Is 11 Feb 2014 The Day We Fight Back? by Mark Stockley.
From the post:
Appalled with government surveillance without oversight? Sick of having your privacy invaded? Numb from stories about the NSA? If you are, you’ll have had many more bad days than good since June 2013.
But today, just perhaps, could be one of the better ones.
Mark covers the general theme of protests quite well and then admits, ok, so people are protesting, now what?
Lacking a target like SOPA, there is not specific action to ask for or for anyone to take.
Or as Mark points out:
Who do we lobby to fix that situation [government surveillance} and how will we ever know if we have succeeded?
I put it to you the government(s) being petitioned for privacy protection are the same ones that spied on you. Is there irony that situation?
Is it a reflection on your gullibility that despite years of known lies, deceptions and rights violations, you are willing to trust the people responsible for the ongoing lies, deceptions and rights violations?
If you aren’t going to trust the government, if you aren’t going to protest, what does that leave?
Fighting back effectively.
Mark points out a number of efforts to secure the technical infrastructure of the Internet. Learn more about those, support them and even participate in them.
Among other efforts, consider the OASIS PKCS 11 TC:
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 standard for ease of use in code libraries, open source applications, wrappers, and enterprise/COTS products: implementation guidelines, usage tutorials, test scenarios and test suites, interoperability testing, coordination of functional testing, development of conformance profiles, and providing reference implementations.
The updated standard provides additional support for mobile and cloud computing use cases: for distributed/federated applications involving key management functions (key generation, distribution, translation, escrow, re-keying); session-based models; virtual devices and virtual keystores; evolving wireless/sensor applications using near field communication (NFC), RFID, Bluetooth, and Wi-Fi.
TC members are also designing new mechanisms for API instrumentation, suitable for use in prototyping, profiling, and testing in resource-constrained application environments. These updates enable support for easy integration of PKCS #11 with other cryptographic key management system (CKMS) standards, including a broader range of cryptographic algorithms and CKMS cryptographic service models. (from the TC homepage)
Whatever security you have from government intrusion is going to come from you and others like you who create it.
Want to fight back today? Join one of the efforts that Marks lists or the OASIS PKCS 11 TC. Today!