete locale iniziai a chiedermi se effettivamente Internet avesse molto altro da offrire che le sole pagine online (indicizzate dai motori di ricerca) e cosa c&#8217;era al di la` del Web che fino ad allora conoscevo. <br /> </span><br /><span style="font-family:inherit;"><b>Eugenio:</b> Questa consapevolezza l&#8217;ho sviluppata non all&#8217;inizio, ma con il passare del tempo aumentando la mia esperienza con il computer, ma fin dai primi anni di utilizzo capivo che c&#8217;era una distinzione tra I due grazie anche al fatto dell&#8217;utilizzo di messanger o la posta elettronica, in breve mi rendevo sempre piu&#8217; conto che il web era solo una piccola parte di Internet e dei servizi che puo&#8217; offrire che va oltre le pagine Web da visitare. <br /><u> </u></span><br /><span style="font-family:inherit;"><b><span style="font-size:small;">Gabriele:</span> </b>Col passare del tempo e usando sempre più il computer, mi resi conto che quello che io chiamavo internet era un insieme più vasto di quel che pensavo. La consapevolezza venne quando scoprii che non si poteva solo visitare siti, ma anche che esistevano servizi di posta elettronica per poter inviare le e-mail, oppure altri dove poter scaricare tutto ciò di cui avevo bisogno. </span><br />
<h4>
 <br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left:auto;margin-right:auto;text-align:center;">
<tr>
<td style="text-align:center;">
<a href="http://planeta.wikispaces.com/digitalnatives" style="margin-left:auto;margin-right:auto;" target="_blank"><img alt=" fonte" border="0" height="480" src="http://francescomecca.eu/wp-content/uploads/2015/08/f2a10-url.jpe" width="640" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="http://planeta.wikispaces.com/digitalnatives">fonte</a>
</td>
</tr>
</table>
</h4>
<h4>
 <span style="font-family:inherit;">Ti sei mai reso sentito di far parte di una nuova classe che molti definiscono con il termine “nativi digitali”? </span>
</h4>
<h4>
</h4>
<h4>
<span style="font-family:inherit;"></span>
</h4>
<p>
<span style="font-family:inherit;"><b>Francesco:</b> Sono cresciuto con il computer e i computer sono cresciuti con me. Tecnicamente sono un nativo digitale, mi sono sempre approcciato alle nuove tecnologie con molto interesse e un&#8217; innata naturalezza. Mi sento figlio del digitale ma non mi sento allineato con la visione che i grandi giganti della rete hanno adottato e stanno cercando di diffondere. Spesso il web mi offre rifugio, spesso sono io stesso che lo rifuggo. </span><br /><span style="font-family:inherit;"><b><br />Eugenio:</b> All&#8217;inizio no, pensavo che usare il computer e saperne utilizzare gli strumenti base fosse una cosa normale che tutti sapessero fare, ma poi mi accorsi che non era cosi<span style="font-family:inherit;">`</span>, il fatto che io sapessi utilzzare il computer sin da bambino e che mi ci trovassi a mio agio era legato al fatto di far parte di un periodo storico che ha visto I computer sempre piu<span style="font-family:inherit;">`</span> presenti nella vita quotidiana delle persone. Quindi quelli nati nel mio stesso periodo vedevano <span style="font-family:inherit;">i</span> computer come una cosa che e<span style="font-family:inherit;">`</span> sempre stata presente nella nosta quotidianita<span style="font-family:inherit;">`</span>,per questo molti ci definiscono con il termine &#8220;nativi digitali&#8221;, mentre le persone che appartengono a generazioni passate si sono trovate a fare <span style="font-family:inherit;">i</span> conti con questa nuova tecnologia a loro poco familiare e con cui, magari, hanno avuto difficolta&#8217; ad approcciarsi. </span><br /><span style="font-family:inherit;"><br /><b>Gabriele: </b>Non <span style="font-family:inherit;">e<span style="font-family:inherit;">`</span></span> un pensiero che <span style="font-family:inherit;">e`</span> nato subito quello di far parte della classe dei nativi digitali, si riscontra col tempo, quando scopri che il modo di crescere delle persone di generazioni precedenti era diverso, perch<span style="font-family:inherit;">e`</span> non avevano nessun rapporto con la tecnologia perché era meno presente, infatti per noi <span style="font-family:inherit;">e`</span> qualcosa che siamo abituati a vedere sin da piccoli e ci cresciamo, mentre le altre generazioni hanno visto e vissuto il cambiamento dovendosi adattare. </span><br />
<h4>
  <br />
<table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float:left;margin-right:1em;text-align:left;">
<tr>
<td style="text-align:center;">
<a href="http://www.allpurposeguru.com/2011/09/information-seeking-the-internet-vs-bookstores-vs-the-library" style="clear:left;margin-bottom:1em;margin-left:auto;margin-right:auto;"><img alt="" border="0" height="566" src="http://francescomecca.eu/wp-content/uploads/2015/08/035d8-5727308332_8635bee3d9_o.jpg" title="" width="640" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="http://www.allpurposeguru.com/2011/09/information-seeking-the-internet-vs-bookstores-vs-the-library/">fonte</a><a href="http://www.allpurposeguru.com/2011/09/information-seeking-the-internet-vs-bookstores-vs-the-library"></a>
</td>
</tr>
</table>
</h4>
<h4>
<span style="font-family:inherit;">In questi anni il tuo rapporto con Internet e` sicuramente cambiato. Che punto di vista hai maturato? Pensi di aver maturato una “coscienza digitale” consapevole?</span>
</h4>
<h4>
<span style="font-family:inherit;"> </span>
</h4>
<p>
<span style="font-family:inherit;"><b>Francesco: </b>Ne<span style="font-family:inherit;">i</span> primi anni tutta la mia attivita` informatica si concentrava <span style="font-family:inherit;">nello</span> scoprire cosa internet aveva da offrire. Appena venni a conoscenza del protocollo Bittorrent (era appena il 2004) iniziai ad approfondire il vasto campo del p2p e la condivisione online dei contenuti. La maggior parte del tempo la trascorrevo provando e approfondendo vari protocolli di messaggistica, scambio dati e successivamente, con gli strumenti necessari, algoritmi crittografici. </span><br /><span style="font-family:inherit;"><span style="font-family:inherit;">Nei p<span style="font-family:inherit;">rimi anni</span></span> Internet e` stato per me un cappello magico dal quale potevo estrarre conigli o nascondere me stesso. Dalle scuole medie in poi scopri nel mondo digitale un tempio di cultura e di conoscenza (non sempre ortodossa e ancora piu` affascinante). A partire dalla diffusione del “Web 2.0” la mia coscienza digitale e` evoluta sempre piu` in fretta mentre vedevo una piccola parte del mio mondo invasa dai “colossi” dell&#8217;industria moderna che per <span style="font-family:inherit;">p<span style="font-family:inherit;">er <span style="font-family:inherit;">un ingenuo ragazzo liceale, quale io ero,</span></span></span> non avevano ancora peso. Mentre lo spazio in rete si <span style="font-family:inherit;">re</span>stringeva la mia consapevolezza del mondo digitale aumentava: tutt&#8217;ora assisto a cambiamenti forti nel panorama dell&#8217;informatica che si discostano dalla mia visione<span style="font-family:inherit;">, </span>e dal mio utilizzo del web<span style="font-family:inherit;">,</span> ma che per il principio di azione e reazione mi fanno comprendere chi sono e che tipo di nativo digitale voglio essere. </p>
<div class="highlight"><pre><code class="language-" data-lang=""> &lt;p&gt;
