Ajit Pai: the person who could spoil the open net

The FCC chairman main net neutrality rollback is a former Verizon employee and whose perspectives on regulation echo the ones of broadband organizations
Ajit Pai, the chairman of the Federal Communications Commission, has a reputation as speaker who recalls co-workers’ birthdays and their youngsters’ names.

Give Us Life

After trolls targeted him on Twitter, he took it in exact humor, collaborating in a video wherein he examined and replied to “simply tweets.”

Pai, a forty four-yr-old Republican lawyer, is spearheading the Trump management’s regulatory rollback of internet neutrality protections.

Image result for News

Trump’s ‘war on the open net’: tech firms be part of day of action for internet neutrality

 

RELATED ARTICLES :

As the comic John Oliver puts it: “ISPs should now not be capable of engaging in any fuckery that limits or manipulates the alternatives you are making online.”

In February 2015, the Federal Communications Commission (FCC) voted to extra strictly adjust ISPs and to enshrine in regulation the concepts of internet neutrality. The vote reclassified wi-fi and glued-line broadband carrier companies as name II “commonplace companies,” a public application-kind designation that offers the FCC the capability to set rates, open up get admission to competition and more carefully adjust the industry.

But Trump’s FCC, with Pai at the helm, desires to repeal the regulations.

Pai changed into nominated for a Republican birthday celebration role on the FCC with the aid of Barack Obama in 2011 and became reconfirmed through the United States Senate in 2o12. After his four-year term, Donald Trump made Pai the chairman of the FCC, where he’s been an advocate for less law.

Ajit Pai and the over-sized mug he described as “infamous.”
Pai argues that if the US added sturdy internet neutrality protections, authoritarian states could have an excuse to clamp down on line freedoms – despite the fact that authoritarian states don’t want an excuse to achieve this. He also says that regulation must most effective be implemented if there’s a marketplace failure. However, as Pai has said, “Nothing is broken, ” and the regulations had been hooked up on “hypothetical harms and hysterical prophecies of doom.”

Beyond that, he argues that the broadband market is greater competitive than the search engine market, despite the fact that seventy-six% of human beings have either 0 or one fixed ISP presenting enterprise-fashionable broadband speeds. Google would possibly have a large market proportion, but there are numerous other options to be had to anyone with an internet connection. Many Americans have simply one option for his or her home broadband provider.

Pai’s perspectives echo those of the large broadband corporations. That might have something to do with the big sums AT&T, Comcast and Verizon throw towards lobbying, collectively spending $11m in the first area of 2017.

The huge telecommunications organizations also argue that the policies are too heavy-surpassed and could stifle funding in infrastructure – despite the fact that they say the opposite while speakme to their buyers. Instead of being regulated like utilities, these corporations say they’d favor to self-alter till internet neutrality protections may be surpassed by Congress.

That hasn’t worked out properly for clients so far: at some stage in negotiations with Netflix in 2014, Comcast and Verizon throttled streaming speeds by way of up to 30% on common – till Netflix determined to cough up cash via “paid prioritization” offers. These varieties of offers have been scrapped beneath the 2015 law. Internet vendors have also given technical advantages to their very own streaming offerings, as AT&T did with DirectTV in 2016.

Pretty a great deal all of us outside the massive cable companies supports the FCC’s internet neutrality policies. In an uncharacteristic display of unity, big companies together with Amazon, Google and Facebook have joined forces with smaller companies along with Reddit, Netflix, Vimeo and Etsy and activists such as the Electronic Frontier Foundation, the ACLU and Demand Progress to protest the proposed rollback. They are some of the two hundred agencies to participate in an afternoon of action on 12 July in an try to get their customers to touch Congress and the FCC and demand that internet neutrality is included.

“Ajit Pai may think large cable’s pursuits are more important than the public’s. However, the day of action makes it clean that few outdoor the boardrooms of Comcast or AT&T agree,” stated Pierce Stanley of Demand Progress. “A majority of Americans aid net neutrality, and their voices will be heard loud and clear while we take again the internet from Pai and his cronies.”

After Wednesday’s day of action, members of the public can have until 18 July to send feedback to the FCC. Replies to the one’s remarks are due using sixteen August, after which the FCC will make a final decision.

That capitalism has enabled the rise of “winner takes all” corporations, in which Google and Facebook get extra than 70% of all US online marketing spending, and are growing that proportion. Tick off some names – Google, Facebook, Snapchat, Twitter – and you’ve got the names of the groups whose systems control nearly all of what you notice online.

There are driving forces in the back of any internet corporation: first, seize an enormous target audience that relies upon for your service. Second, parent out a way to make money from them. Ultra-increase often comes from breaking the usual guidelines of business (especially the preliminary want to make an income) and exploiting loopholes in, or simply ignoring, the law. Many agencies function with an underlying assumption that the law by some means doesn’t observe to the internet; some of businesses have observed belatedly that it truly does, from Napster (shut after court docket rulings) to TV re-broadcaster Aereo (shut down after the US ideally suited courtroom ruling) to Airbnb (reined in by using nearby rental regulations) to Uber (reined in by city shipping regulations).

With the energy of on line transparency, together we are able to beat faux news

Last 12 months we noticed a proliferation of disinformation on-line. “Fake news” websites interfered with political discourse and sentiment around the world. Filter bubbles restricted our perspectives. Oxford Dictionaries named “post-truth” its global word of the 12 months. As we commenced 2017, we heard new terms, together with “opportunity information.”

Global Amend

‘Post-truth’ named phrase of the 12 months with the aid of Oxford Dictionaries
Read extra
It’s tempting to marvel: is this the beginning of the give up of reliable records? Were the hopes for an open and inclusive net out of place? Is this the dark age of the net?

The spread of false statistics on-line is an actual danger. The decline of our truth base undermines our capability to have meaningful conversations and resolve problems across the globe.

