PFA: home computers have no "reasonable expectation of privacy"

Carl Parrish cparrish at carlparrish.com
Tue Jul 12 19:44:52 MST 2016


Anyone have sources on hardening a pixel? Can you auto encrypt data on Google’s cloud?  is it easy to make S3 a default drive? Have we ever done a workshop about using Crouton or chrubuntu on a pixel? Since about 85% of all I do is web work or ssh into a Linux server I really think I can get away with one now as long as 1) no issues access my git remote server / Heroku / Digital Ocean / Engine Yard  2) I can run atom / phpStorm / rubymine in the ubuntu area. If I can verify these things I’m planning on purchasing end of this week. But would love to find a USB-C storage drive to connect to it and perhaps encrypting it for any private data. 
  
> On Jul 12, 2016, at 6:41 PM, Keith Smith <techlists at phpcoderusa.com> wrote:
> 
> 
> I read it to be akin to not locking your front door so when the cops come a calling they are legally able to walk in and search.  Not so today. The 4th Amendment still protects you from that (you leaving your door unlocked).
> 
> They were talking about a computer.  Used to be your rights stopped at my nose (computer).
> 
> As time passes and the courts allow more violations of the U.S. Constitution we will have no rights.
> 
> Last week should have been a wake up call as to how far things have degraded.
> 
> 
> 
> 
> On 2016-07-12 00:25, David Schwartz wrote:
>> It would appear that the defendant in this case is basically arguing
>> Heisenburg’s Uncertainty Principle is at play, in that the use of a
>> trojan to identify and spy on his machine may have resulted in the
>> files they found there to have come from unspecified sources, just
>> because the trojan was put there to look around. And the defendant is
>> claiming this has an inherintly indefensible flaw regarding “chain
>> of custody” of the data that was collected from the trojan.
>> It’s kinda like saying that undercover agents in a drug ring cannot
>> be trusted simply because they were able to con the drug ring’s
>> leaders into trusting them, and therefore cannot be trusted by
>> anybody.
>> What they did could actually be accomplished with retargeting pixels /
>> cookies and a little bit of snooping through the defendant’s browser
>> history. It might take a little longer, but the evidence would
>> probably be stronger that way … they’d basically be
>> “triangulating” the computer from multiple sources based on known
>> “salt” cookies (retargeting pixels) that show up passively based
>> on browsing activities.
>> But I also believe the term “online privacy” is an oxymoron,
>> encryption not withstanding. Use the interwebs at your own risk.
>> -David Schwartz
>>> On Jul 10, 2016, at 11:14 PM, Tom Roche <Tom_Roche at pobox.com> wrote:
>>> Apologies to those who've already seen this, but it was news to me:
>>> Last month (Jun 2016), federal district judge Henry Coke Morgan,
>>> Jr[1] ruled that the Fourth Amendment[2] does not protect home
>>> computers. A criminal defendant has no reasonable expectation of
>>> privacy regarding an in-home personal computer, and the federal
>>> government does not need a warrant to hack one.[3] Particularly, "a
>>> computer afforded Fourth Amendment protection in other circumstances
>>> is not protected from Government actors who take advantage of an
>>> easily broken system"[4] to implant malware. The full decision is in
>>> this scanned PDF[5].
