Tag Archives: Internet

Private? uh uh

A couple of mornings ago, I read in a local newspaper that the police somewhere had caught a robber who stole a gold chain off a little girl’s neck. Unfortunately, the intrepid fellow had apparently swallowed the chain, thus neatly concealing all evidence. Not to be left clueless, the police ordered an X-ray examination of his abdomen, and the evidence was unearthed in plain black and white. And in other colours, to be revealed when the forcibly administered laxatives got to work.

I searched for the news item online, so as to post it here. I didn’t find it, but a strikingly similar theft apparently happened in Mexico two months ago. Is this copy-catting or what? According to a mail I got recently, ‘pagerism’ is a journalist using someone else’s beeper, but I suspect this isn’t quite as innocent.

Anyway, this isn’t really about missing evidential chains, but about the kind of thinking that pervades the thinking of some people in authority, that the badge of office confers the inalienable right to invade other people’s space, including subjecting them forcibly to potentially cancer causing radiation for non-medical reasons.

Continue reading

Leave a comment

Filed under Uncategorized

Email and Security

Reading over my shoulder?

People who do a lot of email (I don’t do a lot, not by corporate standards, but I’m not exactly an online recluse), are increasingly concerned by the lack of privacy in this area of communication.

Some of us are keen to see the modes of communication used on the Internet become commonplace for all (hence the title of this blog, in case you just landed up here and are still wondering), and now it is necessary to study how best to handle questions of privacy, when setting up email services on wide area intranets.

Intranets are more or less the same thing as local area networks, but the term refers more to the services running on the network, rather than to its physical infrastructure. The terrific advantage of such services is that they can be set up in a manner that avoids centralised control. In fact, they need not have a centralised structure to begin with.

So what can one do with a decentralised network? The sky’s the limit, almost, and new applications and services emerge almost every day.

Continue reading

Leave a comment

Filed under Accessibility, Blogroll, Community, connectivity, Democracy, development, Email, governance, Internet, Intranet, Media, Privacy, Security, social processes, technology