Image result for News

But the net has continually been a messy and complex region. Users have long ranged from the ones committed to locating and sharing reality to those purpose on pranks, vandalism and worse. Instead of faux news articles in your cousin’s social media feed, the Nineteen Nineties saw your older relatives sooner or later get on line, simplest to begin emailing the whole circle of relatives hoaxes with “Fwd: Fwd: Fwd: Fwd:” in the issue line. Yesterday’s fake information traveled thru electronic mail because that’s the main way human beings communicated on line.

 

RELATED ARTICLES :

The net has usually been an area for experimentation and ingenuity. Its power comes from its individuals. For every harmful action on-line, there are endless superb contributions via people seeking to connect with one another, express themselves, and extend our shared knowledge base.

I’m an optimist. I had to be to begin Wikipedia, a project that sounded impossible sixteen years ago. How should we get thousands and thousands of people to work collectively, across borders and perspectives, without pay, to construct a reliable, correct encyclopedia? But it worked.

Kellyanne Conway and Steve Bannon.
Facebook Twitter Pinterest
Kellyanne Conway and Steve Bannon. Photograph: Joshua Roberts/Reuters
The query is: how will we, as clients and establishments, reply?

In restoring our not unusual truth base, legacy media companies (newspapers, television networks, e-book publishers) have an important position to play. Venerable journalistic establishments have extraordinary reporting, studies and advertising resources at their disposal, and ought to redouble their efforts to remain relied on public mediators of what’s proper. Given the ideological polarization of the media and clear out bubbles on social media, that is a tall order.

Fake information websites apparently evolve overnight. Many have the equal format style as valid newspaper web sites but lead with alarming headlines that bait readers to click on and right away proportion. Even if they don’t realize the supply with the aid of call, the visuals can make appearance legitimate enough for a casual reader now not to notice.

 

Sign as much as the Media Briefing: news for the news-makers
Read more
In this messy age, we need new equipment to distinguish fact from falsehood throughout the virtual sprawl. Many social and digital platforms are looking to address the problem with the aid of creating algorithms that may become aware of faux sources, but what’s lacking from this answer is the human detail.

Everyone can agree that social structures need to do some thing when falsehoods are being shared tens of millions of instances. However, none folks are comfy with the social media giants determining what’s valid or now not. It’s impossible to automate the process of isolating fact from falsehood fully, and it’s dubious to cede such control to for-profit media giants. What’s needed is human answers that rely no longer simply on third-party truth-checking bots but at the electricity of collaboration. We want people from throughout the political spectrum to assist become aware of bogus websites and factor out the faux news. New structures must be evolved to empower individuals and groups – whether or not as volunteers, paid a body of workers or each.

To faucet into this energy, we want openness. Consider the open-source software movement. Beginning in the Eighties, communities of software program developers released code below open licenses that allowed other developers to get right of entry to, reuse and enhance code, leading to innovation at scale. Open supply showed us that, because the developer Eric Raymond placed it, “given enough eyeballs, all insects are shallow.” Today, a number of the sector’s maximum popular technologies are open source.

Why America elected Trump
Wikipedia has some training to offer the builders of recent systems. Its editors sift through the online cacophony to distinguish reliable assets from individuals who site visitors in falsehoods. They produce huge quantities of correct content thru an open model. Anyone inside the international can add material to articles; absolutely everyone can task that cloth and start a discussion. This means extra eyeballs on more data and extra duty. No count number what their political leanings, editors need to play by the identical guidelines in developing, refining and reality-checking content material: verifiability, neutrality, and no authentic research. On the discussion pages at the back of every article, differing viewpoints are displayed.By being uncovered to this process, people can grow to be more balanced and statistics more dependable through the years. A recent Harvard Business School take a look at located that with extra revisions and moderators volunteering at the platform, bias and inconsistencies wore away and that editors tend to come to be less biased over the years.

By being uncovered to this process, people can grow to be more balanced and statistics more dependable through the years. A recent Harvard Business School take a look at located that with extra revisions and moderators volunteering at the platform, bias and inconsistencies wore away and that editors tend to come to be less biased over the years.

The upward thrust of the net may additionally have created our current predicament, but the folks who populate the net can help us get out of it. Next time you go back and forth with a person over a controversial difficulty on-line, keep on with statistics with accurate assets and interact in the open communicate. Most importantly, be high-quality. You may additionally turn out to be being a small a part of the process whereby records chaos becomes understanding. And you’ll be helping get rid of faux information at the same time.

Why the internet neutrality protest subjects

Companies along with Facebook, Google, and Amazon, will band together for a day of motion against a chance to the open net. So what’s the large deal?

About two hundred net businesses and activist organizations are coming together this week to mobilize their users into opposing US authorities plans to scrap net neutrality protections.

Globe Inform

The internet-extensive day of movement, scheduled for Wednesday 12 July, will see groups inclusive of Facebook, Google, Amazon, Vimeo, Spotify, Reddit, and Pornhub notify their customers that internet neutrality – a founding principle of the open internet – is beneath assault. The Trump administration is trying to overturn Obama-technology law that blanketed internet neutrality, and there is much less than per week left for humans to object.

Just because the net got here together in a blackout to protest against the Stop Online Piracy Act (Sopa) in 2012, many web sites will on Wednesday function a distinguished message on their homepage, showing traffic what the net could appear to be with out net neutrality and urge them to touch Congress. But what exactly is internet neutrality, why is it below threat, and what can individuals do to protect it?

Image result for News

What is internet neutrality?

Sign up to the Media Briefing: news for the news-makers
Read more
Net neutrality is the idea that net service companies (ISPs) treat all and sundry’s data similarly – whether that’s an e mail out of your mother, a financial institution switch or a streamed episode of The Handmaid’s Tale. It manner that ISPs don’t get to choose which records is despatched more quickly, and which sites get blocked or throttled (as an instance, slowing the transport of a TV show due to the fact it’s miles streamed by means of a video company that competes with a subsidiary of the ISP) and who has to pay more. For this motive, a few have described net neutrality because of the “first modification of the net.”

