Category Archives: Computing

Don’t be evil

Google’s aspirational slogan has only been realized in a museum

After my last post about Amazon I received a question about dropping Google. Rather than respond individually, here I’m going to offer my 2c worth on a hodgepodge of related topics. I’m sure I will receive more feedback that this or that company I’ve recommended below has sociopathic CEOs or a history of repugnant campaign donations. You do know that CEOs are highly likely to be sociopaths and even psychopaths, don’t you? Well, welcome to Capitalism! In general, the object here is to de-couple from some of the worst and most powerful tech bro’s on the planet. And in this post I take on: Google, a company that long ago dumped its slogan: “don’t be evil.”

Email

Google’s (as well as Yahoo’s, AOL’s, Microsoft’s and other biggies) primary attraction for most people is the free email. Who doesn’t like free? Unfortunately, most people are blissfully unaware that Google has been reading your emails for years. There are hundreds of companies that offer free email, but several I have personally used to replace Google email are: disroot.org; icloud.com; infomaniak.com; murena.io; proton.me; tutanota.com; vivaldi.net; and zohomail.com.

There are other companies providing low-cost (not free) email service hosted outside the US and not subject to Five Eyes surveillance (although the surveillance state is not really going to be deterred). A few I providers have tested are: countermail.com; mailbox.org; posteo.de; and startmail.com. Some are as inexpensive as 1€ (Euro) a month. You get what you pay for: in this case, better privacy.

Your choice of an email client is as important as the email provider you use. An email client is a specialized app that sends and receives email, maintains your contacts, and connects to your calendar. Apple’s Mail programs on MacOS and iOS are secure and private (and Apple makes email communications even more private with IP masking). On Linux, Claws, Evolution, Geary, and kMail are private and secure. On Windows, the built-in (Outlook “Lite”) client should not divulge data to third parties. Other apps that do not permit the contents of your mail folders to be sniffed by third parties include: Thunderbird (available on all desktop platforms and Android); emClient (Windows, Mac, and mobile); Betterbird (Windows, Mac, Linux); and Mailspring (Mac, Windows, Linux). In general you want an email client that uses only imap and smtp or the Windows exchange protocol.

Email clients that are not secure are those which collect passwords from your accounts and serve as intelligent front ends to multiple email accounts. These include programs like Spark Mail, BlueMail, Canary Mail, Edison, and even Microsoft Outlook for iOS. As friendly and capable as they are, these programs can cleverly organize your schedule and prioritize your inbox only by having complete access to both your passwords and the contents of your inbox. With the popularity of AI on the upswing, we’re going to see more and more of these apps popping up. They will all be threats to your privacy.

My recommendation: for best privacy, I’d use a paid, offshore email account with Thunderbird and PGP encryption or I’d use Proton Mail.

Cloud Storage

Another important feature for many Google users is their 15gb of free cloud storage. Once again, there are other companies that provide equivalent or even better services. You can replace Google cloud storage with: box.com; filen.io; infomaniak.com; mega.io; nextcloud (a network of providers who use a common set of apps); pcloud.com; or proton drive. One consideration is whether the provider offers cloud storage clients for each of the devices you use.

A caution: Microsoft offers a service called OneDrive, which MS Windows considers a “backup” device. This is either outlook.com’s “free” service offering 5gb or part of an Office365 subscription offering 100gb. Many people who think they are backing up their Windows systems are actually copying files to OneDrive storage. Blithely removing OneDrive could break something on Windows 11 if you’re not careful. My advice to anyone in this boat: first copy your data from OneDrive and then begin to systematically de-couple Windows from OneDrive.

My recommendation: Mega and pCloud.

Google Docs

Another feature for Google users is google sheets, google docs, and tools that are basically Microsoft Office in an online version. You can replace Google collaborative tools with LibreOffice, OnlyOffice, WPS Office, or the venerable Apache OpenOffice. If you need collaborative capabilities, try Collabora Online, an enterprise-ready version of LibreOffice.

My recommendation: LibreOffice.

Google Browser

For many people “Google” is synonymous with both their email provider, the browser they use to navigate the internet, and the search engine they use to look things up. In the following paragraph I am referring only to the browser you use to access the internet.

