Community Choice Award "Most Likely to be Shut Down By Govt" 246
Last week we took nominations for a Slashdot category at the SourceForge Community Choice awards. Our category was 'Most Likely to be Shut Down By Government Agency'. Your nominations were tallied, and we arbitrarily selected a few that we think are the best. Today is the day where you can at long last determine the winner, using the incredibly scientifically accurate Slashdot Poll. Our nominees are
Truecrypt,
EFF Patent Busting,
GNU Software Radio,
WikiLeaks,
Cryptome.org,
Tor,
Freenet,
and CowboyNeal.
Government Agency? (Score:4, Insightful)
Any Serious Chance It'll Happen???!!! (Score:5, Insightful)
I challenge anyone to even find one credible attempt by anyone in government to shut down one of the nominees.
This story is just hysterical scaremongering.
Likely? (Score:5, Insightful)
It matters if something is actually shut down. The answers on this "likely" poll are just a measure of the prejudice (in the dictionary sense of the word prejudice [reference.com]) of the people answering the question.
Where's the answer for "none of them should be shut down, but I prefer to keep an open mind and deal with reality rather than wallow in my own preconceptions about things that haven't happened yet"?
Vote None! (Score:5, Insightful)
Re:The Most Likely Choice... (Score:5, Insightful)
Re:The Most Likely Choice... (Score:4, Insightful)
Re:Vote None! (Score:5, Insightful)
Someone posts to wikileaks about how the govt made up the charges about freenet, and then freenet gets taken down over "state secrets" or something.
Notions of law and justice are really somewhat quaint these days.
GNU Radio (Score:2, Insightful)
Some people say 'wikileaks' because the man doesn't want you knowing, but imo worse than that is the man not knowing. The man being any of the govt, riaa, mpaa, cable, bells, etc.
Truecrypt can live underground. Wikileaks can't. (Score:5, Insightful)
As much as I think TPTB would like to kill off truecrypt (assuming it's on their radar), it can live on with underground distribution since it's a software project. Development might grind to a halt, since no one could easily validate the source for various underground successor projects. But checksums for the last known, good version would be as easy to find elsewhere as a bootleged disc of code.
The whole point of Wikileaks is to make things public, so driving leaked documents repositories underground would make them indistinguishable from conspiracy theorists and the lunatic fringe.
EFF Patent Busting?? (Score:5, Insightful)
Seriously, even the patent office is complaining about the backlog of patents. I think they want a solution as much as the rest of us.
Whew! (Score:4, Insightful)
I guess we're all safe, just as long as there aren't any laws [cornell.edu] or regulations [gpo.gov] that these websites might be violating. I'm sure the authors of Freenet double-check their regulatory compliance every week. After all, the index volume for the Code of Federal Regulations is only 1100 pages, and the other 50 volumes can't be too much bigger. And why even bother reading the US Code? You barely have to skim the thing to determine that there could never be anything illegal about providing assistance to third parties who want to covertly transmit large amounts of unspecified data.
Re:Any Serious Chance It'll Happen???!!! (Score:3, Insightful)
Clearly Neal (Score:2, Insightful)
I'd say (Score:3, Insightful)
Re:Vote None! (Score:5, Insightful)
Just because some of our 535 crazies committed to Congress this session want to shut it down, doesn't mean it'll happen.
A bill was introduced in 1955 to ban Rock and Roll music, for the same "protect the children" reasons used as excuses to ban anything. Of course, that didn't happen - what would've happened to "Guitar Hero?"
Congress wants to look like it's doing something - actually doing it is hard. Watch them ban Wikileaks, make a press release, and then do nothing within their (limited) power to actually shut the site down. They get their press time, everyone's happy.
But, in some ways, that's a good thing. An ineffectual government is better than one with "quaint" notions of law and justice.
Re:The Most Likely Choice... (Score:5, Insightful)
Re:Tor? (Score:3, Insightful)
Re:**AA (Score:2, Insightful)
Re:The Most Likely Choice... (Score:5, Insightful)
Re:The Most Likely Choice... (Score:3, Insightful)
Stuff that the *Swedish* government doesn't want leaked.
I'm voting WikiLeaks (Score:3, Insightful)
But leaks they definitely understand and posting leaked info online is simply poking the Happy Fun Ball repeatedly with a sharp stick.
GNU Radio (Score:3, Insightful)
Re:Any Serious Chance It'll Happen???!!! (Score:5, Insightful)
There is something about geeks that leads them to be more suspicious of authority. Perhaps it is being ostracized at a young age or the fact that there are simply a lot of really dumb people out there who have somehow manage to get a little power.
Re:TrueCrypt (Score:1, Insightful)
Even a non malicious programmer can do some foolish things that utterly compromise security - like the Debian SSH flaw just recently.
Even visible code might not be enough. *adjusts special shiny hat*
aside : these CAPTCHAS are really burning my ass.
Re:Any Serious Chance It'll Happen???!!! (Score:5, Insightful)
The indication they look for that you're trying to spoof them is that the last modified file dates are all months old in your "cover" partition. So don't leave that kind of a signature. Think of one as the "low security" partition and the other as the "high security" partition. I put work stuff on the low security partition and my own stuff on the high security partition and I use them both all the time. In fact, the stuff in the work partition probably has newer timestamps than the stuff in my personal partition right now.
There really is no way to tell that I've got another partition, and a dozen files (or more) in the partition I'll reveal have last modified timestamps as of today or yesterday. Also, I'll put up a serious squawk about needing to protect confidential information for my clients, then give them the key. Then when they actually see the confidential information of my clients...
The best lie is not to lie at all.