>>> Gotta start hardening, Tom Roche <Tom_Roche at pobox.com>
>>> [1]: https://en.wikipedia.org/wiki/Henry_Coke_Morgan,_Jr <https://en.wikipedia.org/wiki/Henry_Coke_Morgan,_Jr> [1]. [2]:
>> https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution <https://en.wikipedia.org/wiki/Fourth_Amendment_to_the_United_States_Constitution>
>>> [2] [3]:
>> https://www.eff.org/deeplinks/2016/06/federal-court-fourth-amendment-does-not-protect-your-home-computer <https://www.eff.org/deeplinks/2016/06/federal-court-fourth-amendment-does-not-protect-your-home-computer>
>>> [3] [4]:
>> http://arstechnica.com/tech-policy/2016/06/fbis-use-of-tor-exploit-is-like-peering-through-broken-blinds/ <http://arstechnica.com/tech-policy/2016/06/fbis-use-of-tor-exploit-is-like-peering-through-broken-blinds/>
>>> [4] [5]:
>>> https://www.eff.org/files/2016/06/23/matish_suppression_edva.pdf <https://www.eff.org/files/2016/06/23/matish_suppression_edva.pdf> [5]
>>> --------------------------------------------------- PLUG-discuss
>>> mailing list - PLUG-discuss at lists.phxlinux.org <mailto:PLUG-discuss at lists.phxlinux.org> To subscribe,
>>> unsubscribe, or to change your mail settings:
>>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss <http://lists.phxlinux.org/mailman/listinfo/plug-discuss> [6]
>> Links:
>> ------
>> [1]
>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZuXg7pb6zmegjIVXNr5ZbBsVvFgvWB-2Fz6lQ7799XmsErU0-2F5zuDODUuGdkR6Ntmh0g-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxfrCsekJ4-2BAStxLkwtwmnU1ZBRj0CkeWrwWWzKHz9ddP8KZtEqqkXpuluubjuAMnblqm47gBsvpib7pgEwbobbeu-2Fp0UywMdZ4NutcG-2B1YrM1NR7Jfuij8qALvzUUSZoaWnLcFSrWln-2FID7JD8-2FOrM8-3D <https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZuXg7pb6zmegjIVXNr5ZbBsVvFgvWB-2Fz6lQ7799XmsErU0-2F5zuDODUuGdkR6Ntmh0g-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxfrCsekJ4-2BAStxLkwtwmnU1ZBRj0CkeWrwWWzKHz9ddP8KZtEqqkXpuluubjuAMnblqm47gBsvpib7pgEwbobbeu-2Fp0UywMdZ4NutcG-2B1YrM1NR7Jfuij8qALvzUUSZoaWnLcFSrWln-2FID7JD8-2FOrM8-3D>
>> [2]
>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZuXg7pb6zmegjIVXNr5ZbBtls8FMDgmv1AHrYEB656DrQ22yL5hgo7z0qBY9JvyvUaWibjDOJU2Wtp6SUFGtgsSN63gL-2BFfGlWfA-2FZbqyqIK_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxZ5KnvAe8313o2yJQSsrni8fylhLivKK4853nozHQRGOX4RIZxW3AFGpcnXdd0S2Z4ehnbzIKGX3qX-2FzOF3Tcto9uJSTnrkr30OEOWMAvb5Lnr4iSExQmkTRmz14HXnrdmUnc2-2F0BnfaOoY7CWMHImM-3D <https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZuXg7pb6zmegjIVXNr5ZbBtls8FMDgmv1AHrYEB656DrQ22yL5hgo7z0qBY9JvyvUaWibjDOJU2Wtp6SUFGtgsSN63gL-2BFfGlWfA-2FZbqyqIK_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxZ5KnvAe8313o2yJQSsrni8fylhLivKK4853nozHQRGOX4RIZxW3AFGpcnXdd0S2Z4ehnbzIKGX3qX-2FzOF3Tcto9uJSTnrkr30OEOWMAvb5Lnr4iSExQmkTRmz14HXnrdmUnc2-2F0BnfaOoY7CWMHImM-3D>
>> [3]
>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZvrcx2vIr5C9zKHC5-2F2Y-2FH3lf-2FCiyR9Vb-2FTNYdT-2FDgZGMcXnIltUnAxdhO9xfyXT3-2FQ0-2FfJ3-2FmYLb9oB1vHPr-2FsjuvP9RZrjxK8L4gaxmg65QlABESJ3YFhLtLc-2B1wb0GQ-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxREzeYsyqkb6uaqoz2UHt0bveOzLUA-2BHGmEq8WRDj-2BfcHNbOj3OIJGKf-2FqqxRrOvK30gPbnrRP3FuPTri5LANQ0I4o-2FjDWVUQIsxF0iPQZocee3D3CQnjaopaBoDi-2Bbc0Dkxg4VfS6uxNPa-2BniU4RSc-3D <https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZvrcx2vIr5C9zKHC5-2F2Y-2FH3lf-2FCiyR9Vb-2FTNYdT-2FDgZGMcXnIltUnAxdhO9xfyXT3-2FQ0-2FfJ3-2FmYLb9oB1vHPr-2FsjuvP9RZrjxK8L4gaxmg65QlABESJ3YFhLtLc-2B1wb0GQ-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxREzeYsyqkb6uaqoz2UHt0bveOzLUA-2BHGmEq8WRDj-2BfcHNbOj3OIJGKf-2FqqxRrOvK30gPbnrRP3FuPTri5LANQ0I4o-2FjDWVUQIsxF0iPQZocee3D3CQnjaopaBoDi-2Bbc0Dkxg4VfS6uxNPa-2BniU4RSc-3D>