Google’s browser is used by 66.3% of users worldwide, Safari by 18%, Microsoft Edge by 5.33%, Firefox by 2.62%, Opera by 2%, and miscellaneous browsers 2%. Despite this apparent popularity — more likely that users generally don’t know they have other options — there are numerous privacy reasons to replace Google’s Chrome browser that I won’t go into here. Google has gifted the source code to its Chrome browser to the Open Source Chromium project, and Chromium serves as the basis for a number of third party browsers that have stripped out what is essentially Google spying and tracking code from their own versions. These Chrome-derived browsers can even use Chrome extensions. Microsoft’s Edge browser is one such example (although Microsoft has added their own spying and tracking mechanisms back into their code). Third party Chromium-derived browsers that respect your privacy better than Google include: Brave; Chromium; Iridium; Opera; and Vivaldi.

For Mac users, Safari is a great alternative, providing that you use a security extension to limit tracking by websites you browse.

Firefox is another completely separate browser with its own extensions and is regarded by many as more secure than Chromium (I tend to agree). Firefox has several spinoffs: GNU IceCat, LibreWolf and WaterFox are three of the more popular derivatives. The TOR browser is a hardened Firefox browser that uses the Onion routing protocol for supposedly secure surveillance-proof browsing, including to Dark Web sites. However, in my view it is doubtful that any system originally developed by the US military has anyone’s best interests in mind. So consider the Tor Browser to be insecure.

My recommendation: Brave and Firefox.

Search Engines

Finally, in common parlance “to Google” something now means “to search” something on the web. And with good reason. One study shows that Google searches represent over 90% of all searches worldwide, Bing 4%, Yandex 2%, Yahoo 1.3%, and Yandex (Russia) and Baidu (China) each less than 1%. Obviously, in Russia and China these numbers will be vastly different.

Google’s browser makes their own Google search engine the browser default, just as Microsoft makes Bing the default for its Edge browser and Brave makes its own Brave Search engine their own browser’s default. But using other search engines is simply a matter of navigating to a URL such as duckduckgo.com, search.brave.com, startpage.com, or qwant.com. You can also replace Google’s search engine in any browser by going into the browser settings and changing the default search engine to something more secure.

Just as a browser can slurp up your personal information without permission, a search engine may do the same by recording your search terms and IP address in logs that (1) are used to track your consumer preferences; or (2) can be subpoenaed or simply handed over to authorities without even a warrant. If you are concerned that your search on “Israeli genocide” or “abortion providers” might come back to haunt you, you just might want to replace your default search engine.

My recommendation: duckduckgo, brave search, and startpage.

Don’t feed the oligarchs

Both X (formerly Twitter) and all the Meta products (Facebook, Instagram, Threads, and WhatsApp) are owned by fawning Trump-loving oligarchs. These online platforms steal your personal information, resell it, and permit hate speech they approve while censoring political opinions they don’t like.

Even if you’ve been on these platforms a long time, it’s now time to leave. Immediately.

Pulling the Plug

One of the first things Elon Musk did after buying Twitter was to re-host far right groups and outright fascists. Some people gave him the benefit of the doubt. But when Musk was anointed Trump’s “efficiency” czar and then hosted Alice Weidel of the German neo-nazi Alternative für Deutschland Party on X, people realized that the grandson of a fascist and the son of a fascistic eugenics enthusiast is himself a fascist. And they are looking for instructions for deleting their accounts on X – advice like this and this.

Ach nein! Was meinst Du denn? Weder von uns ist ein Nazi!

And ever since Mark Zuckerberg made his supplicant’s pilgrimage to Mar-a-Lago, plunked down an easy $1 million for Trump’s inauguration, and discontinued moderation of fascist hate speech on his now Führer-friendly platforms, people have been looking for instructions for leaving Meta too – instructions like this and this.

In general, it’s not a bad idea to stop helping these fascist-ready oligarchs make more money off you and gain an even greater foothold in government. You may not have as much power as they, but you DO have the power to get off their platforms.

Where else would I go?

