<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>CyberLaw on keithrozario.com</title><link>https://keithrozario.com/categories/cyberlaw/</link><description>Recent content in CyberLaw on keithrozario.com</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 02 Nov 2016 20:56:42 +0000</lastBuildDate><atom:link href="https://keithrozario.com/categories/cyberlaw/index.xml" rel="self" type="application/rss+xml"/><item><title>Preventing a DDOS is not going to be easy</title><link>https://keithrozario.com/2016/11/preventing-a-ddos-is-not-going-to-be-easy/</link><pubDate>Wed, 02 Nov 2016 20:56:42 +0000</pubDate><guid>https://keithrozario.com/2016/11/preventing-a-ddos-is-not-going-to-be-easy/</guid><description>&lt;p>As a follow-up to my previous post on DDOS attacks [&lt;a href="https://www.keithrozario.com/2016/10/how-the-starhub-ddos-possibly-happened.html">1&lt;/a>,&lt;a href="https://www.keithrozario.com/2016/10/internet-of-shitty-things.html">2&lt;/a>], I&amp;rsquo;ve seen a lot of so-called &amp;lsquo;solutions&amp;rsquo; to the problem, which really aren&amp;rsquo;t solutions at all.&lt;/p>
&lt;p>While it&amp;rsquo;s still not explicitly clear that the StarHub DDOS was executed by Mirai, a recently released malware built specifically for DDOS, the timing and similarity of it to other Mirai attacks leave little room for doubt&amp;ndash;at least to me.&lt;/p>
&lt;p>If indeed, StarHub was a victim of a Mirai based attack, it would seem extremely odd that their CTO would reference &lt;a href="http://www.theonlinecitizen.com/2016/10/27/starhub-recent-cyberattack-used-home-infected-computers/">phishing emails as a vector for infection&lt;/a>. So a few things don&amp;rsquo;t quite line up here, including the advice from the CTO to change the default username and password, when &lt;a href="https://krebsonsecurity.com/2016/10/who-makes-the-iot-things-under-attack/">Brian Krebs already reported that doesn&amp;rsquo;t quite help&lt;/a>:&lt;/p>
&lt;blockquote>
&lt;p class="m_-8085449076693160327gmail-p1">&lt;span class="m_-8085449076693160327gmail-s1">Several readers have pointed out that while advising IoT users to change the password via the device’s Web interface is a nice security precaution, it may or may not address the fundamental threat. That’s because Mirai spreads via communications services called “telnet” and “SSH,” which are command-line, text-based interfaces that are typically accessed via a command prompt (e.g., in Microsoft Windows, a user could click Start, and in the search box type “cmd.exe” to launch a command prompt, and then type “telnet” &amp;lt;IP address&amp;gt; to reach a username and password prompt at the target host).&lt;/span>&lt;/p>
&lt;p class="m_-8085449076693160327gmail-p1">&lt;span class="m_-8085449076693160327gmail-s1">The trouble is, even if one changes the password on the device’s Web interface, the same default credentials may still allow remote users to log in to the device using telnet and/or SSH.&lt;/span>&lt;/p>
&lt;/blockquote>
&lt;p class="m_-8085449076693160327gmail-p1">If you're more technically inclined, I strongly suggest listening the feature interview on&lt;a href="http://risky.biz/RB433"> last week's risky business podcast&lt;/a>.&lt;/p>
&lt;p class="m_-8085449076693160327gmail-p1">But the last piece of &lt;a href="http://www.theonlinecitizen.com/2016/10/27/starhub-recent-cyberattack-used-home-infected-computers/">advice that the StarHub CTO gave&lt;/a>, that didn't make sense to me at all was this:&lt;/p>
&lt;blockquote>
&lt;p class="m_-8085449076693160327gmail-p1">"If you were to buy a webcam from Sim Lim Square, try to get a reputable one"&lt;/p>
&lt;/blockquote>
&lt;p class="m_-8085449076693160327gmail-p1">Again, this may seem like good advice, but it doesn't conform to the evidence. Brian Krebs has &lt;a href="https://keithrozario.com/uploads/2016/10/iotbadpass-pdf.png">a list of devices that are hack-able&lt;/a>, and they include the likes of Panasonic, RealTek, Samsung and Xerox. All of which regular consumers would consider 'reputable'.&lt;/p>
&lt;p class="m_-8085449076693160327gmail-p1">So StarHub claimed that you should change your passwords--but doesn't protect you from Mirai.&lt;/p>
&lt;p class="m_-8085449076693160327gmail-p1">StarHub claim that you should buy equipment from 'reputable' suppliers, but even reputable suppliers produce hackable IOT devices, that can't be secured.&lt;/p>
&lt;p class="m_-8085449076693160327gmail-p1">Finally StarHub are going to be sending technicians out in the field to help subscribers, and while this is laudable, it's not a sustainable solution. It only fixes a short-term problem, because as long consumers continue to buy hack-able IOT devices, the threat isn't going to go away.&lt;/p>
&lt;p class="m_-8085449076693160327gmail-p1">And how often can StarHub afford to send technicians to make home visits before the cost start becoming un-bearable?&lt;/p>
&lt;p class="m_-8085449076693160327gmail-p1">The way to view this issue is from a legal, economical and technical perspective--and in that order.</description></item><item><title>Internet of shitty things!</title><link>https://keithrozario.com/2016/10/internet-of-shitty-things/</link><pubDate>Mon, 24 Oct 2016 23:05:27 +0000</pubDate><guid>https://keithrozario.com/2016/10/internet-of-shitty-things/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/b66b95478f-300x188.jpg"
 alt="b66b95478f"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Brian Krebs is the most reputable name in CyberSecurity reporting, his &lt;a href="http://www.krebsonsecurity.com">krebsonsecurity&lt;/a> website is the best source of &amp;lsquo;real&amp;rsquo; journalism on the subject.&lt;/p>
&lt;p>But reputation works both ways, the same thing that makes him popular in some circles, makes him unpopular in other. He&amp;rsquo;s had criminal hackers send him &lt;a href="http://www.vice.com/read/i-interviewed-the-fraudster-who-frames-people-for-heroin-possession">heroin in the mail&lt;/a> and even have &lt;a href="http://krebsonsecurity.com/2013/03/the-world-has-no-room-for-cowards/">SWAT teams descend on his home with guns all blazing&lt;/a> (in a phenomenon called &lt;a href="https://en.wikipedia.org/wiki/Swatting">swatting!&lt;/a>). Reporting and exposing underground cyber-criminals comes at a price, you don&amp;rsquo;t piss of darknet crime lords without taking a few hits along the way.&lt;/p>
&lt;p>The problem though is when those &amp;lsquo;few&amp;rsquo; hits, turn into a hurricane of web traffic aimed at your server, because that&amp;rsquo;s exactly what descended on Krebs&amp;rsquo; server late last week, when krebsonsecurity was hit by an epic DDOS attack&lt;/p>
&lt;p>DDOS is an acronym for Distributed-Denial-of-Service, which basically means forcing so much web traffic to a single website that it eventually collapses&amp;ndash;making it unable to provide services to the &amp;lsquo;real&amp;rsquo; visitors of the site. All websites run on servers with finite capacity, DDOS attacks are about sending enough traffic to those servers that they eventually exceed that capacity.&lt;/p>
&lt;p>But this DDOS was different, and krebsonsecurity will go down in history as the Hiroshima of this type of DDOS. But nuclear weapons only had Hiroshima and Nagasaki, krebsonsecurity will be the first in a Looooong line of DDOS attacks of this scale.&lt;/p>
&lt;p>So what makes this attack so different as to merit it&amp;rsquo;s own class? Well 3 things.&lt;/p></description></item><item><title>The safest place for your money is under the mattress</title><link>https://keithrozario.com/2016/09/the-safest-place-for-your-money-is-under-the-mattress/</link><pubDate>Mon, 12 Sep 2016 08:38:24 +0000</pubDate><guid>https://keithrozario.com/2016/09/the-safest-place-for-your-money-is-under-the-mattress/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Money-Under-Mattress.jpg"
 alt="money-under-mattress"
 