“Net neutrality is largely the precept that maintains the internet open. Without it, huge cable corporations will be capable of gradual down certain websites and select winners and losers on the internet,” said Mark Stanley from Demand Progress, one of the activist corporations organizing the day of action.

Why is net neutrality below hazard?
In February 2015, the Federal Communications Commission (FCC) voted to greater strictly modify ISPs and to enshrine in regulation the principles of net neutrality.

The vote reclassified wi-fi and stuck-line broadband provider vendors as identifying II “common providers,” a public utility-type designation that offers the FCC the capacity to set costs, open up access to competition and more closely modify the enterprise.

Net neutrality is the precept that maintains the net open. Without it, large cable businesses can pick winners and losers
Mark Stanley, Demand Progress
“The internet is the maximum effective and pervasive platform on earth,” stated FCC chairman Tom Wheeler on time. “It’s simply too vital to be left without guidelines and a referee on the sphere.”

Two years on, Trump’s new FCC chairman, Ajit Pai, a former Verizon lawyer, has driven to overturn the 2015 order. On 18 May, the FCC voted to aid a brand new concept that might repeal the order and commenced a 90-day duration in which individuals of the general public should remark. The deadline for feedback is 17 July, and then the FCC has to provide respond comments with the aid of sixteen August, before a final vote later within the year.

 

Many purchasers aid the rules to guard the openness of the internet. Some of them may additionally have been swayed by using Last Week Tonight host John Oliver, who mentioned that “there are multiple examples of ISP fuckery over time” – so restrictions are vital.

Publicly, however, the message is specific. Verizon launched an ordinary video insisting that they had been not seeking to kill net neutrality regulations and that seasoned-internet neutrality companies are the usage of the problem to fundraise.

Comcast additionally released a Twitter campaign insisting it supported net neutrality.

The new FCC chairman argues that the 2015 policies have been set up on “hypothetical harms and hysterical prophecies of doom” and that they’re commonly awful for business.

“It’s fundamental economics. The extra closely you regulate some thing, the much less of it you’re likely to get,” he stated.

The large broadband groups publicly kingdom they’re quibbling the name II “‘not unusual carrier’” designation in preference to internet neutrality according to se. They accept as true with they shouldn’t be regulated within the identical way that telecommunications offerings are, and like the light-touch law they would otherwise be a concern to below their preceding title I designation of the Telecommunications Act of 1996. The FCC lacks the direct authority to alter name I “statistics offerings”.

Who is at the back of the day of movement on 12 July?
Fight for the Future, Free Press Action Fund and Demand Progress have teamed as much as create the Battle for the Net marketing campaign. They have signed up almost two hundred contributors within the day of action, and created explainer films, banner commercials, equipment and suggested messaging for communicating with customers en masse approximately why internet neutrality subjects.

Facebook Twitter Pinterest
Why internet neutrality subjects.
How does this tie into Trump’s method to the internet?
Trump’s Republican celebration is friendly to huge groups – despite the fact that it results in the unfettered accumulation of company electricity.

 

Here’s how to shield your net browsing statistics now that it is for sale
Read more
It’s the second one primary rollback of Obama-technology internet protections. In March, Congress voted to permit ISPs to sell the browsing habits in their clients to advertisers. The circulate, which critics rate will essentially undermine consumer privateness inside the US, overturned policies drawn up through the FCC that could have given human beings extra manipulate over their non-public statistics. Without the regulations, ISPs don’t need to get humans’ consent before promoting their records – such as their surfing histories – to advertisers and others.

China blocks WhatsApp offerings as censors tighten grip on internet

Photo, video and voice messages have all been censored even though textual content messages the use of the Facebook-owned app are becoming thru
Users of WhatsApp in China and protection researchers pronounced the provider partially blocked via government.
China has in part blocked the popular messaging provider WhatsApp, as authorities tighten their grip at the net ahead of a first-rate leadership reshuffle in Beijing.

Graet Gossip

Photo, video and voice messages sent by using the Guardian from Beijing have been all blocked on Wednesday, but text messages had been now not affected. Dozens of customers in China complained of a complete ban on sending any form of messages on WhatsApp.

The block regarded sporadic, much like when Chinese government first banned Google’s Gmail in 2014 earlier than instituting a complete blackout.

Image result for News

China’s ocean burial of Liu Xiaobo backfires as activists degree sea protests
Read extra
The ban comes as Chinese officials are preparing for a twice-a-decade management shuffle later this 12 months, with diverse factions within the Communist party jockeying for control of key positions and president Xi Jinping possibly to also consolidate power.

 

RELATED ARTICLES :

The business enterprise declined to remark.

China operates the arena’s largest censorship system, called the Great Firewall, blocking heaps of web sites including popular structures inclusive of Facebook, Google, Instagram, YouTube and a host of foreign news shops.

Xi, who came to power five years ago, has driven for tighter government controls on what information Chinese citizens inside the united states of america can access inside the name of “cyber sovereignty.” Recent months have visible Beijing restriction stay streaming video apps, on-line video content, superstar information, and VPNs.

In China, WhatsApp pales in reputation in comparison with homegrown messaging service WeChat, which boasts extra than 900m users. But the American app is increasingly more being utilized by Chinese involved approximately privacy or those speaking with friends or commercial enterprise contacts abroad.

While WhatsApp encrypts all messages, WeChat conversations are automatically monitored.

“By blocking off WhatsApp, the government have close down one of the few closing free and encrypted messaging apps, however, extra importantly, they have also limited the capability for Chinese to have personal conversations with their peers,” a Chinese censorship researcher acknowledged most effective through the pseudonym Charlie Smith, said in an e mail.

“While the internet freedom network continues to increase specific and revolutionary circumvention gear we’re doing very little to fight the climate of worry that Xi Jinping has manufactured in China.”

Before this week’s ban, WhatsApp changed into the only carrier owned with the aid of Facebook nevertheless reachable within China. The popular social network was blocked considering ethnic riots in China’s ways west in 2009, and Instagram was banned in the course of seasoned-democracy protests in Hong Kong in 2014.