If you worry that you won’t be able to find your friends online any longer, you might be pleasantly surprised to find some have already migrated to the far less toxic Mastodon and BlueSky Social networks, or found much more secure messaging in Signal as a replacement for WhatsApp.

But don’t stop with account deletion

Like the end of any toxic relationship, the breakup isn’t complete until you change the locks and block the calls and text messages.

Deleting accounts on X and Meta only ends your contributions to these toxic platforms. To completely pull the plug and cut the cord, you need to stop viewing content on them altogether and block their trackers and bots from continuing to access your devices through cookies, fingerprinting, and other forms of digital surveillance.

You can do this on a desktop (or laptop) by creating a hosts file that prevents your computer’s networking system from resolving the IP address of any X or Meta server. SwitchHosts is a host configuration program that runs on Windows, MacOS, and Linux and can be downloaded here. Once installed, you point SwitchHosts to collections of addresses of social networking servers you want to block. Several can be found here and here and here. You either download the lists and paste them into SwitchHosts or configure SwitchHosts to read and refresh the online lists automatically.

On both mobile devices and desktops you can accomplish the same objective by using a DNS server that will not resolve IP addresses for social networks you want to block. One such service is NextDNS.

Once you have created your own custom blocking profile with NextDNS, you then configure your mobile and desktop devices to use the profile. Your device will now resolve every IP address except for those of the services to be blocked.

The result is that, as far as your computer or mobile device is concerned, Twitter and Meta no longer exist.

Wouldn’t that be nice?

Stop Using Twitter and Facebook

If you wouldn’t vote for the fascist on the left, why are you using the fascist on the right’s social network?

Elon Musk purchased Twitter in 2022 and turned it from an already toxic platform into a white supremacist’s dream. Musk implemented schemes to gouge his customers, blocked third party developers from the Twitter API that had contributed to the platform’s success over the years, and invited back virtually every banned hate group you can think of. After renaming Twitter “X” it has now become indistinguishable from Parler, Gab, Trump Social, and it’s not that many goosesteps away from Stormfront. In joining the Trump administration, Musk intends to use his new position for personal gain despite the many conflicts of interest it poses. Just like Trump.

That other Trump-flirting social media mogul, Mark Zuckerberg, is not quite the Bond villain Musk is, but his four social media platforms operating under the grandiose title Meta (above it all) — Facebook, Instagram, WhatsApp, and now Threads — represent a social media monopoly dedicated to hoovering up as much of your personal data as they can get. Meta censors content and de-platforms users for the most obscure of reasons. Many users who posted criticisms of the Gaza genocide, for example, found themselves banned on several of Meta’s sites. Despite best efforts to keep your account private, Facebook will often “relax” your privacy settings without permission. If you use forwarding emails or phone numbers to preserve your privacy, Facebook will treat you like a criminal. Facebook’s registration process may even require you to hand over a photo of your driver’s license. In short, Meta is designed for one thing — to suck up as much of your personal data as it can for resale. You are the product Mark Zuckerberg is selling.

There are other options out there, though none are so popular as to make it possible for your long-lost high-school friends to find you. But if you want to share your views — or your cat pictures — you can try BlueSky, Mastodon, or Substack. Among others. That is, if you’ve had enough of censorship, violations of your privacy, and neo-Nazis.

Getting out

To delete your Twitter/X account, click the three-dot menu icon and on X’s left sidebar and choose Settings and privacy. From there choose Deactivate Your Account. To delete your Meta accounts, go here and delete Facebook, Instagram, WhatsApp, and Threads accounts through Meta’s Accounts Center.

Blocking the bastards

Deleting Meta and Twitter is one thing. Removing them permanently from your life is another. Both Meta and Twitter use cross-domain trackers to keep an eye on you even if you aren’t a user. There are browser extensions and tracker blockers you can install to try to prevent this, but they may not always work with all internet apps,

One way to stop all access to and from Twitter and Facebook is by blocking them at the domain name server level. On every desktop system there is a hosts file that can accomplish this by telling DNS to ignore certain websites, resulting in a refusal to resolve a domain name (like “www.facebook.com”) to its IP (internet) address.