&lt;b&gt;Eugenio:&lt;/b&gt; Sicuramente il mio rapporto con internet e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; cambiato nel corso degli anni, infatti nei primi tempi usavo internet per fare ricerche sul web o chattare con I miei amici tramite servizi quali messenger, ma con il passare del tempo divenni sempre piu&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; consapevole dei servizi che internet offriva, iniziai a informarmi su argomenti di attualita&amp;#8217; o che mi interessavano, giocare a giochi online o anche in rete locale con amici, fare acquisti su vari siti di e-commerce e intrattenermi sulle varie piattaforme che si possono trovare che si sono sostituite alla televisione. Posso dire dal mio punto di vista che internet e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; senz&amp;#8217;altro un vastissimo luogo che offre molte occasioni sia di crescita culturale, vista la quantita&amp;#8217; di informazioni che vi si possono trovare, sia personale, poiche&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; anche un luogo di incontro tra persone che si confrontano tra loro, anche se a volte possono trovarsi contenuti espliciti. Vista l&amp;#8217;importanza di internet e&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; bene maturare una coscienza diditale quanto piu&lt;span style="font-family:inherit;"&gt;`&lt;/span&gt; consapevole per far in modo che le nostre azioni sulla rete siano eticamente corrette e quindi evitare di scaricare file piratati, o evitare azioni di cyberbullismo contro altre persone e tutti quei comportamenti che possono danneggiare gli altri. &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:inherit;"&gt;&lt;br /&gt;&lt;b&gt;Gabriele:&lt;/b&gt; Crescendo ovviamente il mio rapporto con Internet &lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; cambiato, mentre prima quando ero piccolo lo usavo per giocare, col passare del tempo ho scoperto che Internet &lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; molto di pi&lt;span style="font-family:inherit;"&gt;u`&lt;/span&gt;, mette in contatto le persone, è un mezzo per la diffusione di informazioni, musica e molto altro. Oggi lo uso principalmente per &lt;span style="font-family:inherit;"&gt;i&lt;/span&gt; social, ascoltare musica, comprare articoli e anche quando posso restare informato. Durante questi anni &lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; cambiata anche la mia considerazione su Internet, infatti pensavo erroneamente che fosse un posto innocuo, ma mi dovetti ricredere perch&lt;span style="font-family:inherit;"&gt;e`&lt;/span&gt; non è un luogo adatto a tutti a causa dei contenuti espliciti che contiene. Per quanto riguarda la coscienza digitale questa è una caratteristica che si può sviluppare una volta che si è a conoscenza di averla, perché ogni cosa che facciamo su Internet ha un peso, grande o piccolo che sia, e dobbiamo esserne a conoscenza per limitare eventuali danni o per trarne beneficio, infatti personalmente ogni volta che faccio qualcosa su Internet mi chiedo sempre quali potrebbero essere le conseguenze della mia azione, cosa che dovrebbe fare chiunque. &lt;/span&gt;
&lt;/p&gt;
&lt;div style="text-align:right;"&gt;
&lt;span style="font-family:inherit;"&gt;Fran&lt;span style="font-family:inherit;"&gt;cesco &lt;span style="font-family:inherit;"&gt;Mecca&lt;/span&gt;, Eugenio Corso, Gabriele&lt;/span&gt; &lt;span style="font-family:inherit;"&gt;Cor&lt;span style="font-family:inherit;"&gt;so&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
</code></pre></div>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/index.php/archives/46"> <a href="/index.php/archives/46">
@ -355,127 +515,6 @@ L&#8217;attacco avviene attraverso l&#8217;uso di codice Javascript e analizza l
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/57">
Suicide Linux
</a>
</h1>
<span class="post-date">19 Apr 2015</span>
<div class="MsoNormal" style="text-align:center;">
</div>
<div class="MsoNormal" style="text-align:center;">
Tradotto da:<a href="http://qntm.org/suicide">http://qntm.org/suicide</a>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal">
</div>
<div class="MsoNormal" style="text-align:justify;">
Sai come qualche volta se sbagli a digitare il nome di un file nella bash, questa corregge il tuo spelling e fa comunque partire il comando? Come quando si cambia directory, o si apre un file.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Io ho inventato Suicide Linux. Ogni volta &#8211;<i>ogni</i> volta- scrivi qualsiasi comando remoto non corretto, linterprete lo risolve creativamente in un<span style="color:red;"> rm rf</span> / e pulisce il tuo hard drive.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
È un gioco. Come camminare sul filo di un rasoio. Devi vedere quanto a lungo puoi continuare a usare il sistema operativo prima di perdere tutti i tuoi dati.</p>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left:auto;margin-right:auto;text-align:center;">
<tr>
<td style="text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/06c29-suicide2blinux.png" style="margin-left:auto;margin-right:auto;"><img border="0" height="300" src="http://francescomecca.eu/wp-content/uploads/2015/08/06c29-suicide2blinux.png?w=300" width="400" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="https://d.maxfile.ro/pswtpazxfd.png">fonte</a>
</td>
</tr>
</table>
<div style="text-align:center;">
</div>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
<b>Aggiornamento 2011-12-26</b>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Suicide Linux ora sembra essere un pacchetto di Debian. Spettacolare!
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Una video dimostrazione è disponibile. La reazione del sistema operativo è attualmente piuttosto deludente. Penseresti che il sistema operativo faccia spuntare alcuni errori piuttosto urgenti se vai in giro a cancellare parti di esso?
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Forse <span style="color:red;">rm rf / </span>dovrebbe essere rimpiazzato con qualcosa che abbia impostato più flags dettagliati. In questo modo, quando esegui un comando sbagliato, ti viene detto immediatamente che le cose stanno per essere cancellate e tu hai una possibilità di combattere per annullare loperazione prima che il tuo sistema diventi inoperabile. Questo ti permette di vedere quanto a lungo puoi lavorare e quanti documenti puoi perdere prima che il sistema fallisca interamente.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Un altro, un suggerimento un po più serio, se Suicide Linux cancella in maniera casuale un singolo file senza dirtelo ogni volta che fai un errore tipografico, può essere uno sguardo interessante nella stabilità del tuo sistema operativo e uno strumento educativo per la diagnosi e la riparazione dei sistemi corrotti. Non sto pretendendo che Suicide Linux abbia qualche merito genuino, certamente.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
<b>Aggiornamento 2015-04-18</b>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
La funzionalità correzione automatica che io ho originariamente descritto qui fu una caratteristica del primo sistema Linux che io abbia mai usato, così ho assunto che fosse come ogni sistema Linux lavorato di default. Da quando sono venuto a conoscenza che è un doodad extra completamente opzionale.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div style="text-align:right;">
<span style="font-family:Calibri, sans-serif;font-size:11pt;">Gabriele Corso </span>
</div>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">