Mark Zuckerberg, the Facebook boss, has made an excessive-profile push to get the organization’s offerings unblocked, showering praise on Xi and different Chinese officials, but has little to reveal for his efforts up to now.

Chinese authorities formerly blocked messaging app Telegram after it has become popular with the united states’ human right legal professionals.

The death of jailed Nobel peace prize laureate Liu Xiaobo last week also sent censors into overdrive, as they scrambled to block any commemorations on social media, even accomplishing into private messages on WeChat to block content.

Net neutrality, which a few have described because of the “first modification of the net,” is the concept that net provider vendors (ISPs) deal with all people’s records similarly – whether that’s an e-mail out of your mother, an episode of House of Cards on Netflix or a financial institution transfer. It approaches that cable ISPs inclusive of Comcast, AT&T or Verizon don’t get to pick out which records are sent more speedy and which web sites get blocked or throttled primarily based on which content carriers pay a premium.

The son of Indian immigrants who got here to the US to paintings as docs in rural Kansas, Pai went to Harvard University, where he studied social research earlier than getting his regulation degree from the University of Chicago. Aside from his two years working as associate general suggest at Verizon, Pai has spent most of his career in authorities.

The regulation does no longer should be oppressive; achieved nicely, it may be a wonderful articulation of who we are and what we price. But to succeed, we’re going to need a much extra nuanced communication than we’ve had to this point – one in which both politicians and the tech enterprise paintings more difficult to recognize every other and realize their responsibilities.

That means no more kneejerk “enough is enough” guidelines from the political international, and no greater wriggling out of tax bills or worker rights from tech. If we integrate our civic society, prison, educational, enterprise and technical knowledge, we can set a general for the world. But we want to act now, or else we’ll lose manipulate of our digital destinies

Chinese censors were able to block messages and pix in actual time despatched in non-public one-on-one chats in WeChat, consistent with a document by the University of Toronto’s Citizen Lab.

“Concerned that martyrdom round Liu may additionally spur comparable collective motion, as well as being involved in saving face, the knee jerk reaction of China’s authorities is to quash all public dialogue of Liu, which in today’s global translates into censorship on social media,” Ronald Deibert, director of Citizen Lab, wrote in a blog submit.

China plans to dam “unauthorized” digital personal networks, or VPNs, a commonplace device to stay away from censorship, beginning in February 2018 and numerous home carriers have already been forced to close down.

Global community of ‘hunters’ aim to take down terrorists on the internet

Group of volunteers obsessively tracks and reviews Isis’s maximum outstanding recruiters and propagandists, and attempts to block the unfold of their propaganda
The Hellfire Club is made of about a dozen members based in the US, Europe, Middle East and Indonesia who speak thru a private Twitter organization.

Colonel Kurtz used to spend hours gambling social video games like Farmville. Now he hunts terrorists at the net.

Graet Intelligence

Counter-terrorism become by no means intended to be Silicon Valley’s process. Is that why it is failing?
Read extra
The pseudonymous forty one-year-antique, who runs his production corporation, is one of the dozens of volunteer “hunters” to dedicate hours every day looking to become aware of and infiltrate terror businesses online and block the spread of their propaganda.

“We’re looking to shop lives and get this crap off the net to maintain the following prone child from seeing propaganda and thinking it’s cool,” stated Kurtz.

 

RELATED ARTICLES :

Image result for News

These hunters plug a gap in social media agencies’ capability to preserve terrorists off their networks by obsessively tracking and reporting Isis’s maximum outstanding recruiters and propagandists across personal messaging apps like Telegram and WhatsApp and public networks like Twitter, Facebook, and YouTube. Some of them also provide valuable tip-offs of credible threats to law enforcement.

This kind of hunting originated in 2014 when hacktivist collective Anonymous declared “warfare” on Islamic State with the #OpIsis campaign. The loosely affiliated military of digital activists set out to reveal and document Isis supporters on social media and hack or take down their websites.

Kurtz has become a hunter following the November 2015 Paris assault. He was watching the France-Germany friendly soccer healthy on the line when it turned into disrupted with the aid of loud explosions. That day seven attackers executed mass shootings and suicide bombings that killed 129 people in France’s capital.

After writing an angry Facebook put up about the attack, Kurtz became contacted by a pal and member of Anonymous asking if he’d want to assist out with #OpIsis. “It took me some days to discern matters out, and after a few weeks I was dropping debts like flies,” he stated.

Out of Anonymous’ #OpIsis, there have emerged more taken into consideration, prepared groups such as Ghost Security Group, KDK and a “drama and ego-free” organization that Kurtz fashioned in 2016 upon getting uninterested in the Islamophobia and inaccuracy inside the operation.

 

Kurtz believes he and his fellow hunters are far extra skilled than the algorithms and low-paid content material moderators utilized by the era corporations. Because they tune terrorist pastime throughout platforms, they can see how the identical gamers pop up time and again underneath unique user names, alerting their disciples to their new online personas through personal messaging apps.

The hunters’ claims are verified by using the truth that intelligence groups ask them for assist in identifying jihadists, which includes an Indian radical who turned into living in Raqqa and going by the name Winds of Victory. “I found him on Telegram in 5 mins,” said Kurtz.

“I’m no longer going to mention we’re Delta Force or Seal Team 6. However, our men are going deep undercover,” he said.

 

The Resistance Now: Sign up for weekly information updates about the movement
Read more
Sometimes it’s now not difficult at all. On Twitter, for example, jihadists will create new money owed with the identical username and some indicating the “model” of the account. So if @jihadi_144 is taken down, he or she can pop up with @jihadi_145 minutes later. One Isis spokeswoman, known as Aisha, has had extra than four hundred money owed to date.

“A lot of what goes on in the social media organizations is rhetoric,” said Eric Feinberg, a protection researcher and member of the Hellfire Club. “They aren’t correlating the data as we do.”