 loading="lazy"
 />&lt;/p>
&lt;p>When I was in school, we joked about people who kept their money under the mattress, that somehow those who didn&amp;rsquo;t use banks were less intelligent than people who did.The general thinking was that smart people kept their money in the bank, where it was safe from theft, fire and flood, while still collecting interest.&lt;/p>
&lt;p>In the 80&amp;rsquo;s this was a compelling argument, when interest rates were high and banks really did provide security,but is that thinking still applicable today?&lt;/p>
&lt;p>In June of 2000, Maybank &lt;a href="http://www.maybank2u.com.my/mbb_info/m2u/public/personalDetail04.do?channelId=Personal&amp;amp;cntTypeId=0&amp;amp;cntKey=AU00.06.09&amp;amp;programId=AU02.02-ArchiveNews&amp;amp;newsCatId=/mbb/AU-AboutUs/AU02-Newsroom/2000/06&amp;amp;chCatId=/mbb/Personal">launched their &amp;rsquo;new&amp;rsquo; internet banking platform&lt;/a>, Maybank2u, which allowed their customers to do their banking online, outside of traditional branches or even ATMs. Few years later, it begun offering online purchases and soon after the mobile &lt;a href="http://www.maybank.com/iwov-resources/corporate_new/document/my/en/pdf/corporate-news-release/2014/Press_Release_maybank2u_app.pdf">app was launched&lt;/a>.&lt;/p>
&lt;p>But while online banking platforms brought convenience, they also introduced new security threats &amp;ndash; and it wasn&amp;rsquo;t clear whose job it was to secure against those new threats, and who would be liable for inevitable financial losses.&lt;/p>
&lt;p>Was it going to be bank who assumed liability, just like they did before, or would it be the account holder, or possibly a mixture of both?&lt;/p>
&lt;p>The answer depends on who gets attacked, because not all attacks are equal.&lt;/p>
&lt;h2>Not all attacks are equal&lt;/h2>
There's two types of attack, one where the bank itself is attacked, and another where the account holder is targeted instead.
&lt;p>When someone walks into a bank  with the threat of violence, and walks out &lt;a href="http://www.straitstimes.com/singapore/suspect-on-the-run-after-30k-bank-robbery-in-holland-village">with $30,000 of the banks cash&lt;/a>, the bank absorbs all the loses. After all, that&amp;rsquo;s why your money is in their safe and not under the mattresses.&lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/507d7acb92f46ed8d8779be14e3f2051-300x188.jpg"
 alt="507d7acb92f46ed8d8779be14e3f2051"
 
 loading="lazy"
 />&lt;/p>
&lt;p>But there exist another class of attack&amp;ndash;customer impersonation, where the attacker isn&amp;rsquo;t threatening violence or even &amp;lsquo;attacking&amp;rsquo;, but trying to fool the bank into believing they are the rightful account holders. In other words, the attacker is trying to impersonate you, to get to &lt;em>your&lt;/em> money.&lt;/p>
&lt;p>And in the digital world, customer impersonation is far more common. Consider the case of ATM fraud.&lt;/p>
&lt;p>ATMs identify a user by verifying their ATM cards, and then prompting them for the PIN. More specifically, the ATM first authenticates the inserted ATM card (&lt;em>is this card real?&lt;/em>) and then proceeds to ask the user for the PIN (&lt;em>is the person the accountholder?&lt;/em>), once an ATM is satisfied, it then proceeds to grant the user access to the account.&lt;/p>
&lt;p>Hence if an attacker managed to steal &lt;em>your&lt;/em> card and knows &lt;em>your&lt;/em> PIN, the ATM has no way to differentiate between you and the attacker. Anyone could take &lt;em>your&lt;/em> money from &lt;em>your&lt;/em> account, by just having your ATM card and PIN, in contrast robbers attacking a bank would simply be taking the bank&amp;rsquo;s cash&amp;hellip;not yours.&lt;/p>
&lt;p>Credit Card fraud is another prime example, but at least in Malaysia &lt;a href="http://www.consumer.org.my/index.php/personal-finance/bank/175-pay-only-rm250-for-lost-or-stolen-card-transactions">end customers have their liability capped at RM250 provided they report their lost cards in a &amp;lsquo;reasonable&amp;rsquo; amount of time&lt;/a>. For debit cards and ATM cards are not protected in the same way. Which is strange because the poorer sections of society who need more protection usually have debit instead of credit cards.&lt;/p>
&lt;p>But even credit card users need to be wary, because changes in the liability model are bound to happen when we &lt;a href="https://www.keithrozario.com/2015/10/chip-and-pin-an-intro-for-malaysians.html">introduce Chip and Pin&lt;/a>. (read more &lt;a href="http://www.loyarburok.com/2010/01/16/those-bloody-banks-credit-card-companies-and-bank-negara/">here&lt;/a>)&lt;/p>
&lt;p>To summarize, customer impersonation isn&amp;rsquo;t the same as a bank robbery, when the bank issues you credentials (like PINs, passwords or ATM cards), the responsibility to secure those credentials are yours&amp;ndash;and if those credentials are compromised, then you&amp;rsquo;ll have to shoulder some of the financial losses as well.&lt;/p></description></item><item><title>Show notes for today</title><link>https://keithrozario.com/2016/06/show-notes-for-today/</link><pubDate>Thu, 23 Jun 2016 13:35:35 +0000</pubDate><guid>https://keithrozario.com/2016/06/show-notes-for-today/</guid><description>&lt;p>&lt;audio preload="" controls="controls">&lt;source src="https://s3-ap-southeast-1.amazonaws.com/livelearn/2016-06-23_KeithRozario_AnInternetlessPublicService.mp3" type="audio/mp3" />Your browser does not support native audio, but you can &lt;a href="https://s3-ap-southeast-1.amazonaws.com/livelearn/2016-06-23_KeithRozario_AnInternetlessPublicService.mp3">download this MP3&lt;/a> to listen on your device.&lt;/p>
&lt;/audio>
&lt;p>Some interesting links you might want to check out during my interview on BFM today, will tidy up this list later in the week.&lt;/p>
&lt;p>&lt;a href="https://en.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach">Office of Personnel Management Data Breach &lt;/a>(Chinese hackers breaking into US Federal Employee Databases)&lt;/p>
&lt;p>&lt;a href="https://www.washingtonpost.com/world/national-security/chinese-government-has-arrested-hackers-suspected-of-breaching-opm-database/2015/12/02/0295b918-990c-11e5-8917-653b65c809eb_story.html">China arrested the hackers responsible for OPM breach&lt;/a>&lt;/p>
&lt;p>&lt;a href="https://www.wired.com/2016/04/hack-brief-turkey-breach-spills-info-half-citizens/">Turkey losing Personal Information on 50 Million Citizens&lt;/a>&lt;/p></description></item><item><title>This is how Pedophiles get caught</title><link>https://keithrozario.com/2016/06/this-is-how-pedophiles-get-caught/</link><pubDate>Sun, 12 Jun 2016 15:24:43 +0000</pubDate><guid>https://keithrozario.com/2016/06/this-is-how-pedophiles-get-caught/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/SexOffender.jpg"
 alt="SexOffender"
 
