Skip to Content »

Michi’s blog » archive for 'Privacy'

 FRA-Lagen och falska positiver

  • June 18th, 2008
  • 9:56 am

Jag har varit en god medborgare. Jag har b

 Own a funny tshirt? Please leave our country.

  • June 8th, 2007
  • 12:12 pm

So, Heiligendamm just outside Rostock in northern Germany these days hosts both the G8 meeting and the numerous protest activities. This setup would have me ranting on and on about the violent left and failure to admonish extremists on your own side.

But that is not the issue that makes me reach for my keyboard.

Swedish news outlets report today about Tomas Eriksson, a swedish lawyer who came on the ferry from Trelleborg with his girlfriend yesterday morning.

In the entry checks, the German border officials found a t-shirt in the girlfriends luggage, with the symbol of the swedish political pro-media-piracy lobbying organisation “Piratbyr

 Retrospection 2006

  • December 30th, 2006
  • 7:31 pm

Inspired by other bloggers on Planet Haskell, I thought I’d just sit down and write a retrospection post, reviewing the past year – primarily from angles such as mathematics, computers and my generic life situation.

It divides neatly into two different sections: the months as a commercial programmer and the months as PhD student and academic careerist.

The year began still working for Teleca Systems, and with security consulting for Stockholm-based firms and frequent trips back home.

Then as the year went on and my PhD applications grew more and more, I started getting results. I got invited to Bonn for an interview with the Homology and Homotopy graduate school program – which was in the end turned down because I was more of a homological algebraist than a topologist. And the week after that, I was invited to Jena for an interview for a position doing PhD work on computational homological algebra. The interview went well, the potential advisor was nice (and a once-roleplaying gamer to sweeten the deal more) and I got the position just a few days later.

 This came faster than expected…

  • February 13th, 2006
  • 10:09 am

Breaking news! Just in from /.

According to this article, there is a Cincinnati-based company that just had two of its employees implant glass-encapsulated RFIDtags in their biceps as a part of the access control system to their datacenter.

And we’re one step closer to the artificial linking of identity verification to body parts.

I see two aspects to discuss here. One is of the inherent security problems with the solution, and the other is about the sci-fi feel and possible problems and antagonists.

So let’s start with the second aspect. I can remember a lesson in eight grade, discussing in our social sciences class, where I suggested use of passive radio transmitters to implant small chips in people that would work as a central for identification and verification. The implanted chip would be used as ID card, as credit card et.c. et.c. and you wouldn’t have to juggle cards at all any longer. I was quite taken by the vision I had – until my baptist pastor of a teacher started quoting relevations on me, claiming that such an implant would be a perfect example of how the Mark of the Beast would manifest.

 EU Parliament clubbing Big Brother light

  • December 15th, 2005
  • 12:33 pm

Since roughly september, a resolution has been making its way through the EU bureaucracy to institute mandatory storage times for, among other things, internet traffic logs with ISPs. Throughout the discussions, the image has been coming through that the resolution would in endeffect require ISPs to log more or less everything a user does, requiring insane disk volumes for the logs and infringing exceedingly on personal privacy.

The resolution, as it ended up, is actually less panicky than it could have been – somewhat surprisingly. I’m reading the changes instituted by the parliament during the first reading and acceptance of the resolution. They include addition of, among other things, the following text blocks

In particular when retaining data related to Internet e-mail and Internet Telephony, the scope may be limited to the providers’ own services or the network providers’.

making the ISP responsible for their own services, but not for connectiontracking outside their own services.