Feinberg has evolved software program to pick up communications strands and behavioral styles used by Isis across one-of-a-kind platforms. He’s exasperated using the social media businesses’ lack of action.

“Are you telling me they can parent out if there’s an Isis logo inside the profile of a YouTube account or Facebook account?”

Within the larger searching community, there’s a clear divide: individuals who believe they want to collaborate with law enforcement and people who, within the spirit of Anonymous’s anarchic, anti-capitalist origins, call such collaborators “fed fags.”

“Once you go the threshold from Anonymous to operating with the feds, you have to place your big boy pants on,” said Quev, another Hellfire Club member. “Otherwise what are you certainly doing? Getting tweets taken down.”

“There isn’t any way to do some thing significant with out collaborating with law enforcement – something else is just infant’s play,” said the terrorism analyst Michael Smith, who has studied Islamic extremists’ use of social media for years and who has near ties to several authorities agencies.

Smith helped a few credible corporations along with Ghost Security Group establish factors of touch with authorities officers. These hunters come to be “pocket resources” for federal investigators, working with out carrier agreements or guarantees of repayment for their efforts.

It’s not continually clean if the hunters are having a real effect past whack-a-mole account takedowns, despite the fact that some companies have claimed credit score for thwarting serious terror threats.

If hunters don’t collaborate closely with intelligence groups, their rogue efforts can be counter-productive or maybe risky. Smith described a “severe incident” in 2015 when MI5 sent police to an undercover hunter’s residence believing him to be a terrorist.

Even although Isis has been weakened in latest months, Kurtz isn’t always slowing down.

“It’s not just Isis, but the ‘alt-proper’ in America. I assume they’re just as dangerous,” he stated, including that he’s going to record neo-Nazi bills while he comes throughout them.

“I don’t think we’ll ever be capable of ride off into the sunset. You just replace one evil with every other.”

Be Very Wary Of Cheap Bongs Under 20$

If you have decided that you really need a bong to continue on your cannabis journey, but you’re dead set on a budget of 20$ or less, you need to be wary of a few things. When shopping for cheap bongs under 20$, you need to keep in mind a few factors and be sure that whatever you choose to buy will be appropriate for the frequency of use that you put it through. I’ve seen way too many friends buy six different 15$ bongs in a year time after time, when they could have just gotten a 50$ bong that would have most likely survived that whole year. I’m not saying there’s anything inherently wrong with cheap bongs and even if it’s under 20$ it can get the job done for a long time, but it all depends on your circumstances.
Image result for cheap Bong

Your Social Life

 

    Some people like to smoke alone, others prefer to smoke in groups. If you’re a social smoker and plan to share your bong with your friends, you almost certainly want a plastic one if you can’t spend more than twenty dollars on it. Glass that cheap can break at any second, especially when it’s being passed around repeatedly every couple nights. If you do really want glass, I’d suggest keeping the bong tucked away and just smoking joints or pipe with the pals.

You Could Try A Bamboo Bong

 

If you want to be a bit eco-friendly and avoid petroleum based acrylic if you decide to pass on glass, there are lots of online retailers that sell cheap bongs under 20$ that are made out of bamboo. At such a low price, it’s understandable that it’s quite small and can hardly be considered a bong, but they still serve as a handy water pipe and they’ll do the job better than a regular old glass pipe. These are harder to clean, but not impossible, so maybe this is more suitable for someone who only plans to take a bowl once or twice a night, rather than a frequent smoker.  

20 approaches to keep your internet identity safe from hackers

Do you use the equal password for all web sites? Do you overshare on Facebook? If so, you’re a goal for cyber criminals – whose computer scams are costing Britain £27bn a yr. We requested professionals for their pinnacle pointers to beat the fraudsters

We’re excessive up inside the Gherkin in the City of London and Garry Sidaway, director of the safety method at Integralis, a firm which advises government corporations, pharmaceutical and financial offerings multinationals, is giving my laptop a security MOT. “You don’t have anti-virus software program, I see,” he says, a trace of mockery in his voice. “That’s your first mistake.”

Graet New

According to Sidaway, while most of us are a lot greater awareness about the risks now (“My mom shreds her documents even supposing she would not realize why” he says), we have to all be raising the bar. He thinks we Britons are a very trusting lot. Sitting geese for an armada of hackers, who’s every bit as centered on stealing our statistics as we’re comfy about storing it. “The crook gangs recognize precisely which kind of information they need and in which it’s far likely to be,” he explains. “Conversely we’re no longer certain what they’re after.”

Image result for internet

So what are they after, I ask? “We see an extensive sort of assaults – everything from opportunists seeking to extract passwords through phishing [emails which purport to be from legitimate sources and attempt to get us to click on an infected link] to distinctly organised crime units targeting organizations and government systems with a purpose to scouse borrow highbrow assets and data related to important infrastructure.”

The authorities estimate that the total value of cybercrime within the UK is £27bn 12 months. The majority (£21bn) is devoted towards organizations, which face high tiers of intellectual belongings robbery and commercial espionage.

Enabled via the sharing lifestyle on social media – and with ever more state-of-the-art malicious software referred to as malware at their disposal – cyber criminals have turn out to be some distance greater adept at crafting assaults and targeting people and firms. Phishing emails purporting to be from buddies, often reflecting our pursuits – perhaps gleaned from social media web sites – or from trusted enterprises together with your bank or HM Revenue & Customs inspire us to click on inflamed hyperlinks or attachments containing malware. (A current example of the latter turned into malware disguised as a security caution from Microsoft’s virtual crimes unit.) “We have a level of accepting as true with in certain corporations, and criminals take advantage of that agree with,” says Sidaway.

Typically, these so-known as “man-in-the-middle” attacks deploy colorfully named Trojans (pieces of malware, basically) which includes Zeus, SpyEye or Citadel on computers, that have the impact of compromising, as an instance, on line banking transactions. “Everything then you do in your compromised pc is subverted thru a hacking web site which means that when you [communicate] with your financial institution, you’re going through a person within the middle. Initially, guy-in-the-middle assaults were passwords used in authentication – the crook could wait until you had finished starting using the credentials that they had just gathered. This is why banks delivered in one-time passwords or codes,” he says.