 loading="lazy"
 />&lt;/p>
&lt;p>This will easily be the most controversial blog post I ever wrote, so consider yourself warned.&lt;/p>
&lt;p>It&amp;rsquo;s controversial, because it touches on multiple taboos in our society, sex, child abuse and security theater. You see, there&amp;rsquo;s been a growing call for a national sex offender registry, especially in the wake of news that a British Pedophile had sexually abused up to 200 children in Malaysia.&lt;/p>
&lt;p>The news is especially shocking for Malaysians, who are still coming to grips with the fact that a foreign &amp;lsquo;mat salleh&amp;rsquo; abused &lt;strong>our&lt;/strong> children, in &lt;strong>our&lt;/strong> country, right under&lt;strong> our fucking noses&lt;/strong>, and we&amp;rsquo;re only now learning about it&amp;hellip;.years after the abuse had taken place and even then, the details are sketchy.&lt;/p>
&lt;p>As I said,many have renewed &lt;a href="http://www.themalaymailonline.com/what-you-think/article/protecting-our-children-from-paedophiles-dr-amar-singh">the call for a Sex Offender registry&lt;/a>. The idea being, that if we start registering sex offenders, we could more easily monitor them, and be able cut-off  their ability to further abuse children. It&amp;rsquo;s a great idea, but it wouldn&amp;rsquo;t have saved these 200 children, simply because Richard Huckle wasn&amp;rsquo;t convicted of any sexual abuse, he wouldn&amp;rsquo;t have been on the registry even if had one.&lt;/p>
&lt;p>Then we have calls for &lt;a href="http://www.themalaymailonline.com/what-you-think/article/huckles-abuse-wake-up-malaysia-nurul-izzah-anwar">better screening procedures of people who work with children&lt;/a>. Another great idea, but again wouldn&amp;rsquo;t have stopped Richard Huckle. Maybe a extremely thorough and in-depth screening  process that interviewed his parents, grandparents and fourth grade history teacher would have uncovered something about his psychology that &lt;strong>may&lt;/strong> have triggered some alarms&amp;ndash;but that level of screening is both unrealistic and a gross invasion of privacy.&lt;/p>
&lt;p>Finally we have &lt;a href="http://www.themalaymailonline.com/what-you-think/article/huckles-abuse-wake-up-malaysia-nurul-izzah-anwar">calls for better sex-education in schools&lt;/a>, which I&amp;rsquo;m 100% in favor off. Proper sex education may have prompted one of Huckle&amp;rsquo;s victims to speak out and report the issue, which may prompted his arrest at a much earlier time&amp;ndash;but ultimately these were impoverished children who were not given access to proper education anyway, so sex education in public schools probably wouldn&amp;rsquo;t have helped them.&lt;/p>
&lt;p>But are we forgetting something obvious?&lt;/p></description></item><item><title>The law shouldn't rely on good behavior from Billionaires</title><link>https://keithrozario.com/2016/06/the-law-shouldnt-rely-on-good-behavior-from-billionaires/</link><pubDate>Sun, 05 Jun 2016 11:22:37 +0000</pubDate><guid>https://keithrozario.com/2016/06/the-law-shouldnt-rely-on-good-behavior-from-billionaires/</guid><description>&lt;p>Gawker is the internet&amp;rsquo;s most slimy news organization, a online website that has no qualms disclosing people&amp;rsquo;s sexual infidelities regardless of the cost such disclosures have on their personal lives.&lt;/p>
&lt;p>So for most people, seeing WWF superstar Hulk Hogan win a lawsuit against Gawker to the tune of $140 Million dollars was a real sight for sore eyes. But when it was revealed that Hogan was funded by Billionaire Peter Thiel, the internet suddenly lost its damn mind.&lt;/p></description></item><item><title>Passcodes should be protected</title><link>https://keithrozario.com/2016/05/passcodes-should-be-protected/</link><pubDate>Sat, 14 May 2016 11:28:20 +0000</pubDate><guid>https://keithrozario.com/2016/05/passcodes-should-be-protected/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Diverse_torture_instruments.jpg"
 alt="Diverse_torture_instruments"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Some people are fans of medieval torture, and who can blame them. There&amp;rsquo;s just something about the sadistic treatment of people that makes us both want to watch with a bowl of popcorn in our hands, yet at the same time turn away in disgust and discomfort.&lt;/p>
&lt;p>How else do you explain the popularity of shows like Saw?&lt;/p>
&lt;p>I personally am a fan of the Iron Maiden, which before it became a name of rock band, was a evil torture device designed to impale its victims with spikes, but meticilously avoid crucial organs thereby prolonging the agony, letting the victim slowly bleed to death rather than die from something boring like heart failure or liver damage.&lt;/p>
&lt;p>There&amp;rsquo;s a&lt;a href="https://en.wikipedia.org/wiki/List_of_methods_of_capital_punishment"> list on Wikipedia&lt;/a>, that has all the gory details of medieval torture techniques, including keel-hauling (which I always though was some pirate term) and Scaphism, which is  a Persian specialty where the victims dies of Diarrhea.&lt;/p>
&lt;p>It&amp;rsquo;s a whole new level when the victim dies of Diarrhea&amp;mdash;Diarrhea!! &lt;em>(and the smart-ass know it all types probably are thinking that Persia wasn&amp;rsquo;t in the medieval period&amp;ndash;yes, I know and I don&amp;rsquo;t care)&lt;/em>&lt;/p>
&lt;p>&lt;em>[*Steve in the comments points out that Scaphism didn&amp;rsquo;t really die from diarrhea but from insects feasting on them. Which doesn&amp;rsquo;t exactly make it sound any better ]&lt;/em>&lt;/p>
&lt;p>Fortunately, we live in a modern world, where such barbarism is consigned to history classes rather than current affair shows, and trust me while water boarding &lt;strong>is&lt;/strong> torture, it&amp;rsquo;s probably a couple of rungs lower on the cruelty scale than an Iron Maiden or Scaphism.&lt;/p>
&lt;p>It&amp;rsquo;s good to view out past just to figure our far along we&amp;rsquo;ve come along as a species, to take stock in the great progress we&amp;rsquo;ve made in civil liberties. Torture is a fine example of such progress, but take for example the what 16th century English had to deal with, when they were sent to the &lt;a href="https://en.wikipedia.org/wiki/Star_Chamber">Star Chamber&lt;/a>!&lt;/p></description></item><item><title>Hate Speech is defined by private companies</title><link>https://keithrozario.com/2016/03/hate-speech-is-defined-by-private-companies/</link><pubDate>Sun, 13 Mar 2016 15:55:01 +0000</pubDate><guid>https://keithrozario.com/2016/03/hate-speech-is-defined-by-private-companies/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/FirstAmendment.jpg"
 alt="FirstAmendment"
 
 loading="lazy"
 />&lt;/p>
&lt;p>You don&amp;rsquo;t have a right to freedom of speech.&lt;/p>
&lt;p>Obviously true if you&amp;rsquo;re Malaysian, but even Americans only enjoy a liberty in freedom of speech and not an absolute right.&lt;/p>
&lt;p>The difference is clear, liberties are protections you have from the government, while rights are something you have from everyone.&lt;/p>
&lt;p>So if someone threatened your right to live, the government is obligated to intervene and protect that right, because your right to live is a protection you have from everyone, whether it be a common criminal, abusive husband or Ayotollah Khomeini.&lt;/p>
&lt;p>On the other hand you only have a liberty in freedom of speech (at least in an American context), which means that the government can&amp;rsquo;t prevent you from speaking, or penalize you for something you said.&lt;/p>
&lt;p>However, the government is under no obligation to ensure your speech gets equal &amp;lsquo;air-time&amp;rsquo;, a newspaper may decline to publish your article, an auditorium may elect to deny you their roster, and online platforms like Facebook may choose to remove your post&amp;ndash;all of which do not violate your freedom of speech, because freedom of speech is protection only from the government (state actors) and not from private entities.&lt;/p>
&lt;p>And like all liberties and rights, freedom speech is not absolute. Under strict conditions even the US government can impose limits to what they&amp;rsquo;re citizens can say, or penalize them for things they have said.&lt;/p>
&lt;p>In the case of freedom of speech, a liberty defined in their first amendment, those strict conditions are very strict indeed. In order for the government to infringe on the freedom of speech, it must demonstrate a imminent danger that will result in a serious effect.&lt;/p>
&lt;p>In other words the government must be able to prove that if the speech were given freedom, there would be an imminent threat of something serious. Both the imminence and seriousness must be proven, failing which the government cannot infringe on that speech. This is indeed a very tall hurdle to climb, and based on my cursory research no case has ever reached this limit.&lt;/p></description></item><item><title>FBI vs. Apple : Everything you need to know part 2</title><link>https://keithrozario.com/2016/03/fbi-vs-apple-everything-you-need-to-know-part-2/</link><pubDate>Mon, 07 Mar 2016 00:00:04 +0000</pubDate><guid>https://keithrozario.com/2016/03/fbi-vs-apple-everything-you-need-to-know-part-2/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/broken-fence-300x201.jpg"
 alt="broken-fence"
 
 loading="lazy"
 />&lt;/p>
&lt;p>The Apple vs. FBI story has evolved so much in the past weeks, I thought I needed to write a separate post just on the updates. Admittedly, the story is far more complex and nuanced that I initially presumed, and everyone wants to be part of the conversation.&lt;/p>
&lt;p>On one side, we have the silicon valley tech geeks, who seem to be unanimously in the corner of Tim Cook and Apple, while on the other  we have the Washington D.C policy makers, who are equally supportive of James Comey and the FBI whom he directs.&lt;/p>
&lt;p>But to understand this issue from a fair and balanced perspective, we need to frame the correct question, not just what the issue about, but who is the  issue really focused on.&lt;/p>
&lt;h2>This isn't just about the FBI or Apple&lt;/h2>
Framing this as the &lt;em>FBI vs. Apple&lt;/em> or &lt;em>The Government vs. Apple&lt;/em> is wrong. This is &lt;em>Law Enforcement vs. Tech Companies.&lt;/em>
&lt;p>The FBI is just a part of the &lt;em>The Government&lt;/em>, specifically the part tasked with investigating federal crimes.&lt;a href="https://cyber.law.harvard.edu/pubrelease/dont-panic/Letter_CyrusVance_Re_DontPanic.pdf">James Comey&lt;/a>, FBI director, is genuinely trying to do his job when he uses the All Writs Act to compel Apple to create a version of iOS that would allow them to brute-force the PIN code.&lt;/p>
&lt;p>But there are other parts of &lt;em>The Government&lt;/em>, like the NSA, who have the wholly different task of national security. To them, if a smartphone, is genuinely secured from FBI, then it&amp;rsquo;s secured from Russian Cybercriminals and Chinese State Sponsored actors too (probably!).&lt;/p>
&lt;p>And because so much data are on smartphones, including the smartphones of federal government employees, the national security interest of America is better protected by having phones that are completely unbreakable, rather than ones the provide exceptional access to law-enforcement. &lt;em>Exceptional being defined as, no one has access &lt;strong>except&lt;/strong> for law enforcement, and perhaps TSA agents, maybe border patrol and coast guard&amp;ndash;you can see how slippery a slope &amp;rsquo;exceptional&amp;rsquo; can be. Oh and by the way, exceptional doesn&amp;rsquo;t exist in end-to-end encryption.&lt;/em>&lt;/p>
&lt;p>Former NSA director, Michael Hayden, has openly &lt;a href="http://money.cnn.com/2016/01/13/technology/nsa-michael-hayden-encryption/">said&lt;/a> &lt;em>“I disagree with Jim Comey. I actually think end-to-end encryption is good for America”. &lt;/em>So it appears the NSA has an interest of national security that competes with the FBIs interest of investigating crimes.&lt;/p>
&lt;p>&lt;em>The Government&lt;/em> isn&amp;rsquo;t a single entity with just one interest, rather it is a collection of agencies with sometimes competing objectives, even though they all ultimately serve their citizens.  Experts believe the NSA has the capability to crack the iPhone encryption easily, but are refusing to indulge the FBI, because&amp;ndash;well it&amp;rsquo;s hard to guess why the NSA don&amp;rsquo;t like the FBI.&lt;/p>
&lt;p>&lt;a href="https://keithrozario.com/uploads/b3af6e9e-b599-4216-b2f9-1aee6a1d90cd/landau-written-testimony.pdf"> testimony to House Judiciary Committee&lt;/a>. Both methods involved complicated forensics tools, but would cost a few hundred thousand dollars (cheap!) , and wouldn&amp;rsquo;t require Apple to write a weakened version of iOS. If the goverment can get into the phone for $100,000 , that would mean it couldn&amp;rsquo;t compel Apple under the All Writs Act (AWA).&lt;/p>
&lt;p>Remember, the FBI buy their spyware from the lowlifes at hacking team, which means they&amp;rsquo;re about as competent as the &lt;a href="https://www.keithrozario.com/2016/01/no-the-prime-minister-doesnt-need-spyware.html">MACC and Malaysian PMO&lt;/a>, but if Comey and Co. can afford &lt;a href="http://www.wired.com/2015/07/fbi-spent-775k-hacking-teams-spy-tools-since-2011/">$775,000 on shit from Hacking Team&lt;/a>, I&amp;rsquo;m guessing $100,000 for a proper computer forensics expert isn&amp;rsquo;t a problem.&lt;/p>
&lt;p>But maybe there&amp;rsquo;s an ulterior motive here, at the very recently concluded &lt;a href="https://www.eff.org/cases/re-order-apple-all-writs">Brooklyn iPhone case&lt;/a>, Magistrate Judge Orenstein noted that &lt;a href="https://www.eff.org/deeplinks/2016/02/government-cant-force-apple-unlock-drug-case-iphone-rules-new-york-judge">necessity was a pre-requisite for any request made under AWA&lt;/a>, and if the FBI have an alternative for a reasonable price, then Apple&amp;rsquo;s support was &lt;span style="text-decoration: underline;">not&lt;/span> necessary, and hence outside the ambit of the AWA. So maybe the NSA isn&amp;rsquo;t providing the support to necessitate the NSA.&lt;/p>
&lt;p>An this isn&amp;rsquo;t singularly about the FBI either. The New York A-G is waiting for this case to set precedent before he makes request for the &lt;a href="http://abcnews.go.com/Technology/york-da-access-175-iphones-criminal-cases-due/story?id=37029693">175 iPhones he&amp;rsquo;s hoping to unlock&lt;/a> for cases that aren&amp;rsquo;t related to terrorism or ISIS. You can bet he&amp;rsquo;s not the only A-G waiting for the outcome, and it&amp;rsquo;s highly unlikely for the Judge to make her ruling so specific that nobody except the FBI could use it as precedent.&lt;/p>
&lt;p>But it&amp;rsquo;s also not just about Apple. The legal precedent set by this case would apply not just to every other iPhone, but possibly every other smartphone, laptop, car or anything else we could squeeze into the definition of a computer. This is about more than Apple, and that&amp;rsquo;s why the tech companies are lining up in support of Mr. Cook, &lt;a href="http://qz.com/631163/32-internet-companies-are-backing-apple-in-its-fight-against-the-fbi/">32  such companies the last I checked.&lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/us-vs.-them-771x500.png"
 alt="us vs. them"
 