One tool, available on Mac, Windows, and Linux, is Switchhosts, which makes it easy to safely edit the hosts file. You create a profile similar to this one and simply enable it in Switchhosts. No more Facebook or Twitter! Attempts by any of your internet apps to forward personal data will not be completed because they won’t be able to find the IP addresses of Facebook’s or Twitter’s trackers.

If you want to accomplish the same on your mobile devices, you can use a custom domain server that will do the blocking for you. One popular and currently free solution is NextDNS. You create an account, choose the social media networks you want to block, and NextDNS creates a profile for you. You then load the profile onto your mobile device, where it overrides your network settings and points to a custom DNS profile on NextDNS that is all yours.

Any time your browser or any other app tries to connect to the social media networks you want blocked, it’s as if the site simply doesn’t exist.

Which, in the best of all worlds, would be totally fine with me.

Social Networks

Social Networks

Aside from blogging I was never much of a social networking person, mainly because for the most part these platforms are angry places run by sociopathic billionaires who want to steal your personal data. However, I have recently begun to use a few social networks and for the most part they are civilized places that respect my privacy. Recently, several people have asked me about alternatives to Twitter. And Facebook’s founder just announced a social network called Threads. I decided to do a roundup of social networks I’ve tested. The list below focuses on social media for communicating short messages; consequently I didn’t mention Facebook, VKontakt, Telegram, Hive, LinkedIn, Reddit, TikTok, or other social media.

Twitter

Facebook was launched in 2004, and Twitter followed up two years later as a minimalist social network for posting 140-character messages. By 2023 Twitter had between 250 and 550 million users, while Facebook had nearly 3 billion users and its media-centric network, Instagram, had 2 billion.

In 2022 Elon Musk bought Twitter and set about almost immediately making it inhospitable for 3rd-party developers, anonymous readers, and even his own users whom he tried to gouge with monthly charges and verification fees. Adding injury to insult, Musk welcomed back Nazis, gay-bashers, and racists who had been banned, and Twitter quickly went from already-bad to worse.

As a result, Musks’s users have been defecting in droves to alternate social media sites like Mastodon, BlueSky, Post, Substack Notes, Spoutible, and Spill. And now Threads.

Threads

By now everyone knows that Meta (Facebook, Instagram, Whatsapp) just launched a Twitter competitor called Threads. Threads leverages Meta’s Instagram platform (and its two billion users) and within 48 hours Threads had attracted 70 million users.

Because of its rapid adoption, as well as the realization that Elon Musk is rapidly destroying his own vanity project, some are calling Threads a Twitter-killer. While that remains to be seen, Threads has enormous potential because Threads is literally built on top of Instagram and leverages Instagram’s 2 billion users.

I have been experimenting with Threads. It’s still pretty primitive. Since you can’t use Threads without an instagram account, you also can’t cancel your Threads account without deleting your Instagram account. Unlike Instagram, there is also no way to use Threads in a web browser. What you see in your feed is (rather annoyingly) determined by a Meta algorithm, not by you, and it seems half-finished in comparison to three other apps (Mastodon, Post, and Spoutible) I have been testing.

Commercial social media networks embody the adage: “if you’re not the customer, then you’re the product.” In other words, your data is the source of their profits. And the Threads app (like all Meta products) wants pretty much all your data. You can find a comparison of data collection practices of top social networks here.

Julia Angwin, who is both a keen observer of social media as well as an online privacy fanatic, wrote (on Mastodon), “Joined Threads but immediately regretting it. [Wired link].” A light-hearted faux advertisement poked fun at Thread’s privacy issues, which are serious enough that they will prevent Threads from being rolled out in the EU until it finally complies with European privacy laws.

Since I had never used Instagram before, I set up a new account, providing them with my email address and cell phone address. I used my real name and added a current photo of myself to my profile. I made one test post:

The next day I added some more contacts and received a surprising message:

I appealed their algorithm’s “decision” in the Zuckerberg Court of Appeals, and I prevailed:

I don’t have these sort of problems on other social networks. Overall, between the privacy risks, the lack of features, and the aggravations of dealing with an evil monopoly, I simply can’t recommend Threads.

But I’m sure people are going to love it because all their friends will be there.