View file

@ -104,6 +104,10 @@
@ -129,6 +133,127 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/57">
Suicide Linux
</a>
</h1>
<span class="post-date">19 Apr 2015</span>
<div class="MsoNormal" style="text-align:center;">
</div>
<div class="MsoNormal" style="text-align:center;">
Tradotto da:<a href="http://qntm.org/suicide">http://qntm.org/suicide</a>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal">
</div>
<div class="MsoNormal" style="text-align:justify;">
Sai come qualche volta se sbagli a digitare il nome di un file nella bash, questa corregge il tuo spelling e fa comunque partire il comando? Come quando si cambia directory, o si apre un file.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Io ho inventato Suicide Linux. Ogni volta &#8211;<i>ogni</i> volta- scrivi qualsiasi comando remoto non corretto, linterprete lo risolve creativamente in un<span style="color:red;"> rm rf</span> / e pulisce il tuo hard drive.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
È un gioco. Come camminare sul filo di un rasoio. Devi vedere quanto a lungo puoi continuare a usare il sistema operativo prima di perdere tutti i tuoi dati.</p>
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left:auto;margin-right:auto;text-align:center;">
<tr>
<td style="text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/06c29-suicide2blinux.png" style="margin-left:auto;margin-right:auto;"><img border="0" height="300" src="http://francescomecca.eu/wp-content/uploads/2015/08/06c29-suicide2blinux.png?w=300" width="400" /></a>
</td>
</tr>
<tr>
<td class="tr-caption" style="text-align:center;">
<a href="https://d.maxfile.ro/pswtpazxfd.png">fonte</a>
</td>
</tr>
</table>
<div style="text-align:center;">
</div>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
<b>Aggiornamento 2011-12-26</b>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Suicide Linux ora sembra essere un pacchetto di Debian. Spettacolare!
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Una video dimostrazione è disponibile. La reazione del sistema operativo è attualmente piuttosto deludente. Penseresti che il sistema operativo faccia spuntare alcuni errori piuttosto urgenti se vai in giro a cancellare parti di esso?
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Forse <span style="color:red;">rm rf / </span>dovrebbe essere rimpiazzato con qualcosa che abbia impostato più flags dettagliati. In questo modo, quando esegui un comando sbagliato, ti viene detto immediatamente che le cose stanno per essere cancellate e tu hai una possibilità di combattere per annullare loperazione prima che il tuo sistema diventi inoperabile. Questo ti permette di vedere quanto a lungo puoi lavorare e quanti documenti puoi perdere prima che il sistema fallisca interamente.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
Un altro, un suggerimento un po più serio, se Suicide Linux cancella in maniera casuale un singolo file senza dirtelo ogni volta che fai un errore tipografico, può essere uno sguardo interessante nella stabilità del tuo sistema operativo e uno strumento educativo per la diagnosi e la riparazione dei sistemi corrotti. Non sto pretendendo che Suicide Linux abbia qualche merito genuino, certamente.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
<b>Aggiornamento 2015-04-18</b>
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
La funzionalità correzione automatica che io ho originariamente descritto qui fu una caratteristica del primo sistema Linux che io abbia mai usato, così ho assunto che fosse come ogni sistema Linux lavorato di default. Da quando sono venuto a conoscenza che è un doodad extra completamente opzionale.
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div class="MsoNormal" style="text-align:justify;">
</div>
<div style="text-align:right;">
<span style="font-family:Calibri, sans-serif;font-size:11pt;">Gabriele Corso </span>
</div>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/index.php/archives/60"> <a href="/index.php/archives/60">
@ -219,13 +344,16 @@ Secondo alcuni amministartori del sito, tra cui OptimusCrime, Boneless vendette
<blockquote class="tr_bq"> <blockquote class="tr_bq">
<p> <p>
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }<span style="font-family: Arial, Helvetica, sans-serif;">Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service <i><span style="font-style: normal;">cannot even count the current number of federal crimes</span></i>. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”</span> Estimates of the current size of the body of federal criminal law vary. It has been reported that the Congressional Research Service <i><span style="font-style: normal;">cannot even count the current number of federal crimes</span></i>. These laws are scattered in over 50 titles of the United States Code, encompassing roughly 27,000 pages. Worse yet, the statutory code sections often incorporate, by reference, the provisions and sanctions of administrative regulations promulgated by various regulatory agencies under congressional authorization. Estimates of how many such regulations exist are even less well settled, but the ABA thinks there are nearly 10,000”</span>
