Correction on the title of this piece: His campaign advisory role carried over to a ongoing Presidential advisory role, so “Former” isn’t quite accurate.
Google Chairman and former CEO Eric Schmidt tried to use his influence within Google to gain privacy from searches about him, specifically trying to hide his political donations through secret “whitelists” whose existence has only recently been admitted.
This revelation from Steven Levy’s new book In the Plex is not surprising given Schmidt’s high level of political activity, advising candidate Barack Obama on tech issues, and now rumored as a candidate to be the next Secretary of Commerce. He’s in deep politically, and probably doesn’t want that to hurt him personally or in business.
But given Schmidt’s history, he’s now exposed as a massive hypocrite.
Continue reading »
I know nobody wants to talk about Net Neutrality right now when unions are the issue giving everyone warm feelings right now, but there were important hearings held Wednesday. Greg Walden’s House subcommittee held hearings on HJ Res 37, which disapproves of Net Neutrality to invoke the Congressional Review act and overrule the FCC’s power grab.
On top of that, the FCC responded to the demands from Fred Upton, Lee Terry, and Walden to give an economic justification for Net Neutrality. The response was unsatisfactory, and the Republicans concluded, in a statement that in fact called Net Neutrality a “power-grab”: “The truth is imposing these rules will cause more harm than good by stifling innovation, investments and jobs.” They’re right, too, notwithstanding Nancy Pelosi’s ignorant bleating.
Continue reading »
I hide nothing from you: I kicked back this Friday night. I slacked off. Now it’s Saturday at 2am and I’m finally getting to this. But, you all read this in the morning anyway so it really doesn’t matter much, right? (If I’m wrong I’ll surely hear in the comments)
Let’s start with a widely reported but badly reported story: DNSSEC. This is a framework for the Domain Name System (the framework for translating from hostnames such as www.redstate.com to IP addresses, which are the actual addresses used on the Internet). The system is akin to SSL for domains. Verisign will manage it for the Commerce Department and create a single “Root Key” which is then used to create certificates for domains, which will then be used to make sure your a domain’s DNS records are legitimate.
In my estimation, it’s just a big boondoggle for [Verisign] to get more customers. The vast majority of domains won’t be able to be secured by it, because Verisign is going to have a monopoly and will charge accordingly. This will only affect big businesses transacting large amounts of money, and they’re already secured against DNS-based attacks. If they’re smart they are, anyway.
What DNSSEC does that is bad, however, is create a new point of failure for the Internet, because there are 7 key holders which control escrowed access to the root key. If 3 of them lose the keys, the entire system will have to be re-keyed at expense and inconvenience to all, as pointed out by George Ou.
Continue reading »