Mastodon

Mastodon is a federated (clustered) network, distributed over thousands of privately-owned instances (servers). It has between 4 and 5 million users. Mastodon distinguishes between a local and a federated (global) feed. Another feed consists of all the people you follow, regardless of which instance they’re on. On Mastodon a Tweet is called a Toot. I have not found any reason to care which instance I’m on because I can follow people anywhere. And because Mastodon has been around since 2016 there are a surprising number of writers, journalists, and political commentators on the platform. But it’s not a place to follow your favorite actress or hockey player.

Besides Mastodon’s web interface, you can also choose between a large number of apps to use with it. On iOS alone you will find: the official client, Mastodon; Ivory, Ice Cubes; Mammoth; Metatext; Tooot; Tootle; Mona; Radiant; Toot!; Mastoot; Wooly; Trunks; Tusker; Mast; Manny; and Feather.

Mastodon, silly name notwithstanding, is still the most democratic and privacy-conscious platform today. However, at the moment it lacks encrypted DM’s (direct messages), a feature supposedly in development.

BlueSky

BlueSky is the brainchild of Jack Dorsey, who created Twitter and has much the same political views as Elon Musk. I can’t tell you much about it because I am still waiting for an invitation to join. BlueSky is still in very early stages, although mobile apps are available. Users who have experienced the site say it’s less toxic than Twitter. However, given Dorsey’s politics and his reticence to moderate right-wingers, it probably won’t be long before BlueSky follows Twitter’s path. Let’s not forget that Twitter under Dorsey was a MAGA paradise even before he sold it to Elon Musk.

Post

Post has a nice design and has focused on recruiting journalists and writers to its platform. Post’s monetization scheme is based on selling journalistic content for points, although you don’t have to use points for most interactions. Post offers an app, although at present it is very basic. Post has fewer privacy risks than Twitter or any of Meta’s products. Post is a great place to have informed and civilized discussions since there is a notable absence of unhinged haters on the platform.

Substack Notes

Substack is a great blogging platform and there are many excellent blogs on the platform. By the same token, since Substack is politically neutral, there are also many you might not care to read, depending on your taste and politics. Substack makes its money by sharing profits with authors of monetized content. However, many blogs do not enable the monetization feature. While Substack has always offered commenting on individual posts, it now offers the ability for Substack subscribers to post messages for all Substack content creators using a new feature called Notes. I have posted a few Notes but have not found the feature to be all that useful. Bloggers would actually find it more useful for Substack to provide hooks to re-post content to other social media.

Spoutible

Like Elon Musk, Spoutible’s founder Christopher Bouzy is a cantankerous guy who picks fights with his critics. Spoutible is in early stages of development, but has a beautiful design and its community is friendly. And Bouzy has promised to keep it that way, as well as moderating any kind of content of a remotely sexual nature. There is presently no app, so I don’t know what its privacy risks are, but I commend Spoutible for their encrypted DM’s (direct messaging). Mobile apps for Android and iOS are reported to be coming out this month.

Spill

Another interesting alternative that has popped up is Spill, sometimes described as Black Twitter. Spill is the creation of Alphonzo “Phonz” Terrell and DeVaris Brown, two young Twitter veterans. Spill’s user interface is unlike any other, and its terminology is different as well. The app uses spill for post, sipping for following, and serving for being followed. Fresh Tea is a live feed from everywhere, while My Brew is a feed of everyone you’re sipping. Because the app’s conventions are unique, I initially had difficulties getting around but ultimately I got the hang of it.

Spill is still a work in progress. For example, it’s impossible to paste text plus a URL into Spill, which many people do when commenting on an online article. I found I could only enter the text and URL separately, which is rather cumbersome. Perhaps this is by design, but the result is that most spills are short thoughts or observations. There is also no web app at the moment, which the developers promise to rectify shortly.

The vibe on Spill is quite different from other social networks. Black vernacular is the lingua franca on Spill. Many of the users are well-known Black journalists, authors, professors, and social activists, but you might not even know it because frequently these self-aggrandizing details are not mentioned in the profiles (although it’s possible). Rather than exploiting the opportunity to network professionally, Spill is clearly a more personal, safe, Black space where folks are just sharing their thoughts and feelings in ways that are most comfortable and fun.