</p> </p>
</blockquote> </blockquote>
<p> <p>
p { margin-bottom: 0.1in; line-height: 120%; }a:link { }<span style="font-family: Arial, Helvetica, sans-serif;">Con le parole di <a href="https://www.schneier.com/essay-114.htm" target="_blank">Bruce Schneier</a>: “se mi dai sei linee scritte di pugno dall&#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.</p> Con le parole di <a href="https://www.schneier.com/essay-114.htm" target="_blank">Bruce Schneier:</a></p>
“se mi dai sei linee scritte di pugno dall&#8217;uomo piu` onesto, potrei trovare qualche motivo per farlo impiccare!”.
<p></p>
<p> <p>
A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  <span style="font-size: large;"><br /> </span></span> A questo si aggiunge che non e` sempre la verita` la paladina dei nostri diritti: spesso i pregiudizi sociali a cui si aggiunge la manipolazione dei mass media porta un innocente ad essere dichiarato colpevole falsamente ed innanzitempo.  <span style="font-size: large;"><br /> </span></span>
</p> </p>
@ -435,39 +563,6 @@ In questo modo ed attraverso i cookie Facebook riesce a riunire la maggior parte
</code></pre></div> </code></pre></div>
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/73">
L&#8217;anonimato violato di TOR
</a>
</h1>
<span class="post-date">12 Apr 2015</span>
<p>Miliardi di persone usano giornalmente internet, ma sono poche quelle a conoscenza del suo lato oscuro, il deep web,nel quale sono presenti siti che gestiscono business illegali (dalla vendita di account rubati alla clonazione di carte di credito) e al quale tutti possono accedere tramite &#8220;Tor&#8221;. Questo è un software che rende chi lo utilizza invisibile, poichè nasconde l&#8217;indirizzo IP del computer tramite la crittografia a strati, da qui il nome scelto che sta per &#8220;The Onion Router&#8221;. Infatti grazie a Tor l&#8217;utente si collega al sito che vuole visitare passando però da una serie di altri server che fungono da router e cifrano la comunicazione.</p>
<div class="separator" style="clear:both;text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/a2cc6-tor_newsbitcoin.jpg" style="margin-left:1em;margin-right:1em;"><img border="0" height="196" src="http://francescomecca.eu/wp-content/uploads/2015/08/a2cc6-tor_newsbitcoin.jpg" width="320" /></a>
</div>
<div class="separator" style="clear:both;text-align:center;">
foto presa da <a href="http://www.newsbitcoin.it/190/tor-installazione-e-configurazione/" target="_blank">newsbitcoin.it</a>
</div>
<p>Tuttavia, dal 30 Gennaio al 4 Luglio 2014, Tor è stato colpito da attacchi da parte dell&#8217;FBI che miravano a togliere l&#8217;anonimato. Il bersaglio dell&#8217;attacco non sono state solo le persone che hanno utilizzato il software per la navigazione anonima, ma anche chi creava e gestiva siti web e servizi online in maniera anonima. Le persone a rischio infatti erano quelle che visitavano i siti che erano stati precedentemente compromessi, ovvero quei siti che incorporavano nel loro codice il payload.<br>
Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrutta una vulnerabilità del software per lanciare un command shell dal pc infetto ed eseguire determinate funzioni. Questo payload, chiamato magneto, si avviava in un pezzo non mappato di memoria e mandava comandi ARP all&#8217;host e in seguito si connetteva tramite una semplice richiesta HTTP a un indirizzo localizzato in Virginia USA. Questa richiesta avveniva al di fuori di TOR, in maniera tale da esporre, oltre l&#8217;indirizzo MAC, l&#8217;IP del computer.</p>
<p>Sullo smascheramento delle identità di persone che fanno uso di software come TOR però si sono create due correnti di pensiero diverse. Una da più peso all&#8217;aspetto negativo che deriva dal fatto di concedere l&#8217;anonimato e si schiera a favore di questi metodi per rivelare l&#8217;identità di chi naviga su tali software, come per esempio la Russia che è arrivata a offrire 3,9 milioni di rubli a chiunque trovasse un modo per togliere l&#8217;anonimato agli utenti del sistema. L&#8217;altra corrente di pensiero, della quale fa parte anche il movimento &#8220;Anonymous&#8221;, crede sia necessario avere un modo per restare invisibili sulla rete poichè questi sistemi sono usati anche da attivisti politici che si trovano in paesi in cui vige una forte censura e quindi l&#8217;anonimato gli permette di non essere rintracciati dai loro governi.</p>
<p>fonti[<a href="http://www.ilsole24ore.com/art/tecnologie/2014-07-31/tor-attacco-hacker-ha-violato-mesi-anonimato-utenti-204102.shtml?uuid=ABCPcFgB">ilsole24ore.com</a> , <a href="http://it.ibtimes.com/lanonimato-sul-web-violato-6-mesi-la-rete-tor-colpita-dagli-hacker-1353982">ibtimes.com</a>]</p>
<p>                                                                                                                                                                                                                                                                               Eugenio Corso </p>
<div>
</div>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">