 loading="lazy"
 />&lt;/p>
&lt;/a>
&lt;p>But now that we&amp;rsquo;ve framed the &amp;lsquo;who&amp;rsquo; , let&amp;rsquo;s frame the &amp;lsquo;what&amp;rsquo;.&lt;/p></description></item><item><title>Apple vs. FBI: Everything you need to know</title><link>https://keithrozario.com/2016/02/apple-vs-fbi-everything-you-need-to-know/</link><pubDate>Sat, 20 Feb 2016 09:26:04 +0000</pubDate><guid>https://keithrozario.com/2016/02/apple-vs-fbi-everything-you-need-to-know/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/broken-fence.jpg"
 alt="broken-fence"
 
 loading="lazy"
 />&lt;/p>
&lt;p>A judge in the US has ordered Apple to provide &amp;rsquo;technical assistance&amp;rsquo; to FBI, in creating what some (but not all) cybersecurity experts call a backdoor. In the few years I&amp;rsquo;ve written about these issues, I&amp;rsquo;ve never seen anything as hotly debated as this one, across the folks from digital security to foreign policy all coming down on both sides of the debate.&lt;/p>
&lt;p>On one hand it seems a bit snarky of the FBI to use this one particular case, that looks to have the highest possible chance of success to set precedent, but on the other hand it seems mighty nasty of Apple to refuse to comply with a court order, to crack into a terrorist phone.&lt;/p>
&lt;p>So here&amp;rsquo;s some facts of the case.&lt;/p>
&lt;p>The phone in question belonged to Syed Rizwan Farook, a shooter in the &lt;a href="https://en.wikipedia.org/wiki/2015_San_Bernardino_attack" target="_blank">San Bernadino shooting&lt;/a>, which caused the deaths of 14 people. America has numerous mass shootings, but this one involved two Muslims aligned to ISIS&amp;ndash;and hence more easily labeled terrorism, without the need for adjectives like &amp;lsquo;domestic&amp;rsquo;.&lt;/p>
&lt;p>As I blogged about last week, &lt;a href="https://www.keithrozario.com/2016/02/being-terrified-the-price-of-terrorism.html" target="_blank">self-radicalized terrorist don&amp;rsquo;t get funding from headquarters&lt;/a>, and without that glorious ISIS-oil money, all these guys could afford for was an iPhone 5C, an entry-level phone with hardware identical to that of the iPhone 5, a phone launched waaaayy back in 2012 &lt;em>(you&amp;rsquo;ll remember that as the year Manchester United last won the Premier League)&lt;/em>. As an older phone, the security architecture of the 5C lagged behind the current generation iPhones, all of which have a secure enclave, but make no mistake, it&amp;rsquo;s still pretty secure.&lt;/p>
&lt;p>By pretty secure, I mean that the phone has all of its contents encrypted, and un-readable to anyone without the encryption key. The key is derived from both the user passcode, and a randomly generated hardware key that is unique to the specific iPhone. It is generally understood that Apple doesn&amp;rsquo;t keep track of the hardware key, and therefore unable to provide it, as you might expect the hardware will also never give up it&amp;rsquo;s key under any circumstance. Without the hardware key, the encrypted  data is unreadable, even with the passcode. Which explains why the FBI can&amp;rsquo;t suck the data out of the device for decryption on a more powerful computer, or load the data into 1000&amp;rsquo;s of iPhones for parallel cracking.&lt;/p></description></item><item><title>Court rules Hacking Team documents still confidential</title><link>https://keithrozario.com/2016/02/court-rules-hacking-team-documents-still-confidential/</link><pubDate>Fri, 19 Feb 2016 08:00:51 +0000</pubDate><guid>https://keithrozario.com/2016/02/court-rules-hacking-team-documents-still-confidential/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Censorship-300x225.jpg"
 alt="internet censorship"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Under the current hype of the &lt;a href="https://www.keithrozario.com/2016/02/apple-vs-fbi-everything-you-need-to-know.html">FBI ordering Apple to &amp;lsquo;install backdoors&amp;rsquo; on their iPhones&lt;/a>, a bit of interesting news seems to have slid under the radar.&lt;/p>
&lt;p>A court in Singapore ruled that e-mails from the Hacking Team breach, published by the hacker Phineas Fisher via a torrent download, and available freely on Wikileaks&amp;ndash;&lt;a href="http://www.singaporelawwatch.com/slw/index.php/headlines/77528-data-hacked-and-leaked-online-still-confidential-court#sthash.5wWkbsg1.dpbs">were still confidential in nature.&lt;/a>&lt;/p>
&lt;p>The news hits close to home, after all, I&amp;rsquo;ve written a&lt;a href="https://www.keithrozario.com/2015/07/hacking-team-got-hacked-and-heres-what-malaysia-bought.html"> 2,000 word article on it back in July&lt;/a>, and have been &lt;a href="https://www.keithrozario.com/2016/01/no-the-prime-minister-doesnt-need-spyware.html">harping&lt;/a> &lt;a href="https://www.keithrozario.com/2015/12/malaysia-spyware-hacking-team.html">on&lt;/a> &lt;a href="https://www.keithrozario.com/2016/01/questions-we-need-to-ask-about-spyware.html">the&lt;/a> issue over the past weeks, even &lt;a href="https://www.keithrozario.com/2016/02/keithrozario-on-bfm-talking-about-spyware.html">going on BFM radio for an interview&lt;/a>.&lt;/p>
&lt;p>So was I using confidential information in my tech evangelism?!&lt;/p>
&lt;p>Well, probably not, but this does raise some interesting questions.&lt;/p>
&lt;p>Here&amp;rsquo;s the facts of the case.&lt;/p></description></item><item><title>Forcing journalist to reveal sources will be bad--for the government!</title><link>https://keithrozario.com/2016/02/forcing-journalist-sources-government-anonymity-ag-azalina/</link><pubDate>Tue, 09 Feb 2016 19:21:19 +0000</pubDate><guid>https://keithrozario.com/2016/02/forcing-journalist-sources-government-anonymity-ag-azalina/</guid><description>&lt;p>Our spanking new, hand-picked Attorney-General is proposing life imprisonment for journalist who refuse to reveal their sources.&lt;/p>
&lt;p>And surprisingly, my favorite Member of Parliament,&lt;a href="https://www.keithrozario.com/2015/12/malaysia-spyware-hacking-team.html">Dato Azalina Othman&lt;/a>, has supported the move, saying it was &amp;lsquo;high-time&amp;rsquo; Malaysian did something. Fortunately, some calmer more rationale heads, like Dato Paul Low have &lt;a href="http://www.themalaysianinsider.com/malaysia/article/ministers-clash-over-a-gs-plan-to-reign-in-info-leakers">criticized the A-G&lt;/a> for his short-sighted stupidity.&lt;/p>
&lt;p>Putting aside the fact that anonymity of sources is a &lt;a href="https://www.article19.org/pages/en/protection-of-sources-more.html">core component of Press freedom&lt;/a>, it&amp;rsquo;s easy to extrapolate how harsher punishment for journalists who keep their sources anonymous will back-fire spectacularly for the Government.&lt;/p>
&lt;p>If sources know that Journalist will be pressured to reveal their identities, most sources will stop speaking journalist, thereby stemming the leakages from the government, and keeping the status quo.Or so the theory goes&amp;hellip;&lt;/p></description></item><item><title>Being Terrified: The price of terrorism</title><link>https://keithrozario.com/2016/02/being-terrified-the-price-of-terrorism/</link><pubDate>Mon, 08 Feb 2016 18:58:35 +0000</pubDate><guid>https://keithrozario.com/2016/02/being-terrified-the-price-of-terrorism/</guid><description>&lt;p>Next week, I&amp;rsquo;ll be on BFM for an interview about spyware, which will be my last &lt;em>&lt;strong>Hail Mary&lt;/strong> &lt;/em>play to get a conversation started about the use of surveillance software by the Government. If a radio interview on a popular station won&amp;rsquo;t do it, nothing on my blog will possibly be able to anyway :)&lt;/p>
&lt;p>In any case, this post is a pre-emptive response to a slightly controversial idea that I cover (very briefly) in the interview, and hopefully it can be articulated better here than in a radio segment. To be honest, I haven&amp;rsquo;t fully thought this through, but I believe it at least some some aspects of truth that deserve further attention.&lt;/p>
&lt;p>The Idea comes in 3 parts:&lt;/p>
&lt;ol>
	&lt;li>Terrorism has changed dramatically with ISIS (or Daesh)&lt;/li>
	&lt;li>Our conventional approach to surveillance will be ineffective against this new threat&lt;/li>
	&lt;li>Our surveillance-based response to the new threat may end up hurting us more than ISIS ever could&lt;/li>
&lt;/ol>
Let's go through them one at a time</description></item><item><title>Medium blocked: Collateral Censorship vs. Collateral Freedom</title><link>https://keithrozario.com/2016/01/medium-blocked-collateral-censorship-vs-collateral-freedom/</link><pubDate>Sun, 24 Jan 2016 16:53:23 +0000</pubDate><guid>https://keithrozario.com/2016/01/medium-blocked-collateral-censorship-vs-collateral-freedom/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Makluman-Notification-2015-07-19-21-49-53.png"
 alt="Website Blocked"
 