Avoiding one peril of blogging

### Introduction

Of all the perils of blogging, it’s not the people who send you hate emails that are dangerous: it’s the copyright trolls — and also their occasionally legitimate cousins. I recently got slapped with a legitimate charge for inadvertently using a copyrighted image. If anyone sends you a bill of this sort, verify that in fact they represent the agency they claim to represent. In my case, I called Reuters and determined that the agency that had billed me was, in fact, legit. Here, then, is my advice on how to avoid improperly using copyrighted images on your website. I will assume most readers are running WordPress which purportedly powers 40% of the web.

### Getting legal images

There are plenty of collections of stock images you can use under Creative Commons licenses. Most are generic images, perhaps a little bland, and may not be the type of image you are looking for, or they may require rooting around dozens of collections of stock images. An alternative is to use Google image search — as you may already be doing — but to use the **advanced image search**: https://www.google.com/advanced_image_search Now, for example, let’s search on “black lives matter” and move the cursor down to the bottom next to “Usage rights” where we’ll select Creative Commons licenses: ![img](https://www.ehrens.io/wp-content/uploads/2021/03/search-1.png) This should bring up some images licensed under Creative Commons which we can use **with attribution**. I’ve circled one that we’re going to use as an example: ![img](https://www.ehrens.io/wp-content/uploads/2021/03/search-2.png) To properly attribute an image this is an excellent guide: https://www.pixsy.com/academy/image-user/correctly-attribute-images/ Our strategy will be to place all the copyright attribution information we need right in the caption of the WordPress image in the WordPress Media Library (more on this in a minute). For this we need **six pieces of information**. We can usually track it all down from the image details provided by Google. Remember: **you must provide attribution to prove your use is legit!**![img](https://www.ehrens.io/wp-content/uploads/2021/03/search-3.png) Here’s the information we found:

– Caption: Black Lives Matter – We Won’t Be Silenced
– Link to caption: https://www.flickr.com/photos/59952459@N08/28113568721
– Author: Alisdare Hickson
– Link to author: https://www.flickr.com/photos/alisdare/
– License: CC BY-NC 2.0
– Link to license: https://creativecommons.org/licenses/by-nc/2.0/

### Attributing an image

Attributing an image is a bit of a pain but it’s got to be done. To make life easier, I developed a [script](https://www.ehrens.io/wp-content/uploads/2021/03/caption.sh) on my Mac. You should be able to use it on your Mac or a Linux system, or adapt it for Windows command line:

“`
#!/bin/bash # this is a Unix & MacOS script that will generate the correct HTML
# for your WordPress image caption. CAPTION=”Black Lives Matter – We Won’t Be Silenced” CAPTIONLINK=”https://www.flickr.com/photos/59952459@N08/28113568721″
AUTHOR=”Alisdare Hickson”
AUTHORLINK=”https://www.flickr.com/photos/alisdare/”
LICENSE=”CC BY-NC 2.0″
LICENSELINK=”https://creativecommons.org/licenses/by-nc/2.0/”
echo ” “$CAPTION”, by $AUTHOR, licensed under $LICENSE” > caption.txt open caption.txt
“`

The script [produces a text file](https://www.ehrens.io/wp-content/uploads/2021/03/caption.txt) called *caption.txt* which you can open and use for cut and paste:

“`
“Black Lives Matter – We Won’t Be Silenced”, by Alisdare Hickson, licensed under CC BY-NC 2.0
“`

### Media Library

In WordPress, add the downloaded image to your Media Library and also add the title and the generated caption code above to the image’s metadata. The generated code above will go in the **Caption field**: ![img](https://www.ehrens.io/wp-content/uploads/2021/03/media-1.png) Now that the nightmare is over **you can use the image in any WordPress post or page**, and the caption (which is now fully attributed) will follow the image to whatever post in which you use it: ![img](https://www.ehrens.io/wp-content/uploads/2021/03/media-2.png)

### What about my existing images?

If you are using a bunch of images that could turn around and bite you later, delete them.