>> [4]
>> https://u2206659.ct.sendgrid.net/wf/click?upn=cqRaQJ0PxTF6ZCs9HLFCz3yFMD69v2YHRL5OOOqTOCVOn3BrE5GdklgCLboZGbFdEaS93S3HZ58ZCIdTiGjwQLzBOdEx-2BZQQW8U-2F2oblzM5o2w91R71CN6Pz6TFqn9PBfQmkcmq77-2BuOnz-2FGBkxS6ls2E9mx88vLqNGTwcVMdK8-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxUjAXQrTpe73FdUslcS0WSWpn7fpGrQDP-2Fpr6TwduP3dCZjNL3V2LkL-2FgP9c43OBWZTl3mq7p2ro9WX38VX-2Fz1CGqHKBZRED1tdBSsm6eAGblcRGS8STl7DvcFKsJc8ZJYpOG5ejB8AID5V-2FHHyJ6hU-3D <https://u2206659.ct.sendgrid.net/wf/click?upn=cqRaQJ0PxTF6ZCs9HLFCz3yFMD69v2YHRL5OOOqTOCVOn3BrE5GdklgCLboZGbFdEaS93S3HZ58ZCIdTiGjwQLzBOdEx-2BZQQW8U-2F2oblzM5o2w91R71CN6Pz6TFqn9PBfQmkcmq77-2BuOnz-2FGBkxS6ls2E9mx88vLqNGTwcVMdK8-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxUjAXQrTpe73FdUslcS0WSWpn7fpGrQDP-2Fpr6TwduP3dCZjNL3V2LkL-2FgP9c43OBWZTl3mq7p2ro9WX38VX-2Fz1CGqHKBZRED1tdBSsm6eAGblcRGS8STl7DvcFKsJc8ZJYpOG5ejB8AID5V-2FHHyJ6hU-3D>
>> [5]
>> https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZhFguORR1NZFtATSPBpJPe0z95RCf0OK9MDigfu6J9XhN7JJ9F8K4HvDHSdsN-2F1Kcq9QnoMvTBiIggUUmRbiqqc-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxdnJ47tHzYjFxQbDsW6ACMiEHvAJ20Mg91Fk4mlNifHHQmq1zsJPXRi8qRge-2F1i2EiCy2pthAlyHfu2NItEHTTjwRjX2jB0Awl6wJVftjZ8QCk6-2F8aZPWY7LWf-2BuVe-2BPak24l0JArtY6tBOO309Cqw8-3D <https://u2206659.ct.sendgrid.net/wf/click?upn=3cK2FVJjyu2N-2Bxco034fZhFguORR1NZFtATSPBpJPe0z95RCf0OK9MDigfu6J9XhN7JJ9F8K4HvDHSdsN-2F1Kcq9QnoMvTBiIggUUmRbiqqc-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxdnJ47tHzYjFxQbDsW6ACMiEHvAJ20Mg91Fk4mlNifHHQmq1zsJPXRi8qRge-2F1i2EiCy2pthAlyHfu2NItEHTTjwRjX2jB0Awl6wJVftjZ8QCk6-2F8aZPWY7LWf-2BuVe-2BPak24l0JArtY6tBOO309Cqw8-3D>
>> [6]
>> https://u2206659.ct.sendgrid.net/wf/click?upn=5DvWGaZUY8Sh5aRLWfQTKYiRLVzunonVk948p8WIzMe-2FXlJ9Cta8w8U9xoku9LrUSHNMJbSd3ZEwH-2BqnW2UHlA-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxTi7ekM7kJY96r6UMXMVSWBQQBsJdA9dnj0Oreo-2Bc-2FPZuICjA8tcePwn4I1gJ6ON23RhUT1-2FtF5DbC6VztwbF5svqFT64lLMQFpx3H1idRgKdJaV9u3zy5LBsZnLR6W75i8Wht-2FIo1gywIXhdjbrHUg-3D <https://u2206659.ct.sendgrid.net/wf/click?upn=5DvWGaZUY8Sh5aRLWfQTKYiRLVzunonVk948p8WIzMe-2FXlJ9Cta8w8U9xoku9LrUSHNMJbSd3ZEwH-2BqnW2UHlA-3D-3D_6lpMB7VLnN-2Fj9-2FEErg8-2F-2BMBpb5QxlByTgv2M3fbWD9ebvC-2BWrN3h7jImK8EVWYBexlATRkV-2Bf3ggfheyMkVKxTi7ekM7kJY96r6UMXMVSWBQQBsJdA9dnj0Oreo-2Bc-2FPZuICjA8tcePwn4I1gJ6ON23RhUT1-2FtF5DbC6VztwbF5svqFT64lLMQFpx3H1idRgKdJaV9u3zy5LBsZnLR6W75i8Wht-2FIo1gywIXhdjbrHUg-3D>
>> ---------------------------------------------------
>> PLUG-discuss mailing list - PLUG-discuss at lists.phxlinux.org <mailto:PLUG-discuss at lists.phxlinux.org>
>> To subscribe, unsubscribe, or to change your mail settings:
>> http://lists.phxlinux.org/mailman/listinfo/plug-discuss <http://lists.phxlinux.org/mailman/listinfo/plug-discuss>
> 
> -- 
> Keith Smith
> ---------------------------------------------------
> PLUG-discuss mailing list - PLUG-discuss at lists.phxlinux.org <mailto:PLUG-discuss at lists.phxlinux.org>
> To subscribe, unsubscribe, or to change your mail settings:
> http://lists.phxlinux.org/mailman/listinfo/plug-discuss <http://lists.phxlinux.org/mailman/listinfo/plug-discuss>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.phxlinux.org/pipermail/plug-discuss/attachments/20160712/81d24a1b/attachment.html>


More information about the PLUG-discuss mailing list