“But extra latest malware will perform a person-in-the-middle assault to reap the consumer’s session (a session is created after a user logs in successfully and the browser and the bank’s internet site use this to retain the interaction) and fake the logout requests. Once the user thinks they’ve logged out, the attacker can make payments using the prevailing session with out the sufferer seeing any changes to their stability till the subsequent time they log on. This is partially why banks have rolled out card readers to help prevent bills to new payees.” He adds: “It’s a constant game of cat and mouse.”

TWENTY COMMANDMENTS: THE DOS AND DON’TS OF ONLINE SAFETY
1. Never click on a link you probably did now not count on to acquire
The golden rule. The essential manner criminals infect PCs with malware is through luring customers to click on on a hyperlink or open an attachment. “Sometimes phishing emails incorporate obvious spelling mistakes and negative grammar and are smooth to spot,” says Sidaway of Integralis. “However, focused assaults and well-performed mass mailings can be almost indistinguishable [from genuine emails].” Social media has helped criminals profile people, permitting them to be an awful lot extra effortlessly targeted, he provides. “They can see what you are interested in or what you [post] about and ship you crafted messages, inviting you to click on something. Don’t.”

2. Use distinctive passwords on unique sites
With people normally having anything up to 100 online bills, the tendency has grown to be to share one or passwords across money owed or use very simple ones, inclusive of loved ones’ names, first pets or favorite sports teams. Indeed, studies by Ofcom last month found out that over 1/2 of UK adults (55%) use the same passwords for maximum, if no longer all, websites they visit, while one in 4 (26%) use birthdays or names as passwords. Any phrase located in the dictionary is effortlessly crackable. Instead, says Sian John, on line protection consultant at Symantec, have one memorable word or a line from a favorite music or poem. For example: “The Observer is a Sunday newspaper” will become “toast.” Add numerals and a special person for that reason: “T0!Asn”. Now for every web site, you go online to, add the primary and closing letter of that web site to the start and stop of the word, so the password for Amazon might be “AT0!Ann”. At first look, unguessable. But for you, still memorable.”

 

 

‘This.’ sucks: why you need to stop using the net’s worst one-word sentence

Internet slang became as soon as Rhik Samadder’s new jam, however now he can’t even. As new social community This. Arrives, he explains why language in the meme-age is not amazeballs

This. Is the buzziest social media web page. No, no longer this. This.Cm is a platform in which customers can pay the best percentage an unmarried hyperlink an afternoon, in an try to nonetheless the white noise of facts overload. This misses the factor of the internet, that’s the exponential proliferation of ideas, and pithy clips of cats being bastards. But I become struck by using the call, which references a piece of net slang that is uniquely worrying and sinister, like someone sporting a balaclava at a buffet.

What is it approximately on line speech that can be so anxious? I’m not glad you requested. Writing approximately slang is thankless and futile and slides into irrelevancy faster than tea cools. In the meme-age, it shapeshifts like a chameleon on mephedrone. In gaming communities, slang breeds in its very own microbial way of life, spawning unexpectedly, mutating, and demise unobserved to the outer world.

Graet News Network

But a few slang sticks around lengthy enough or receives big sufficient, that we certainly are aware it, even supposing we don’t recognize it. It perpetually sparks a whole lot of anger, depression, and the wailing actuality that English has died, younger humans now speak by drawing on each different in digital crayons, and in 30 years will all be speaking in a few type of bastard binary.

 

RELATED ARTICLES :

Related image

Maybe that’s authentic. There are a few eye-watering examples of on-line idiocy around, the maximum brazen of that are acronyms. Acronyms are the holiday reps of internet communicate, grinding on you in hotpants, providing you neon drinks, making you experience vintage. STAY! They holler in your face, however DILLIGAS! Is it viable to stay abreast of net acronyms? QTWTAIN. (In point of linguistic technicality, maximum of the above aren’t acronyms, due to the fact they’re not pronoun- SORRY, TL;DR.)

We don’t like acronyms because they’re abstruse and extraordinary, that’s kinda the deal with slang, daddy-o. Frantically looking them up on Urban Dictionary is as vain as choosing up sex tips from magazines – you’re by no means going to use them well.

Doge meme
Doge: amazeballs. Photograph: net
Then there are as soon as fun terms staled through repetition, and using repetition, I suggest the second one time you listen to them. I lol’d out loud the primary time I saw roflcopter, rollerskates, the usage of *hints fedora* as a gesture of respect. I love the playfulness in language – the creative misspellings, idiot pronunciation and syntax of lolcats, Homestar runner and doge nonetheless tickle me silly. Even amazeballs – I am providing you with amazeballs, you can’t say fairer than that – would possibly have earned a grudging smirk once, and as soon as best. Where there once turned into creativity, however, there is now herd-lol. One-dimensional jokes can most effective be stretched one manner, that’s too thin.

But there’s a more insidiously annoying species of net phraseology. It’s easy to understand, and not looking to be humorous. It’s the kind of template-mind-set followed using those who simply dig themselves. Take a word like “X is my new jam”. X is my new jam is – or on account that I’m writing about it here, changed into – a breezy manner of sharing a song on social media. While it literally method “this is what I’m being attentive to,” it aspires to be a white man with dreadlocks, tossing you a CD as he rolls using on a longboard. In other words, it deserves a dry slap. Its remit also broadens, to the point that some thing may be your new jam, whether it’s a strolling excursion of the Imperial War Museum or marmalade.