 loading="lazy"
 />&lt;/p>
&lt;p>So the buzz around twitter is that &lt;a href="http://medium.com" target="_blank">Medium.com&lt;/a> has been blocked by the Malaysian Authorities, and guess what? It&amp;rsquo;s true.&lt;/p>
&lt;p>It was expected, after all Medium is where the &amp;lsquo;infamous&amp;rsquo; Clare Rewcastle Brown uploads her articles to circumvent censorship of her own site, the equally diabolical SarawakReport.org.&lt;/p>
&lt;p class="promo-subtitle">Medium is like twitter without the character limits, and it's quite a cool site to just browse around and look for interesting articles to read, The platform claims to be &lt;em>"community of readers and writers offering unique perspectives on ideas large and small"&lt;/em>.&lt;/p>
A lot of successful writers and bloggers have taken to Medium to host their content, including Stephen Levy, the author of &lt;em>In the Plex&lt;/em>, one of my favorite books on Google. He's using it (and &lt;strong>only &lt;/strong>it) to start a Tech Hub  for his content, and placing it alongside millions of other articles contributed by both professional and amateur writers.
&lt;p>So it made sense for SarawakReport to take their content to Medium. After all, most of their readership is Malaysian, and since Malaysian ISPs &amp;lsquo;censored&amp;rsquo; their content, using a neutral &amp;lsquo;un-censored&amp;rsquo; platform like Medium was a perfect solution&amp;mdash;well almost perfect!&lt;/p>
&lt;p>It&amp;rsquo;s a phenomenon called &amp;lsquo;collateral freedom&amp;rsquo;, and for a while SarawakReport readers, and Malaysian internet users enjoyed that collateral freedom, Medium was free and un-censored, which made Sarawark also free and un-censored as long as it was on the platform.&lt;/p></description></item><item><title>The Government doesn't buy spyware--yea right!</title><link>https://keithrozario.com/2015/12/malaysia-spyware-hacking-team/</link><pubDate>Wed, 30 Dec 2015 00:28:44 +0000</pubDate><guid>https://keithrozario.com/2015/12/malaysia-spyware-hacking-team/</guid><description>&lt;blockquote>The Government has denied buying spyware from hacking team, they really should have checked with me before issuing the statement.&lt;/blockquote>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/314989744_5b5a852b47_z-300x200.jpg"
 alt="Spying Program"
 
 loading="lazy"
 />&lt;/p>
&lt;p>On the 23rd of November 2015, Datuk Seri Azalina Othman Said denied that the Malaysian government had procured spyware from hacking team. In a formal response (in Parliament!!), the Minister simply stated &lt;em>&amp;ldquo;For your information, no such device was purchased by the Prime Minister’s Department&amp;rdquo;&lt;/em>.&lt;/p>
&lt;p>For &lt;strong>YOUR&lt;/strong> information, dear Minister, I don&amp;rsquo;t like being lied to, and oh look there&amp;rsquo;s a flying pig by the window.Next time ask your PR guys to call me before you go setting your pants on fire.&lt;/p>
&lt;p>Ok folks, here&amp;rsquo;s a step-by-step on why we can trust the hacking team leak, why there&amp;rsquo;s conclusive proof Malaysia bought this spyware, and why we should be worried about the manner in which it is being used. So let&amp;rsquo;s go.&lt;/p></description></item><item><title>The PM's year end cyber-security message</title><link>https://keithrozario.com/2015/12/najib-razak-cybersecurity-year-end-message-malaysia/</link><pubDate>Fri, 04 Dec 2015 08:00:46 +0000</pubDate><guid>https://keithrozario.com/2015/12/najib-razak-cybersecurity-year-end-message-malaysia/</guid><description>&lt;p>From: &lt;a href="mailto:jibby@Malaysia.gov">jibby@Malaysia.gov&lt;/a>
Sent: 23 Dec 2015
To: &lt;a href="mailto:orangbawah@Malaysia.gov">orangbawah@Malaysia.gov&lt;/a>
Subject: Cybersecurity Year end message.&lt;/p>
&lt;h6>&lt;span style="text-decoration: underline;">*This message is intended for all Malaysian Government servants only, do not forward without prior approval*&lt;/span>&lt;/h6>
Greetings and Salam 1Malaysia.
&lt;p>I want to use this year-end as an opportunity to discuss the important topic of Cybersecurity. This year was interesting for me personally, and for all Malaysians, and we need to be aware of cybersecurity issues in order to avoid situations where some people go &lt;a href="http://www.themalaysianinsider.com/malaysia/article/charles-moraiss-lawyer-americk-quizzed-2-hours-over-pen-drive">bat crazy over a missing pendrive&lt;/a>, or we&amp;rsquo;re struggling to interrogate a sysadmin in Thailand.&lt;/p>
&lt;p>But let&amp;rsquo;s start with a Government Linked Company, Malaysian Airlines (MAS).&lt;/p>
&lt;p>In February, MAS had their &lt;a href="http://www.themalaymailonline.com/malaysia/article/mas-website-hacked-with-words-isis-will-prevail">website hacked&lt;/a> by a group calling themselves Lizard Squad, which appeared at the time to be affiliated with ISIS. However, I confirmed with my pal Badghdadi that Lizard squad are in no way related to our good friends at the Caliphate, and we should continue striving to be as &lt;a href="http://www.themalaymailonline.com/malaysia/article/be-brave-like-isil-fighters-najib-tells-umno">brave as them.&lt;/a>&lt;/p>
&lt;p>Delving deeper into the hack, revealed it to be a &lt;a href="https://www.keithrozario.com/2015/01/mas-hack-lizard-squad-ddos-malaysia.html">domain registrar hijack&lt;/a>, and was &lt;strong>not&lt;/strong> a result of inadequate security from MAS. Essentially MAS registered their website with a registrar, and it was that registrar which was hacked, not MAS themselves. Let that be a lesson for us all, sometimes the responsibility of security rest not just with us, but with our IT vendors as well.&lt;/p>
&lt;p>Another good example of IT vendors completely messing up is Miliserv.&lt;/p></description></item><item><title>Hackers and terrorist</title><link>https://keithrozario.com/2015/11/hackers-and-terrorist/</link><pubDate>Mon, 23 Nov 2015 20:29:09 +0000</pubDate><guid>https://keithrozario.com/2015/11/hackers-and-terrorist/</guid><description>&lt;p>[caption id=&amp;ldquo;attachment_5307&amp;rdquo; align=&amp;ldquo;aligncenter&amp;rdquo; width=&amp;ldquo;550&amp;rdquo;]&lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/ardit_ferizi_isis_hacker-police_dept_pic-161015.jpg"
 alt="Tip to newsmenL Next time blur out the photos and names on the ID tags as well."
 