View file

@ -104,6 +104,10 @@
@ -129,6 +133,39 @@
<div class="content container"> <div class="content container">
<div class="posts"> <div class="posts">
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/73">
L&#8217;anonimato violato di TOR
</a>
</h1>
<span class="post-date">12 Apr 2015</span>
<p>Miliardi di persone usano giornalmente internet, ma sono poche quelle a conoscenza del suo lato oscuro, il deep web,nel quale sono presenti siti che gestiscono business illegali (dalla vendita di account rubati alla clonazione di carte di credito) e al quale tutti possono accedere tramite &#8220;Tor&#8221;. Questo è un software che rende chi lo utilizza invisibile, poichè nasconde l&#8217;indirizzo IP del computer tramite la crittografia a strati, da qui il nome scelto che sta per &#8220;The Onion Router&#8221;. Infatti grazie a Tor l&#8217;utente si collega al sito che vuole visitare passando però da una serie di altri server che fungono da router e cifrano la comunicazione.</p>
<div class="separator" style="clear:both;text-align:center;">
<a href="http://francescomecca.eu/wp-content/uploads/2015/08/a2cc6-tor_newsbitcoin.jpg" style="margin-left:1em;margin-right:1em;"><img border="0" height="196" src="http://francescomecca.eu/wp-content/uploads/2015/08/a2cc6-tor_newsbitcoin.jpg" width="320" /></a>
</div>
<div class="separator" style="clear:both;text-align:center;">
foto presa da <a href="http://www.newsbitcoin.it/190/tor-installazione-e-configurazione/" target="_blank">newsbitcoin.it</a>
</div>
<p>Tuttavia, dal 30 Gennaio al 4 Luglio 2014, Tor è stato colpito da attacchi da parte dell&#8217;FBI che miravano a togliere l&#8217;anonimato. Il bersaglio dell&#8217;attacco non sono state solo le persone che hanno utilizzato il software per la navigazione anonima, ma anche chi creava e gestiva siti web e servizi online in maniera anonima. Le persone a rischio infatti erano quelle che visitavano i siti che erano stati precedentemente compromessi, ovvero quei siti che incorporavano nel loro codice il payload.<br>
Il payload è un tipo di shellcode, ovvero un piccolo pezzo di codice, che sfrutta una vulnerabilità del software per lanciare un command shell dal pc infetto ed eseguire determinate funzioni. Questo payload, chiamato magneto, si avviava in un pezzo non mappato di memoria e mandava comandi ARP all&#8217;host e in seguito si connetteva tramite una semplice richiesta HTTP a un indirizzo localizzato in Virginia USA. Questa richiesta avveniva al di fuori di TOR, in maniera tale da esporre, oltre l&#8217;indirizzo MAC, l&#8217;IP del computer.</p>
<p>Sullo smascheramento delle identità di persone che fanno uso di software come TOR però si sono create due correnti di pensiero diverse. Una da più peso all&#8217;aspetto negativo che deriva dal fatto di concedere l&#8217;anonimato e si schiera a favore di questi metodi per rivelare l&#8217;identità di chi naviga su tali software, come per esempio la Russia che è arrivata a offrire 3,9 milioni di rubli a chiunque trovasse un modo per togliere l&#8217;anonimato agli utenti del sistema. L&#8217;altra corrente di pensiero, della quale fa parte anche il movimento &#8220;Anonymous&#8221;, crede sia necessario avere un modo per restare invisibili sulla rete poichè questi sistemi sono usati anche da attivisti politici che si trovano in paesi in cui vige una forte censura e quindi l&#8217;anonimato gli permette di non essere rintracciati dai loro governi.</p>
<p>fonti[<a href="http://www.ilsole24ore.com/art/tecnologie/2014-07-31/tor-attacco-hacker-ha-violato-mesi-anonimato-utenti-204102.shtml?uuid=ABCPcFgB">ilsole24ore.com</a> , <a href="http://it.ibtimes.com/lanonimato-sul-web-violato-6-mesi-la-rete-tor-colpita-dagli-hacker-1353982">ibtimes.com</a>]</p>
<p>                                                                                                                                                                                                                                                                               Eugenio Corso </p>
<div>
</div>
</div>
<div class="post"> <div class="post">
<h1 class="post-title"> <h1 class="post-title">
<a href="/index.php/archives/78"> <a href="/index.php/archives/78">
@ -383,33 +420,11 @@ I dati sono la risposta economica a: “Iscriviti, e&#8217; gratis e lo sarà se
</div> </div>
<div class="post">
<h1 class="post-title">
<a href="/index.php/archives/90">
Chiave PGP
</a>
</h1>
<span class="post-date">31 Mar 2015</span>
<p>Questa e` la nostra chiave PGP con la quale possiamo essere contattati all&#8217;indirizzo<br>
<strong>pescewanda3 [at] gmail.com</strong></p>
<div class="code">
&#8212;&#8211;BEGIN PGP PUBLIC KEY BLOCK&#8212;&#8211;<br />Version: GnuPG v2</p>
<p>
mQENBFUa5j4BCAC8clTqI75PkKJ+YewmyXqjBtlsqXCWlunS4CkQTaaI3I5c13yz<br />+Nc+gibHrxhQZcOULYhjlhe9PNv/8Bnj4i2qBMjJNORAlJycjgyzCTy3OY+Hkt6Q<br />c/6uXp5ObnLblKwnPSgaij9GuH4PD1fe+fN0LORMqNJ8PNdk1a5qNJ7fuH8/nIus<br />F2+Rv6qej0OcLIUUebeiMLu+Nc52tDX76kjdvq9cG7AyAXpo478Xr4EnhPDB0sXc<br />TAGJ3I93caVXa9lqP+njI9mPDTyrl+lobLgQhdIOsW50JZmbG/EHMHFKahcaEssM<br />50lz+PtqZ0VblIDTe9xjukdcPaKhPaGuW2OxABEBAAG0KWNhdWdodF9pbl90aGVf<br />bmV0IDxwZXNjZXdhbmRhM0BnbWFpbC5jb20+iQE5BBMBCAAjBQJVGuY+AhsDBwsJ<br />CAcDAgEGFQgCCQoLBBYCAwECHgECF4AACgkQ12NuZ5rBCRLsOgf9EhR2I0M30jzP<br />rDYU5jFwyaFzWheiKO9yAiHHj2+iJXYsPcyNEIa0E+IqqMWu9e7AksscRe/rkq7U<br />wOANtiYMVTfdqnPE13c4KqKTXjikua/j4lE3fDU4IF5+sRgK62H+Ee64flP1ReO8<br />Zo4z2mwcYxqag+uSNBE0pnuICSd9NCCOiKjS0HRaG0CbpyDQ+fuqjulfn9zpU1a2<br />6y/Lg1uixIDZZICmVKfZkl5ZqkS/1Sdx4AK6rnnFH0gZ1k2J6LsE4cqvazIroRgr<br />opnuSQsfwMNiu6oaBe/+kzlhSZy/vb/vw0HT5oZHtY2so/dZe42v40weyxroZgaY<br />SR2wE5wsM7kBDQRVGuY+AQgArq1F9dl61MOSQi/SYTgmPYjptcgm0L5QBmsOeN1v<br />9YWPFn/AR8GOiGRF1//TI+ECjfL8uAdzbK1xJURXcBTrO0BdgRBlaZgSRiq+KFGT<br />pmyjj+q1toVLPwIZmsxHL6j7doSnt9Z4oesKIJ2hrdEGZ3hpFBekxMR2lmHk3zQB<br />e/qsSUwS/rIk/BBWtdifdEzcK7AJb0nRAJzQu6kyEdOGOuEprtSkG8789SkKGFxz<br />HuEIyRxoLz/KQJ7FGINQwNYXM6+5pjNt7vu5knFGF71TjVN0UjFck/mxWObxwxO3<br />EoZtW6tNgkxdOoFBIo8hhSxsVqIHoyztf58Ppo/IOgSCyQARAQABiQEfBBgBCAAJ<br />BQJVGuY+AhsMAAoJENdjbmeawQkSx/EIAK26MGlFMzviE9mWRF09vljESVbfRcnE<br />ybMZNlq/w6AdU1R6g2nbooKX1KuB8uBTZYegLJByj+ssiZagrW7rASLLVADzfP3D<br />m2TFCqE/LeOJzgMtaUfEAgvee4jNVHFvAJ2k5fejk9aQ+r3EskqACqfnY4y5SE30<br />tFsS+Wwz1C+NHFv0EnVyJaDUGKq7ZX7BQHGlxW0AFz17l4hMQztgx6Il36yC5EQr<br />BQULGVPCHpadUGpzPWIqKhIg33P3FlCqzSVBGB9aXqfBQYAUjP2MrieWcaLdJbRM<br />MBR29ROibDEd8qOPvcHrRg3cb2OPw9/Ia19VqEE9/tjn094CCuVkDPU=<br />=/XCq<br />&#8212;&#8211;END PGP PUBLIC KEY BLOCK&#8212;&#8211;
</p>
</div>
</div>
</div> </div>
<div class="pagination"> <div class="pagination">
<span class="pagination-item older">Older</span> <a class="pagination-item older" href="/page10">Older</a>

