Here’s how to strike back against Internet censorship and why
It's time to step up and voice your concerns because we now have a bit of momentum. Here's how to strike back against Internet censorship. Here is why you should consider taking at least a few minutes to get involved. I've blackened the DI banner today as a symbol of my concern regarding efforts to pass SOPA (pending in the House) and the Protect IP Act (pending in the Senate). Free Press has offered a page indicating the senators who are pro, con and on the fence. If you plug in your zip code, you will be presented with phone numbers for your senators and it LITERALLY takes only a minute to voice your concern to the staffer of your senator. I called my two senators in two minutes. Please join me in voicing your concern to your elected officials. You will be doing your part to use logic, fairness and reason to oppose $90 million in campaign contributions. Reason sometimes work, as demonstrated by today's reversal of course by Senator Marco Rubio of Florida.
SOPA quote
Gary Shapiro, President of the Consumer Electronics Association, gave the keynote of the 2012 Consumer Electronics Show, which included the following:
Alluding to the upcoming Orwellian "Stop Online Piracy Act" (SOPA) (H.R. 3261), a visibly furious Mr. Shapiro commented, "[SOPA is championed by] politicians who are proudly unfamiliar with how the internet works, but who are well familiar with favors from well-heeled copyright extremists."
How Google deals with takedown requests from governments
Here's a useful summary of the way Google deals with takedown requests.
Your Gmail account could be hacked
At The Atlantic, James Fallows has written an excellent and harrowing account of how your email program in the cloud be hacked and what you can do about it. The story is centers on a real-life experience of Fallows' wife, who noticed one day that she couldn't get into her Gmail account; by the time she got control of her account again, she noticed that all of her email was missing. After much additional effort she regained access to most of her email, but it wasn't easy and this result is not guaranteed. She made the mistake of simply assuming that her data was safe with Google and that no one would hack her account. Many people are out there trying to take over your email account, and they are successful too often. They have broken into email accounts in all of the cloud email companies (gmail, yahoo, hotmail . . . you name it). The problem is usually password hygiene. Fallows offers some suggestions at the end of his detailed article (I highly recommend that you read the entire article, because his suggestions go well beyond the excerpts below):
[I]f you use Gmail, please use Google’s new “two-step verification” system. In practice this means that to log into your account from any place other than your own computer, you have to enter an additional code, from Google, shown on your mobile phone. On your own computer, you enter a code only once every 30 days. This is not an airtight solution, but it can thwart nearly all of the remote attacks that affect Gmail thousands of times a day. Even though the hacker in Lagos has your password, if he doesn’t have your cell phone, he can’t get in. In case you’ve missed the point: if you use Gmail, use this system. Also, make sure the recovery information for your account—a backup e-mail address or cell phone where you can receive password-reset information—is current. Google uses these to verify that you are the real owner. Next we have password selection, that seemingly impossible task. The science, psychology, and sociology of creating strong passwords is a surprisingly well-chronicled and fascinating field. OnThe Atlantic’s Web site, we will describe some of the main strategies and the reasoning behind them. Even security professionals recognize the contradiction: the stronger the password, the less likely you are to remember it. Thus the Post-it notes with passwords, on monitor screens or in desk drawers. But there is a middle ground, of passwords strong enough to create problems for hackers and still simple enough to be manageable.