 loading="lazy"
 />&lt;/p>
&lt;p>Pic from TheMalaysianInsider, Tip to newsmen: Next time blur out the photos and names on the ID tags as well.[/caption]&lt;/p>
&lt;p>There is no greater danger of tech illiteracy, than the way we treat hackers. A society that doesn&amp;rsquo;t understand technology will view those who can manipulate it as wizards and sorcerers.&lt;/p>
&lt;p>Technology sufficiently advanced is indistinguishable from magic, and to most people that bar of being &amp;lsquo;sufficiently advanced&amp;rsquo; isn&amp;rsquo;t set very high.&lt;/p>
&lt;p>The magic analogy is apt, even in fiction, wizards are treated either with  awe, ala Harry Potter and the muggles, or disdain ala the Salem witch trials, where ignorance bred fear, which in turn led to persecution.&lt;/p>
&lt;p>Regular readers of this blog will know Kevin Mitnick, the grand-daddy of hackers, who was once &lt;em>rumored&lt;/em> to be able to launch a nuclear missile by whistling into a phone. Not only was the rumor patently false, it nudged Judges in American courts to deny him a bail hearing, something guaranteed to Mitnick by the countries Federal Constitution. Prosecutors quickly learnt that if you throw around words like &lt;em>Hacker&lt;/em> and &lt;em>Nuclear&lt;/em>, Judges will willingly jettison constitutional protections quicker than Han Solo can dump cargo to make the jump to light speed.&lt;/p>
&lt;p>In the absence of a nuclear threat, law enforcement agencies have begun using terrorism, and found it equally effective in demonizing hackers and anyone else who could do seemingly magical things with bit and bytes on a computer screen.&lt;/p></description></item><item><title>The problem with bio-metrics</title><link>https://keithrozario.com/2015/10/the-problem-with-bio-metrics/</link><pubDate>Sun, 18 Oct 2015 15:59:49 +0000</pubDate><guid>https://keithrozario.com/2015/10/the-problem-with-bio-metrics/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/8229504229_47a07ff41f_z-300x200.jpg"
 alt="8229504229_47a07ff41f_z"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Passwords have always been a problem.&lt;/p>
&lt;p>For a password to be adequately secure, you need a certain amount of randomness &lt;em>(or entropy in geek)&lt;/em> associated with the password to ensure it can&amp;rsquo;t be easily guessed. The password &lt;strong>monkey&lt;/strong> is less secure than the password &lt;strong>k3ithI$one$3xydev1l, &lt;/strong>but the latter is inherently harder to remember (although still very true).&lt;/p>
&lt;p>Remember you should use a different password for each online service you subscribe to, Your Jobstreet credentials should be different from your banking credentials. This way, if someone hacks into Jobstreet and compromises their passwords, your banking credentials remain secure.&lt;/p>
&lt;p>What people often do is re-use one password across all their services, so that a compromise on one service is as good as a full-blown compromise across their entire online identity, a hack on that nutrition forum you visited two years could cause you to lose your life savings.&lt;/p>
&lt;p>There in lies the trade-off, a easier to remember password is also easier to guess, and hence easier to hack (&lt;em>Google &amp;rsquo;the fappening&amp;rsquo; if you need more convincing&lt;/em>), while a hard to guess password is harder to remember, and near impossible to execute if you need remember a different password for each your online services.&lt;/p>
&lt;p>Which suggest that the problem isn&amp;rsquo;t passwords per se, but rather our human inability to remember long un-guessable passwords. Computers have long out-stripped us in this arena, and trying to overcome that is pretty much unthinkable at this point.&lt;/p>
&lt;p>But what is the solution then? Well, in general we have 2 partial solutions.&lt;/p></description></item><item><title>Ransomware</title><link>https://keithrozario.com/2015/10/ransomware/</link><pubDate>Mon, 12 Oct 2015 11:44:34 +0000</pubDate><guid>https://keithrozario.com/2015/10/ransomware/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/ransomware.jpg"
 alt="ransomware"
 
 loading="lazy"
 />&lt;/p>
&lt;p>By now, you either know someone that&amp;rsquo;s been a victim of nasty malware or have yourself been on the business end of nefarious software. The perpetual duel between security companies and malicious elements in cyberspace has changed dramatically over time, and no change has been so dramatic as the rise of a new type of threat, a threat we call&amp;hellip;ransomware!!&lt;/p>
&lt;h2>...but what is Ransomware?&lt;/h2>
Ransomware is piece of nefarious code that infects your machine the same way any ordinary virus or spyware would. But what differentiates it from other threats is what it does after its infected a system.
&lt;p>Ransomware immediately seeks out specific file types like Microsoft Documents, Excel Spreadsheets, digital pictures, all for the purpose of encryption. Different Ransomwares target different file types, but the idea is behind it is to seek out these files that are considered particularly valuable to the user, and one that a user would pay lots of money to retrieve if ever lost. These files are then quickly encrypted using &amp;lsquo;bank-level&amp;rsquo; encryption ciphers making them un-readable to the user.&lt;/p>
&lt;p>Once the files are &amp;lsquo;safely&amp;rsquo; encrypted, the user is usually prompted with the&amp;ndash;Pay us money or never see your files again!!&lt;/p>
&lt;p>The famous (or infamous) cryptolocker, would request payments only in bitcoin, before the decryption key would be released to the user, the malware has kidnapped your files and the only way to get them back is to pony up the cash.&lt;/p>
&lt;p>In essence, cryptolocker held your files from ransom, in much the same way kidnappers hold kids for ransom in those hollywood movies, but unlike hollywood this is real, and the one and only way to get back the files is either pray for a miracle, or make the payment.&lt;/p></description></item><item><title>Hacking Government, Malaysian Style</title><link>https://keithrozario.com/2015/10/hacking-government/</link><pubDate>Fri, 02 Oct 2015 10:39:38 +0000</pubDate><guid>https://keithrozario.com/2015/10/hacking-government/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/hacking-government.jpg"
 alt="hacking-government"
 