View file

@ -104,6 +104,10 @@
@ -180,6 +184,15 @@ Finally I put a link to the archive, my github page and the atom feed on the sid
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -198,15 +211,6 @@ Finally I put a link to the archive, my github page and the atom feed on the sid
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -164,6 +168,15 @@ The bot can be added to your contact list by simply searching for <a href="http:
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -182,15 +195,6 @@ The bot can be added to your contact list by simply searching for <a href="http:
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -148,6 +152,15 @@ instantaneously.</p></li>
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -166,15 +179,6 @@ instantaneously.</p></li>
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -142,6 +146,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -160,15 +173,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -187,6 +191,15 @@ The source for our program is stored in my git <a href="http://francescomecca.eu
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -205,15 +218,6 @@ The source for our program is stored in my git <a href="http://francescomecca.eu
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -229,6 +233,15 @@ Ogni altra prova è discutibile e non necessaria.</p>
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -247,15 +260,6 @@ Ogni altra prova è discutibile e non necessaria.</p>
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -212,6 +216,15 @@ At the end, I ask, why would you choose anything else than the easiest and most
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -230,15 +243,6 @@ At the end, I ask, why would you choose anything else than the easiest and most
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -216,6 +220,15 @@ Anyway for simple cases the GA yields good results, as an example for points (0
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -234,15 +247,6 @@ Anyway for simple cases the GA yields good results, as an example for points (0
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -144,6 +148,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -162,15 +175,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/15/genetic-alg/">
Interpolation using a genetic algorithm
<small>15 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -205,6 +209,15 @@ dfu-programmer atmega16u2 reset
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/06/IM-services/"> <a href="/pescewanda/2016/07/06/IM-services/">
@ -223,15 +236,6 @@ dfu-programmer atmega16u2 reset
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/15/genetic-alg/">
Interpolation using a genetic algorithm
<small>15 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -104,6 +104,10 @@
@ -232,6 +236,15 @@
<h2>Related Posts</h2> <h2>Related Posts</h2>
<ul class="related-posts"> <ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/07/pres-berk/">
A short talk about cryptography at the Berkman Klein Center
<small>07 Jul 2016</small>
</a>
</h3>
</li>
<li> <li>
<h3> <h3>
<a href="/pescewanda/2016/07/05/arduino_keyboard/"> <a href="/pescewanda/2016/07/05/arduino_keyboard/">
@ -250,15 +263,6 @@
</h3> </h3>
</li> </li>
<li>
<h3>
<a href="/pescewanda/2016/05/15/genetic-alg/">
Interpolation using a genetic algorithm
<small>15 May 2016</small>
</a>
</h3>
</li>
</ul> </ul>
</div> </div>