The open ended “I can’t even” is an affectation of incomprehension that you can’t a method or respond to what you’ve got just examine or visible, due to the fact it’s far a brand new paradigm of stupidity/sexiness/goats making a song Taylor Swift. It’s no longer ineffective, but it’s far lazy – while we soar to responsive stop-factors like this, discussion shuts down. (Similarly, I don’t like “Just saying,” as it implies the user is a sassy directly-talker, who settles issues in a manner nobody else can manipulate, or speak beyond.)

ways to stop hackers: ‘What’s the hassle with sharing my Facebook info with friends of buddies?’
Facebook frequently updates its timeline and privateness settings, so it’s far sensible to monitor your profile, mainly if the layout of Facebook has modified. Firstly, in the privacy settings menu, under “Who can see my stuff?” trade this to “friends” (be warned: setting this to “pals of friends” means that, in step with one Pew examine, on common you’re sharing information with 156,569 human beings). Also in privacy, setting “limit old posts” applies pals-handiest sharing to the past in addition to future posts. Thirdly, disable the ability of other search engines to link on your timeline.

 

Facebook Twitter Pinterest
It’s the Taylor Swift Screaming Goat. Just saying.
But for my cash, the worst is ‘This.’ Always with the capital T, and complete forestall, to suggest communication starts of evolved and ends with something I am about to reveal you. Sometimes you get it in all caps, any other indicator you aren’t in a conversational realm. ‘This.’ Aims for a lapidary excellent, as if the endorsement must be carved in stone drugs and broken over your head. It might be a vine of Ryan Gosling feeding a rabbit, or a newsreader accidentally announcing ‘boner’. It doesn’t depend. Prepare for the summum bonum (heh, bonum) of enjoyment. Perhaps it’s simplest ‘This.’ for the sharer. However, it has the huge weight of a black obelisk, annoying your attention. It doesn’t give you information, or choice. There is a risk in it. Whoever writes ‘This.’ has given them the sanction to accomplish that, and also you ought to comply with. Only despots quash subjectivity, pretending there are not any those, simplest this.

Don’t do that.

Passwords, phones and privacy settings: how to protect yourself on line

Stay safer at the net with these guidelines on shoring up your digital security, and join our stay Q&A on the issue at 2 pm these days

Sensible humans are vigilant approximately on line protection as a matter of course, ever alert to the opportunity that someone would possibly breach their passwords for the purposes of stealing. Like those who drink the advocated quantity of gadgets and make sure their puppies by no means have chocolate, I don’t recognize human beings like this. However, I’ve heard they exist.

Graet Report

 

As horrific as theft is, there may be an extra peril, that is what induced online game developer Zoe Quinn to plot Coach, a chain of stroll-throughs to protect you on the line, and feminist activist Anita Sarkeesian to create her online protection manual.

If you’re monumentally unlucky, you could find yourself in the attention of the net’s fury, and the range of factors cyber-able strangers can do to you is huge and extremely nasty. Doxing is while a person hacks into your account and publicizes your private details – from there, the dying and rape threats which might be habitual for women with a substantial online presence take on a hideous new plausibility. You are susceptible to acts of baroque vandalism, like swatting – wherein an emergency name is faked from your cope with and the police storm your own home – and, of course, nonetheless theft.

Image result for internet

Start using downloading a password control tool – I used LastPass. You go through your accounts in this order: Google, Yahoo, Microsoft, Apple, Dropbox, Facebook, Twitter, Tumblr, PayPal, eBay, Amazon, after which any not-so-ordinary sites (Ocado and Outnet, basically). LastPass generates new passwords for them so that it will be then autofill via a snowflake button at the browser. The method of converting is painful; it shames me to admit that, more than as soon as, I incorrectly stored the brand new password on to LastPass, then needed to undergo hell to change it again, ending up with a couple of variations of the equal web site in my “vault.” I am nevertheless locked out of Facebook however this is for the best, I suppose. It ought to take approximately an hour – it took me approximately.

 

RELATED ARTICLES :

 

Online abuse: how ladies are fighting back
Read greater
Then you check in for two-step verification where you may, which means each time you want to make a transaction, you’ve texted a code for your cell. This sounds like a greater problem than it is because it’s rare in your cell to be very far away. Even in case you are an inveterate non-worrier, you may feel more relaxed after this. Especially in case you are a person whose passwords had been all variations on the equal formation, and you previously spent your lifestyles seeking to consider the minute variations, you’ll be surprised at how much free time you currently have and may get on with getting to know an device or a brand new language.

Other than that, the main porosity I discovered became Companies House. If you are an employer director – and this isn’t as niche as it sounds, since it consists of firms with charitable targets but not charitable status – your private home cope with could be indexed, until you’ve got alerted them to some precise threat. In america, there are also some of the websites that are listing humans’ addresses – inclusive of Spokeo – and you will need to touch every of them immediately to ask to be eliminated. Apart from Freeelectoralrolls.Com, this isn’t always such big business in the UK.

Other viable breaches are: failure to choose the proper privacy settings for your internet site or selected social media, and this is enormously easy; or leaks via your own family members, particularly on a domain like Facebook, where you may have the most stringent settings but discover that your place may be correctly diagnosed maximum of the time through your fool children. You might also, in case you haven’t misplaced the will to stay, need to undergo these types of approaches with the alternative participants of your household.

Hardware compromises are where things grow to be complex: symptoms that your pc has been hacked consist of home windows opening on their own, unexpected slowness, tough-drive grinding. Mac has a program referred to as Little Snitch if you want to tell you while information is being despatched out of your pc, and Wireshark is a community protocol analyzer. Yes, exactly: your paranoia needs to be at quite excessive ranges for this degree of interest to be profitable.

The terror of swatting: how the regulation is tracking down high-tech prank callers
Read more
The journalist Geoff White and techie Glenn Wilkinson have finished some bracing paintings, meanwhile, on how plenty records may be accrued approximately you and your whereabouts via your smartphone or mobile tool. The tech journalist Christian Payne summed this up smartly: the only way to defend yourself from the possibility that a person ought to thieve your identification or find out your whereabouts thru your telephone is to hold it in lead-lined pockets and no longer use it.