1. Go into your media manager and **delete the images**.
2. This **will break some of the image links** on pages or posts that are using the images. **But no worry! We can fix it!**
3. Install the **Broken Link Checker plugin** in WordPress
4. Run Broken LInk Checker to scan all your links and then “unlink” any deleted images that broke links in the pages or posts.

![img](https://www.ehrens.io/wp-content/uploads/2021/03/broken-link-checker.png)

### How to check questionable images

You may still need to check some of the images you did not delete but believe **may be** safe to use. There are two ways that I know of to check an image:

##### Google Reverse Image Search

![img](https://www.ehrens.io/wp-content/uploads/2021/03/reverse-1.png) https://www.google.com/imghp?hl=en&ogbl If we upload the image we were just looking at we can find all sorts of uses of it all over the internet. You may have to dig through all the images to find the owner’s version: ![img](https://www.ehrens.io/wp-content/uploads/2021/03/reverse-2.png)

##### TinEye

![img](https://www.ehrens.io/wp-content/uploads/2021/03/tineye-1.png) https://tineye.com/ Searching with **TinEye** produces a similar list of places the image can be found, but also information on whether it is a stock image or not: ![img](https://www.ehrens.io/wp-content/uploads/2021/03/tineye-2.png)

Weakened Encryption

In a recent piece, American Enterprise Institute opinion-shaper Claude Barfield (“Encryption: the next battle between security and privacy”) wrote of the demands that spy agencies are making on tech companies to provide back-doors and weakened encryption.

Barfield poses the issue as a “conflict” between tech companies and government – not as one more violation of the 4th Amendment, which provides for “the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures” – and not as something that an ordinary citizen might have an opinion about.

While Apple and Google are actually stepping-up their use of encryption, Barfield writes that FBI directory James Comey’s is demanding neutered encryption. Barfield repeats Assistant FBI director Michael Steinbach’s unproven assertion that terrorist groups are “going dark” with all this great, new encryption.

First of all, some facts.

Terrorist groups did not suddenly discover encryption after Edward Snowden spilled the beans on blanket surveillance of U.S. citizens. Long before ISIS, Al Qaeda often used couriers instead of cell phones and internet chatter. When Osama bin Laden was finally discovered, he was totally off the grid, as had been his practice for over a decade.

Jihadists understand technology – and its weaknesses – quite well.

9/11 mastermind Mohamed Atta was an architectural engineer. Khalid Sheikh Mohamed had a degree in mechanical engineering. Two of the three founders of Lashkar-e-Taibi, the group behind the Mumbai attacks, were professors at the University of Engineering and Technology in Lahore. Two thirds of the 25 9/11 hijackers were engineers.

One study by sociologists Diego Gambetta and Steffen Hertog in the UK, which looked at 400 jihadists, found that an astounding sixty percent of Western-born jihadists have engineering backgrounds.

If you can build a bridge or fly a jet into the Pentagon, using encryption is a piece of cake.

Flashpoint Partners, an intelligence firm concentrating on Middle East terrorism, reported recently that “there is very little open source information […] that Snowden’s leaks served as the impetus for the development of more secure digital communications and/or encryption by Al-Qaida.”

In fact, jihadists were developing their own encryption software almost a decade ago – long before Snowden’s revelations in 2013.

“Asrar al-Mujahideen,” a PGP-like program launched in 2007, uses both public and private keys to securely send files and messages.

An October 2010 article in Al-Qaida in the Arabian Peninsula”s (AQAP) English language magazine”Inspire” cautioned readers to use encryption.

And on February 7, 2013, right before the Snowden story broke, a new encryption tool, “Asrar al-Dardashah,” was developed, which allowed secure communications to be sent over Google Chat, Yahoo and other messaging services.

But aside from spy agency fear-mongering and lies there is a better reason to reject back-doors in OUR computer products.

The recent Chinese attack on US government computers, which compromised four million federal employees’ personal information, is precisely why weakened security should NOT be baked into the security cake. If a sophisticated and determined nation-state can attack computer security, why design it with vulnerabilities?

This was published in the Standard Times on June 11, 2015
http://www.southcoasttoday.com/article/20150611/opinion/150619892