View file

@ -0,0 +1,434 @@
<!DOCTYPE html>
<html lang="en-us">
<head>
<link href="http://gmpg.org/xfn/11" rel="profile">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta http-equiv="content-type" content="text/html; charset=utf-8">
<!-- Enable responsiveness on mobile devices-->
<meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1">
<title>
A short talk about cryptography at the Berkman Klein Center &middot; Caught in the Net
</title>
<!-- CSS -->
<link rel="stylesheet" href="/public/css/poole.css">
<link rel="stylesheet" href="/public/css/syntax.css">
<link rel="stylesheet" href="/public/css/hyde.css">
<!-- Icons -->
<link rel="apple-touch-icon-precomposed" sizes="144x144" href="/public/apple-touch-icon-144-precomposed.png">
<link rel="shortcut icon" href="/public/favicon.ico">
<!-- RSS -->
<link rel="alternate" type="application/rss+xml" title="RSS" href="/atom.xml">
</head>
<body class="theme-base-09">
<div class="sidebar">
<div class="container sidebar-sticky">
<div class="sidebar-about">
<h1>
<a href="/">
Caught in the Net
</a>
</h1>
<p class="lead"></p>
</div>
<nav class="sidebar-nav">
<a class="sidebar-nav-item" href="/">Home</a>
<a class="sidebar-nav-item" href="/about/">About</a>
<a class="sidebar-nav-item" href="/archive/">Archive</a>
<a class="sidebar-nav-item" href="/contattami/">Contattami</a>
<a class="sidebar-nav-item" href="/atom.xml">RSS</a>
<a class="sidebar-nav-item" href="http://francescomecca.eu:3000">Personal Git</a>
<a cleass="sidebar-nav-item" href="https://github.com/s211897-studentipolito">github</a>
<span class="sidebar-nav-item" href="" >Powered by Jekyll and Hyde</span>
</nav>
<p>&copy; 2016. CC BY-SA 4.0 International </p>
</div>
</div>
<h3 class="masthead-title">
<a href="/" title="Home">Caught in the Net</a>
</h3>
<div class="content container">
<div class="post">
<h1 class="post-title">A short talk about cryptography at the Berkman Klein Center</h1>
<span class="post-date">07 Jul 2016</span>
<p>The 7th of July me and <a href="http://studentprivacy.ca">Aaron</a>, as intern at the <a href="http://cyber.law.harvard.edu">Berkman Klein for Internet and Society</a>, gave a presentation on the basics of cryptography and a quick overview on the essential tools.
1o
What follows is a short summary of that presentation. The slides are available <a href="/wp-content/uploads/2016/fwneas.pptx">here</a></p>
<h3 id="whose-security">Whose Security?</h3>
<p>Let&#39;s define what security is. Security is the possibility to being set free from structural costraints, and as that we can distinguish various levels of security depending on who we are.</p>
<p>Also, if we want to investigate security we should also define our threats: security, as being set free, from intelligence surveillance can be our target. Our concerns as different if we consider instead security from censorship or corporation data mining.</p>
<p><img src="/wp-content/uploads/2016/godmode.png" alt="uber god view">
<img src="/wp-content/uploads/2016/fb.png" alt="facebook law enforcement form"></p>
<p>What is shown above is the <a href="http://www.theverge.com/2016/1/6/10726004/uber-god-mode-settlement-fine">Uber God View</a>, a tool Uber used to track a Buzzfeed&#39;s journalist locations, and the Facebook standard form that is given to law enforcement when requested.</p>
<h3 id="security-is-a-state-of-mind">Security is a state of mind</h3>
<p>Security is hard. It is really rare to reach a state of complete security and even in that case, it depends on our target.</p>
<p>What is important is to train ourselves to security. Security is a state of mind and there are no tools that automatically protect us without our active partecipation.</p>
<p>Let&#39;s explore that in details.</p>
<h3 id="the-layers-of-security">The layers of security</h3>
<p>We can distinguish four layers of security:</p>
<ul>
<li>Device Security;</li>
<li>Network Security;</li>
<li>Message Security;</li>
<li>Human Security.</li>
</ul>
<h6 id="device-security-where-everything-happens">Device Security, where everything happens</h6>
<p>Device security is related to the &quot;physical host&quot;.</p>
<p>If the computer we use is tampered, at the hardware level, or the phone is bugged, there is no way to escape using higher level tools.</p>
<p>In other words, it doesn&#39;t matter if we use a super secure password if our computer is registering all our keystrokes and send them to a third party.</p>
<p>Also, device security is useful if we consider that our device can fall into the hands of attackers that may be able to traceback all the activities.</p>
<p>Some precautions for this purpose:</p>
<ul>
<li>full disk encryption;</li>
<li>minimal set of application installed;</li>
<li>open source operating systems.</li>
</ul>
<h6 id="network-security">Network Security</h6>
<p>The network is the infrastructures that our device is attached to. In most of the case, when we consider our computer is the internet (and the GSM network in case of mobile phones).</p>
<p>Network security is essential to evade censorship, behavioural tracking and identity theft.</p>
<p>Some tools that may help in this case:</p>
<ul>
<li>vpn;</li>
<li>tor;</li>
<li>p2p networks;</li>
<li>mesh networks.</li>
</ul>
<p>And for the web:</p>
<ul>
<li>opensource web browsers (such as firefox);</li>
<li>no google apps on android phones;</li>
<li>https.</li>
</ul>
<h6 id="message-security">Message Security</h6>
<p>Message security is the level of protection regarding the content that you want to send or receive.</p>
<p>Message security is essential if you want to avoid any third party snooping and the confidentiality of your messages.</p>
<p>The tools we can use in this context:</p>
<ul>
<li>OTR;</li>
<li>opensource messaging protocols (XMPP, matrix);</li>
<li>Signal;</li>
<li>PGP.</li>
</ul>
<p>Also, always remember that encrypting the content of the message doesn&#39;t guarantee that your identity and the metadata are hidden.</p>
<h6 id="human-security-the-weakest-link">Human Security, the weakest link</h6>
<p>Everything comes down to the human level at a certain point.</p>
<p>This is way it is important to train ourselves in security.</p>
<p>If we consider <a href="https://en.wikipedia.org/wiki/Kevin_Mitnick">Kevin Mitnick&#39;s history</a>, or the recent <a href="http://thehackernews.com/2015/11/fbi-cia-director-hack.html">FBI deputy director hack</a> we see that social engineering plays a big role when we want to undermine the security of an individual of interest.</p>
<p>But security matters even if we are not target of interest.</p>
<p>For example let&#39;s consider our password. If we use the same password on every site and one cracker manages to gain access to just one of them, our whole activities online can be exposed and our identity stolen. <a href="http://www.nydailynews.com/news/national/mark-zuckerberg-twitter-account-hacked-password-dadada-article-1.2662351">This is relevant</a>. Myspace had its database breached and the password of Zuckerberg (even a simple one) was exposed. Given that he used the same password on twitter and other sites, his multiple accounts were compromised.</p>
<h3 id="what-is-tor-and-how-it-works">What is TOR and how it works</h3>
<p>When you visit a website with your mobile phone or a browser on your computer lots of things go on under the hoods.</p>
<p>Your computer, as a client, makes what is called an <a href="https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment">handshake</a> with the server.</p>
<p>After telling the server that the client is interested in its content, a series of packets containing data is exchanged.</p>
<p>That is the content of a connection. Inside this packets there are a multitude of information of two kinds:</p>
<ul>
<li>the web page or the content we are trying to visualize;</li>
<li>information on the status of both the server and the client.</li>
</ul>
<p>The informations contained in every packet can be analized to understand the &quot;identity&quot; of the client that is requesting the content on the server, first of all the IP that is a sort of web address that every computer on the net has.</p>
<p>Not only, during the transmission of this packets, various entity on the communication channel can analize the content and mine our data.</p>
<p><img src="/wp-content/uploads/2016/tor-https-0.png" alt="Cute infographic"></p>
<p>TOR still uses this kind of routine to gather the content of a web page, but instead of connecting directly to the destination server it goes through a series of other servers called relay: instead of going directly from A to B, it goes from A to C to D to E to F to B.</p>