Using Facebook on a smartphone
Facebook Twitter Pinterest
The handiest manner to avoid a safety breach from a cellular smartphone is to not use one in any respect. Photograph: Kennedy Photography / Alamy/Alamy
Incidentally, the equal is genuine of your passport – its details can be examined from a distance, and consequently it leaks information constantly. Keep away from public Wi-Fi networks, hold your gadget up to date, and download Prey directly to every device, so you can wipe it remotely if it’s far stolen. But there is simplest one way to keep away from all of the security breaches offered through a cell cellphone, and that is via not having a cell cellphone.

Despite Quinn’s paintings simplifying the manner, it stays quite an challenge, and I resented it. Sometimes men launch those assaults on every other, hack every other in presentations of techie braggadocio, but it is essentially yet every other unwanted price of being a lady.

Internet carriers urge dad and mom to screen children’s internet interest

Internet Matters is released, presenting advice on children’ online profiles, the sites they go to and defensive towards abuse

The UK’s four biggest internet companies have advised mother and father to check which websites their children go to, audit their on-line profiles and turn on filters blocking irrelevant content in an enterprise-extensive reaction to the authorities’ push for higher infant protection on-line.

Icas Network

BT, Sky, TalkTalk and Virgin Media on Tuesday launched the .”, with a portal presenting recommendation on defensive households against cyberbullying, on line grooming, sexting, and pornographic content.

One in four youngsters have seen sexual pics online by means of the age of 12, even as 60% of teens were asked for a sexual photo of themselves, and 28% of children do not tell their dad and mom while they’re being bullied on line, regularly for worry of having their cellphone taken away, according to analyze via the telecoms watchdog Ofcom, the NSPCC and the marketplace studies organisation Opinion Leader.

Image result for internet

“Internet Matters will help dad and mom to recognize the issues children can face on line whether or not they’re five or 15,” Bunting stated. “We consider that is the first time that the principal broadband companies in any u. S . A . Have joined forces for such a project. The UK is therefore main the way with regards to toddler internet protection.”

 

RELATED ARTICLES :

Launched by using the singer-songwriter Sophie Ellis-Bextor and her mom, the previous Blue Peter presenter Janet Ellis, at London’s Museum of Childhood, the portal can even recommend on how to control on line reputation. Children’s social circles can be large on-line than at faculty, with the common eight-to-eleven-year-vintage gathering 92 social network buddies.

The initiative has pass-birthday celebration support, with the high minister describing it as a “sizable leap forward in our undertaking to shield kids on-line.” David Cameron referred to as net companies to Downing Street for a cyber summit in November, to cozy stricter controls over the online fabric. Labour leader Ed Miliband and deputy high minister Nick Clegg also voiced their approval.

The portal will help parents to perform filters, consisting of those on Google and other engines like google. It follows the creation of optional on-line filters from every of the four net providers in current months.

Internet Matters recommends parents control, in preference to block, their kid’s get admission to the internet. It advises them to test the websites visited via searching up net browser histories; set up parental controls on computer systems, however also on telephones, capsules and games consoles; delete profiles on social networks that youngsters are not the use of; and encourage youngsters to ignore and block on-line bullies.

Ellis-Bextor stated: “Today’s dad and mom need to cope with issues that didn’t even exist while we were developing up. I’m careful to keep an eye fixed on my boys, especially my 10-12 months-antique, who’s at that age while he’s starting to explore the internet on his own.”

Internet Matters’ pinnacle suggestions for toddler protection on line
1. Encourage your baby continually to apply infant-pleasant serps, such as Swiggle, Ajkids or Kids-search. Safe search settings can also be activated on Google and Bing. Don’t forget about to opt for the safety mode on YouTube, iTunes and Google Play.

2. Parental controls have to be hooked up to each device your child makes use of cellular smartphone, pill, and video games consoles (both home and handheld).

Three. Cyberbullies are looking for a response, so make certain your baby knows that by using deciding now not to answer they’re making an lively choice now not to give energy to the bully.

4. Use the integrated gear on social networks and mobile services to block absolutely everyone who’s cyberbullying your child.

5. Remind your youngsters that even though human beings they’ve met on the line would possibly sense like friends, they may not be who they say they are.

6. Make a habit of checking the information that’s on-line approximately your child. Keep a watch on the social community pages and other sites your toddler uses.

7. If you see erroneous statistics about your child, ask the person that published it to accurate or delete it. If they received, ask the site administrator to accomplish that.

8. When your infant stops using a social networking profile or internet site, it’s an excellent concept to deactivate or delete their account.

Nine. Look in the browser records at the search phrases your toddler has been using and the websites they’ve visited. Keep an eye fixed on the apps they’ve downloaded on their telephones too.

10. No clear out is a hundred% effective. Make sure you speak on your toddler about on line pornography as well.

6 Social networking
Delete your Facebook account. Why do the CIA’s work for it? And in case you ought to use it, don’t place your date of beginning on your profile. Why give identity thieves an even wreck? And remember that, no matter what your privateness settings, you do not have to manipulate over information approximately you that is posted via your “pals”.

7 Location information
Avoid using offerings including FourSquare that require place statistics.

Eight Wireless offerings
Have Bluetooth off by default in all your cellular gadgets. Only transfer it on while you explicitly need to use it. Otherwise, you will discover that even a dustbin can listen in on it. Similarly, watch out for the usage of open wifi in public locations. At the very minimum, make sure that any website you have interaction with uses HTTPS instead of unencrypted HTTP connections. If you don’t know, then all people close by can use Firesheep to see the whole lot you’re doing.

Nine Personal Security
Forget password, think passphrase – i.e., a meaningless sentence that you’ll bear in mind – and do some variations on it (first and 1/3 letters of each phrase perhaps) so you can generate a more potent password from it every time. Or use a password-management app like LastPass or 1Password. And if a provider offers multi-element authentication, employ it.

10 Search engines
All the big search engines like google and yahoo tune you seek records and construct profiles on you to serve you personalized consequences based on your search records. In case you need to break out from this “clear out bubble” you want to replace to a search engine that does not song your inquiries. The maximum apparent one is the bizarrely named but pretty effective DuckDuckGo.