 loading="lazy"
 />&lt;/p>
&lt;p>The simplest definition of a hacker, is someone who breaks systems. We tend to equate systems to computers, but that&amp;rsquo;s a limited definition of the term. A system can also refer to a legal system or a set of processes that have nothing to do with technology.&lt;/p>
&lt;p>For example, lawyers often hack around the law, looking for loopholes to exploit to give them an advantage in their case. A good lawyer is expected to work within the legal system of a country, but still try to bend it a wee bit for their clients. He&amp;rsquo;s not breaking the law, merely hacking it for his own good.&lt;/p>
&lt;p>In the technology world, we sometimes define hackers as those to attempt to gain un-authorized access to computers, in other words an attacker that&amp;rsquo;s able to circumvent security measures of a server to gain access. This bypassing of security measures it what makes a hacker&amp;ndash;but how does it reflect in a legal context?&lt;/p></description></item><item><title>How corporations lie to the technologically challenged</title><link>https://keithrozario.com/2015/09/how-corporations-lie-to-the-technologically-challenged/</link><pubDate>Mon, 28 Sep 2015 11:50:39 +0000</pubDate><guid>https://keithrozario.com/2015/09/how-corporations-lie-to-the-technologically-challenged/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/wpid-wp-1442992521638-1-300x170.jpeg"
 alt="wpid-wp-1442992521638 (1)"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Two weeks ago, Lowyat.net published a &lt;a href="http://www.lowyat.net/2015/74092/can-you-break-these-codes/">&amp;lsquo;challenge&amp;rsquo;&lt;/a> to their readers, one that would supposedly pay a cool RM100,000 to the winner.All you had to do was decrypt an AES-256 encoded blob of code (more accurately referred to as ciphertext).&lt;/p>
&lt;p>As expected, no one won.&lt;/p>
&lt;p>Because breaking that &amp;lsquo;military-grade&amp;rsquo; encryption is beyond the capability of most normal human beings, and certainly not worth a paltry RM100,000 that was being offered. It&amp;rsquo;s the equivalent of offering 50 cents for someone to build a rocket capable of going to the moon. In fact, Rm100,000 is exactly the cash prize celcom offered for it&amp;rsquo;s cupcake challenge, because baking cup-cakes and breaking &amp;lsquo;military-grade&amp;rsquo; encryption are the same thing.&lt;/p>
&lt;p>Once the challenge has expired, Celcom conveniently launched their new &lt;a href="http://www.lowyat.net/2015/75604/celcom-launches-zipit-chat-a-new-chat-app-that-boasts-military-grade-aes256-encryption/">zipit chat application&lt;/a>, which surprisingly used AES-256 encryption as well, and more importantly they released some statistics of a &amp;lsquo;hackerthon&amp;rsquo; they conducted in which 18 Million people viewed the challenge, and 17,000 registered to participate but none succeeded.&lt;/p>
&lt;p>OK, so while there was no official announcement from Celcom to tie the original lowyat challenge to their new zipit app, it was quite plain for all to see.&lt;/p>
&lt;p>So let&amp;rsquo;s go into why this upsets me.&lt;/p></description></item><item><title>Why we fear 'hackers': Dangers of Technical Illiteracy</title><link>https://keithrozario.com/2015/08/why-we-fear-hackers-dangers-of-technical-illiteracy/</link><pubDate>Sun, 23 Aug 2015 20:00:56 +0000</pubDate><guid>https://keithrozario.com/2015/08/why-we-fear-hackers-dangers-of-technical-illiteracy/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/anonymousmask380-300x225.jpg"
 alt="anonymousmask380-300x225"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Are you afraid of Hackers? Do you lie restless at night thinking of what might happen if they got into your bank account, facebook profile, or e-mail. Perhaps you&amp;rsquo;re also worried about that they might hack into a forum you visit, or that they might get into your personal messages on whatsapp.&lt;/p>
&lt;p>It&amp;rsquo;s true that hackers are able to do all of these things, but the public perception of hackers really isn&amp;rsquo;t quite justified, and this false perception can lead to terrible outcomes.&lt;/p>
&lt;p>Take last weeks post about the hacktivist group Anonymous. In it I expanded on the public fear of anonymous and how that didn&amp;rsquo;t correspond to the actual damage that the group causes. Sometimes all Anonymous does is a DDOS on a public website, that still takes some skill, but far removed from actually infiltrating a server. Yet, most people wouldn&amp;rsquo;t be able to differentiate a DDOS attack of a website to a compromise of an actual server, and this inability leads then to disproportionately fear hackers, worse still it leads them to lump all security related incidences into a single bucket called &amp;ldquo;hacked by hackers&amp;rdquo;.&lt;/p>
&lt;p>But Why?&lt;/p>
&lt;p>Why are people so afraid of hackers? And why is there a huge discrepancy between what some of these hackers are actually doing and the fear that the average citizen has of them.&lt;/p>
&lt;p>I have one theory&amp;ndash;ignorance, or more specially tech-illiteracy.&lt;/p></description></item><item><title>Our Communication Minister must be mistaken</title><link>https://keithrozario.com/2015/08/our-communication-minister-must-be-mistaken/</link><pubDate>Tue, 18 Aug 2015 23:17:23 +0000</pubDate><guid>https://keithrozario.com/2015/08/our-communication-minister-must-be-mistaken/</guid><description>&lt;p>Our newly appointed Communication Minister has come out all guns blazing in directing the The Malaysian Communications and Multimedia Commission (MCMC) to ask social media giants such as Facebook, Google and Twitter soon to block “false information and rumours” on their platforms.&lt;/p>
&lt;p>That in itself is quite frustrating, but what really got me scratching my head was his claim that &amp;ldquo;that social media providers acted on 78 per cent of MCMC’s request for removal of content last year, with Facebook taking action on around&lt;strong> 81 per cent of its request&lt;/strong>.&amp;rdquo;&lt;/p></description></item><item><title>Should an IP address be used to Identify someone?</title><link>https://keithrozario.com/2015/04/ip-address-uniquely-identify-law/</link><pubDate>Wed, 29 Apr 2015 11:00:29 +0000</pubDate><guid>https://keithrozario.com/2015/04/ip-address-uniquely-identify-law/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Slide2-1024x576.jpg"
 alt="How IP addressing works"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Recently a court in Malaysia ruled that the newly amended evidence act could presume an IP address would uniquely identify a user of a network, and in the case of an Internet IP address, enough to tie an IP to the individual subscriber. In other words if the authorities ever found out that &amp;lsquo;your&amp;rsquo; IP address was behind a post, then you&amp;rsquo;d have to prove it wasn&amp;rsquo;t you rather than they having to prove it was.&lt;/p>
&lt;blockquote>In &lt;strong>Tong Seak Kan &amp;amp; Anor v Loke Ah Kin &amp;amp; Anor [2014] 6 CLJ 904&lt;/strong>, the Plaintiffs initiated an action for cyberspace defamation against the 1st Defendant.   In tracing the perpetrator, who had posted defamatory statements on two Google Blogspot websites, the Plaintiffs filed an action called &lt;strong>a John Doe action in the Superior Court of California&lt;/strong>.   In compliance with the court order, &lt;strong>Google traced the blogs to two IP (Internet Protocol) addresses which were revealed by Telekom Malaysia Bhd to be IP addresses belonging to the 1st Defendant’s account&lt;/strong>.
&lt;p style="text-align: right;">&lt;a href="https://www.digitalnewsasia.com/insights/bread-kaya-malaysian-cyberlaw-cases-in-2014" target="_blank">Bread &amp;amp; Kaya: Malaysian cyberlaw cases in 2014&lt;/a>&lt;/p>
&lt;/blockquote>
Upon further reading of the post on DigitalNewsAsia, my non-lawyer mind got the feeling it didn't end well for Loke Ah Kin &amp;amp; Anor as the court decided they were guily of defamation based on a flimsy piece of evidence like the IP address of the user who posted blogspot.
&lt;p>I&amp;rsquo;m uncomfortable that a court of law could find someone guilty based on something as trivial as an IP address, when other courts around the world have ruled that IP addresses are insufficient for this purpose.&lt;/p></description></item><item><title>Jho Low uses Gmail? Why emails can't be considered evidence</title><link>https://keithrozario.com/2015/03/jho-low-uses-gmail/</link><pubDate>Sat, 07 Mar 2015 15:11:26 +0000</pubDate><guid>https://keithrozario.com/2015/03/jho-low-uses-gmail/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/15197804185_d4a1f3d9b3_m.jpg"
 alt="15197804185_d4a1f3d9b3_m"
 
 loading="lazy"
 />&lt;/p>
&lt;p>As the 1MDB fiasco begins to simmer over the political stove, I wanted to inject some technical information into this discussion, specifically around emails and how they&amp;rsquo;re almost useless pieces of evidence.&lt;/p>
&lt;p>Just to make sure everyone&amp;rsquo;s on the same page, here&amp;rsquo;s some context.&lt;/p>
&lt;p>In early March 2015, sarawakreport.org, a website run by investigative journalist Clare Rewcastle-Brown together with the London Sunday Times, published an article on controversial deal done by the 1MDB fund. At the centre of the deal was a man named Jho Low, who masterminded a sophisticated &amp;lsquo;wheeler-dealer&amp;rsquo; that pocketed him $700 Million, all of which (at least according to sarawakreport.org) was siphoned from 1MDB, a Malaysian sovereign wealth fund.&lt;/p>
&lt;p>Honestly, I don&amp;rsquo;t understand the financially complex deals that sarawakreport.org was trying to explain to lil ol&amp;rsquo; me. So I&amp;rsquo;m just going to take her word here, that all the documentation that was produced leads to the conclusion that Jho Low masterminded the &amp;ldquo;Heist of the Century&amp;rdquo; by stealing $700 million through shady back door deals involving 1MDB and a company called PetroSaudi. But then of course, the question becomes, can you trust the documentation.&lt;a href="https://keithrozario.com/uploads/Layers-of-the-Internet.jpg">
&lt;/a>&lt;/p>
&lt;p>Reading the article you get the sense that the e-mail trail presented forms the backbone of the entire story, and if the emails themselves are not true then the entire story is untrue as well.&lt;/p>
&lt;p>In either case though, let&amp;rsquo;s get straight to the point, and say that e-mails by themselves are quite useless.&lt;/p></description></item><item><title>MyProcurement: All government tenders in one Excel file</title><link>https://keithrozario.com/2014/09/myprocurement-all-government-tenders-in-one-excel-file/</link><pubDate>Tue, 16 Sep 2014 22:54:40 +0000</pubDate><guid>https://keithrozario.com/2014/09/myprocurement-all-government-tenders-in-one-excel-file/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/MyPROCUREMENT-Pusat-Maklumat-Perolehan-Kerajaan.png"
 alt="MyProcurement"
 
 loading="lazy"
 />&lt;/p>
&lt;blockquote>&lt;span style="color: #99ccff;">I've updated this post on 31-Mar-2015, to incorporate the latest changes, and to provide more up to data info on the procurement database. Left everything else in tact.&lt;/span>&lt;/blockquote>
Happy birthday Malaysia!! Just how awesome is our country, that we celebrate an Independence Day AND a Malaysia Day, not to mention 2 New years day, (or 3 if you count Awal Muharram).
&lt;p>So on that note, I decided to use my IT skills for the good of the country.&lt;/p>
&lt;p>To be honest, my IT skills have never been up to par, my day job is more managing/planning/documenting than actual execution of &amp;lsquo;real&amp;rsquo; IT work. But it was good for me to dust of the ol&amp;rsquo; programming fingers and learn Python to grab some publicly available information and make it more accessible to the less IT centric members of society.&lt;/p>
&lt;p>Since I had limited time, and sub-par skills, I decided to set my sights low, and aim to extract all the data from the Malaysian &lt;a title="Myprocurement" href="http://myprocurement.treasury.gov.my/" target="_blank">MyProcurement&lt;/a> portal, which houses all the results of government tenders (and even direct negotiations) in one single website for easy access. The issue I had with the portal though, was that it only displayed 10 records at a time&amp;ndash;from it&amp;rsquo;s 10,000+ record archive, so there was no way to develop insights into the data from the portal directly, you had to extract it out, but the portal provider did not provide a raw data dump to do this.&lt;/p>
&lt;p>So I wrote a simple Python script to extract all the data, and prettified the data in Excel offline. The result is a rather mixed one.&lt;/p>
&lt;p>I was happy that I could at least see which Ministeries or Government departments gave out the most contracts, and what the values of those contracts were. All in all, the excel spreadsheet has more than 10,000 tenders with a cumulative value of RM35 billion worth of contracts going back to 2009. The data allowed me to figure out which Ministry gave out the most contracts, the contracts with the highest and lowest value (including one for Rm0.00, and one for just Rm96.00). All in all it was quite informative.&lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Results_by_ministry_hu_7097349aaa97625.png"
 srcset="
 /uploads/Results_by_ministry_hu_18d57172f201e097.png 480w,
 /uploads/Results_by_ministry_hu_7097349aaa97625.png 768w,
 /uploads/Results_by_ministry_hu_c1117c7aa1d4aab4.png 1024w,
 /uploads/Results_by_ministry.png 1165w"
 sizes="(max-width: 480px) 480px, (max-width: 768px) 768px, (max-width: 1024px) 1024px, 100vw"
 alt="Results_by_ministry"
 