<p>If the web was a kindergarden Alice instead of telling directly her phrase to Bob, she would tell the word to a friend that in turn would tell the word to a friend and so on, until Bob heards the word, without knowing that Alice said that at the beginning.</p>
<p>At this point you should ask yourself: are the data more protected if it goes through a network of relays? It actually is given that every time you send a packet through the TOR network, it gets encrypted so that no one knows it&#39;s content.</p>
<p>To tell the truth, actually the relay (called exit node) that will send the packet to the destination server, knows the content of the packet but does not know the origin.</p>
<p>Ultimately a website can be entirely hosted on the TOR network, called the onion network, so that the packets never exit from the relays and the relay don&#39;t know the phisycal location of the server, so every entity on the network reach a perfect level of anonimacy.</p>
<h3 id="who-owns-the-relays">Who owns the relays?</h3>
<p>Actually every one can host and own a relay if they are willing to do so.
I personally host one right now and there are many others that share a little fraction of their network connection.</p>
<p><img src="/wp-content/uploads/2016/screenraspy.png" alt="My little raspi is moving some packets right now"></p>
<p>Running a relay node is very easy and everybody should do so. Running an exit node instead is more troublesome and I don&#39;t suggest it if you are not a big entity that can handle some sorts of occasional trouble.</p>
<h3 id="don-39-t-play-the-fool-on-the-tor-network">Don&#39;t play the fool on the TOR network</h3>
<p>Of course TOR doesn&#39;t guarantee you perfect anonimacy. At the end it all comes to the human layer.</p>
<p>It&#39;s no use to surf the web through TOR if we then log in to our personal blog or our personal facebook page.</p>
<p>But there are other subtle factors that can be exploited by web companies to gather info and track their users.A</p>
<p>Such factors are:</p>
<ul>
<li>the size of the screen and the colors supported by it;</li>
<li>the timezone;</li>
<li>canvas and images that the server asks your computer to generate;</li>
<li>information about your OS that are sent through packets;</li>
<li>the fonts available on your system;</li>
<li>touch support;</li>
<li>cookies;</li>
<li>ads and cross site requests;</li>
</ul>
<p>In particular, most of these are exploitable using a web programming language, javascript, that lots of web pages uses to render content. TOR users should avoid the use of javascript.</p>
<h3 id="public-private-key-encryption">Public Private Key Encryption</h3>
<p>While TOR is recent technology, public key encryption is a concept way older.</p>
<p>What happens when we use public / private key encryption tools is conceptually similar to what happens with our physical correspondence.</p>
<p>A public key is similar to our mailbox.</p>
<p>Everyone that knows the location of a person&#39;s mailbox can write a message and put it inside but only the owner of that mailbox, using is own key can open the mailbox and read the various messages.</p>
<p>When we use PGP or GPG (an implementation of the public key encription concept) we generate a pair of key.</p>
<p>A public one that we should broadcast or at least share with our social circle, and a private key that must remain secret at any cost.</p>
<p>Everyone can encrypt every kind of digital content using our public key (that is just a really long string) and only the owner of the private key can proceed to decryption of the content.</p>
<p>This also means that we know who is gonna read the message if encrypted using this kind of technologies.</p>
<p>One easy tool for GPG encryption is <a href="https://www.gnupg.org/%28en%29/related_software/gpa/index.html">GPA</a></p>
<h3 id="metadata">Metadata</h3>
<p>What would you do if you were asked to put under surveillance one person?</p>
<p>For sure placing a bug with microphone and recording capabilities would be the best option.</p>
<p>But what if, instead of recording every thing the subject does, we just take a note of all his actions, without taking care of the content. For example, if the subject speaks to someone, we record the time, the place, the duration of the conversation and all the info of the person he is talking with.
What if, when the person walks into a mall, we record the time, the location, the shops he entered, the money he spent, the number of things bought, but not the things he bought, in detail.</p>
<p>You can see that you can have a fairly precise idea of the habits of the person under your surveillance.</p>
<p>Actually from metadata is easy to grab all kinds of personal information. Also, if a tiny portions of the information we have on the subject are more detailed (for example social network photos) we have a picture as clear as never.</p>
<p>This is not just one of the biggest concern that should pop into your mind when you are talking about nation wide mass surveillance, it is also the core of the business of corporations like Facebook and Google.</p>
<p>Whatsapp does not read the content of your messages but it stores every single bit of metadata that comes with it.</p>
<p>Metadatas are enought to build a complete profile of the users and they are even more dangerous in the hands of an evil state agency.</p>
<h3 id="nothing-to-hide">Nothing to hide</h3>
<p>Even if we have nothing to hide, we have much to fear.</p>
<p>The &quot;nothing to hide&quot; argument is something that everyone of us in this room has heard, at least one time.</p>
<p>We should fear this sentence because it is the ultimate ammision of a big misunderstanding on the whole debate.</p>
<p>Privacy, first of all, is <strong>control</strong> over our data, not only the right to secrecy.</p>
<h6 id="transparency-should-be-for-everyone">Transparency should be for everyone</h6>
<p>There is a big incoherence when asking to your citizens to handle over their data. </p>
<p>Transparency should be a two way thing, while at the current state big three letter agencies, but high level people as well, cover their tracks and are not transparent on their reports. </p>
<p>This enhance a situation of big inequality between the people and the State.</p>
<p>Even worse, it is not the citizen by himself that can choose if he has something to hide, but the autority.</p>
<p>This may seem a little naive to say, but with Bruce words:</p>
<blockquote>
<p>If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.</p>
</blockquote>
<p>This is true even without considering social discrimination and mass media manipolation.</p>
<h6 id="the-fundamental-of-society">The fundamental of society</h6>
<p>Every action can be seen as either legal or illegal. When we take a decision this is one of the first, implicit concern.</p>
<p>This is not true in a surveillance system: when you are doing something your concern is all about the possibility of raising suspicion.</p>
<p>An idea not action is what is needed in such a dystopic condition to prove a citizen guilty.</p>
<h6 id="two-wrong-make-a-right">Two wrong make a right</h6>
<p>In America we are now discussing about weed legalization.</p>
<p>Do you think that such debate would have been possible if no one could had the possibility, even if against the law, to try that substance?</p>
<p>The same goes for gay marriages.</p>
<p>Inside the panopticon every <strong>potential</strong> criminal would be persecuted.</p>
<h3 id="to-hide-is-to-care">To hide is to care</h3>
<p>A simple truth is that we don&#39;t close the windows to cover up our crimes. </p>
<p>Our innermost experiences become in our intimacy, which is the most secred place.</p>
</div>
<div class="related">
<h2>Related Posts</h2>
<ul class="related-posts">
<li>
<h3>
<a href="/pescewanda/2016/07/06/IM-services/">
Phone messaging apps comparison
<small>06 Jul 2016</small>
</a>
</h3>
</li>
<li>
<h3>
<a href="/pescewanda/2016/07/05/arduino_keyboard/">
Arduino Uno as HID keyboard
<small>05 Jul 2016</small>
</a>
</h3>
</li>
<li>
<h3>
<a href="/pescewanda/2016/05/16/lifehacks2/">
Lifehacks (2)
<small>16 May 2016</small>
</a>
</h3>
</li>
</ul>
</div>
</div>
</body>
</html>

Binary file not shown.

After

Width:  |  Height:  |  Size: 604 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 37 KiB

Binary file not shown.

Binary file not shown.

After

Width:  |  Height:  |  Size: 851 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 59 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 60 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.6 MiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 37 KiB

Binary file not shown.

Binary file not shown.

After

Width:  |  Height:  |  Size: 851 KiB