 loading="lazy"
 />&lt;/p></description></item><item><title>Is Malaysia's Broadband slow--no it isn't.</title><link>https://keithrozario.com/2014/09/is-malaysias-broadband-slow-no-it-isnt/</link><pubDate>Sun, 14 Sep 2014 23:31:20 +0000</pubDate><guid>https://keithrozario.com/2014/09/is-malaysias-broadband-slow-no-it-isnt/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Broadband_speed_klang_malaysia.png"
 alt="Broadband_speed_klang_malaysia"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Recently KiniBiz did a piece on Malaysian broadband speeds, and once again the&lt;a title="Local broadband speeds slower than Cambodia: Why it doesn’t matter" href="http://www.keithrozario.com/2014/05/malaysia-broadband-slow-cambodia-ookla.html"> hoopla about how Malaysian broadband speeds are slow&lt;/a> arose. Kinibiz quoted an article from Asean DNA which stated that the average broadband speed in Malaysia was &lt;em>just&lt;/em> 5.5 Mbps, while Thailand, Vietnam and Singapore had speeds that were double that (or more!)&lt;/p>
&lt;p>The report however was inaccurate, and I think there&amp;rsquo;s a need to address the hoopla, because this happens often. There was a report couple months back that said Cambodia had faster speeds than Malaysia, and I &lt;a title="Local broadband speeds slower than Cambodia: Why it doesn’t matter" href="http://www.keithrozario.com/2014/05/malaysia-broadband-slow-cambodia-ookla.html">wrote a post addressing that&lt;/a>. This time I think, we have to really go into the data and find out what exactly is going on.&lt;/p>
&lt;p>So let&amp;rsquo;s start at the source of this data.&lt;/p>
&lt;p>The data was built from billions of download test conducted by users throughout the world on &lt;a title="Speedtest" href="http://www.speedtest.net" target="_blank">speedtest.net&lt;/a> &lt;em>(a website that allows users to test the speed of their internet connection)&lt;/em>. This dataset is HUGE!, one of the biggest I&amp;rsquo;ve seen and definitely the biggest I&amp;rsquo;ve had the pleasure to play around with. Just one file in the set had more than 33 Million rows and weighed in at more than 3.5GB.It took me some time and lots of googling just to figure out how to deal with a csv file this large. Fortunately, there&amp;rsquo;s LogParser, but we&amp;rsquo;ll skip that tutorial for now and focus on the juicy details of data.&lt;/p>
&lt;p>The number reported by Asean DNA is wrong. The average internet speed in Malaysia isn&amp;rsquo;t 5.5Mbps, it&amp;rsquo;s more like 7.5Mbps.&lt;/p>
&lt;p>5.5 Mbps was obtained by averaging the speed across the regions of Malaysia (Kl, Alor Setar, Klang..etc) rather than by averaging the speed across all the test conducted by Malaysian users. In short, Asean DNA placed equal emphasis on Kuala Terengganu and Kuala Lumpur, although Kuala Lumpur had 50 times more test conducted. It would be like calculating GDP per state, rather than GDP per capita. The real per capita download speed in Malaysia is 7.5Mbps, rather than 5.5Mbps (if you limit yourself to just data from 2014).&lt;/p>
&lt;p>Here&amp;rsquo;s the breakdown. You can download the file from netindex.com or just use an&lt;a title="extract Malaysian speed test data" href="https://drive.google.com/file/d/0Bxr9pDWP2zrdeEhOZjNsaVNoT0k/edit?usp=sharing" target="_blank"> extract&lt;/a> I created with just the Malaysian data&amp;ndash;it took some time to do this so leave a Thank you in the comments if you downloaded the data.&lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Average-speed-internet-Malaysia.png"
 alt="Average-speed-internet-Malaysia"
 
 loading="lazy"
 />&lt;/p></description></item><item><title>A Techie's view on the Law</title><link>https://keithrozario.com/2014/09/a-techies-view-on-the-law/</link><pubDate>Mon, 08 Sep 2014 22:30:09 +0000</pubDate><guid>https://keithrozario.com/2014/09/a-techies-view-on-the-law/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/2283584007_f199332890_z-300x200.jpg"
 alt="2283584007_f199332890_z"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Are some laws worth following&amp;ndash;in other words, are some Laws so idiotic that they should be ignored completely?&lt;/p>
&lt;p>That sounds anathema, because we have a romanticized definition of the law, we define the Law as a broad general agreement a society undertakes, and the law keeps society from tearing itself apart. In other words, the law is so sacred because without it&amp;ndash;we descend into anarchy, so ignoring the law is akin to promoting anarchy.&lt;/p>
&lt;p>But I&amp;rsquo;m not speaking of &lt;span style="color: rgb(128, 128, 128);">&lt;em>&amp;ldquo;The Law&amp;rdquo;&lt;/em>&lt;/span>, I&amp;rsquo;m speaking of &lt;span style="color: rgb(128, 128, 128);">&lt;em>&amp;ldquo;A law&amp;rdquo;&lt;/em>&lt;/span>, specifically an Act of Parliament. &lt;em>&lt;span style="color: #808080;">&amp;ldquo;The Law&amp;rdquo;&lt;/span> &lt;/em>refers to a vast conglomeration of many things, including constitutions (state and Federal), statutes, precedence of case law and Acts of Parliament. I&amp;rsquo;m not sure what a statute is&amp;ndash;but I roughly know what an Act of Parliament is, and it surely isn&amp;rsquo;t a broad general agreement that society depends on to stave off Anarchy&amp;ndash;rather an act of Parliament is a law brought into effect by Parliament&amp;ndash;nothing more nothing less.&lt;/p>
&lt;p>To my techie mind, that means that 222 Members of the Malaysian Parliament got together to enact a piece of legislation. Romantically we think this is the people&amp;rsquo;s will&amp;ndash;the Rakyat voted these people into power and they now wield this power to enact laws that will protect the Rakyat. A glorious cycle of virtuosity that only democracy can deliver. That&amp;rsquo;s wishful thinking, realistically it&amp;rsquo;s a law brought into effect by 222 voting members of Parliament whose collective IQ would probably not exceed that of the Zoo.&lt;/p>
&lt;p>So when these 222 MPs ge t together and enact legislation to regulate technology&amp;ndash;I get a bit uncomfortable. Not only do most of them not have engineering qualifications, half of them don&amp;rsquo;t even have a website. Having these MPs enact legislation that will regulate a field they&amp;rsquo;re clueless about, is akin to getting open heart surgery from a car mechanic.&lt;/p>
&lt;p>On a side note, a techie like me has a hard time understanding why we have 222 seats in Parliament. It would seem, that in a first past the poll system, you&amp;rsquo;d want to have ODD number of seats, to avoid the situation where 111 members belong to Barisan, and the other 111 belong to Pakatan (what happens then?). That&amp;rsquo;s just ONE of the many things an engineer would quickly realize is wrong with the entire system&amp;ndash;and that&amp;rsquo;s why we only have 3 engineers in Parliament (at least according to the &lt;a title="Sinar Project" href="reps.sinarproject.org/mp" target="_blank">Sinar Project&lt;/a>).&lt;/p></description></item><item><title>CheDet on Censorship</title><link>https://keithrozario.com/2014/08/chedet-on-censorship/</link><pubDate>Mon, 04 Aug 2014 20:00:04 +0000</pubDate><guid>https://keithrozario.com/2014/08/chedet-on-censorship/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/3110643778_0de66a611c_z.jpg"
 alt="Tun Dr. M"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Tun Dr. Mahathir now says he&amp;rsquo;s change his mind about internet censorship. To quote him &lt;em>&amp;ldquo;Not knowing the power of the Internet, I promised that we (speaking as the Prime Minister of Malaysia) would not censor it. But today I have changed my mind.&amp;quot;&lt;/em>&lt;/p>
&lt;p>Of course, everyone has a right to change their mind&amp;ndash;but in this case Tun went from being absolutely spot-on (the internet doesn&amp;rsquo;t need censorship) to dead wrong.&lt;/p></description></item><item><title>Internet Censorship is an invasion of privacy</title><link>https://keithrozario.com/2014/04/internet-censorship-is-an-invasion-of-privacy/</link><pubDate>Sun, 06 Apr 2014 16:49:24 +0000</pubDate><guid>https://keithrozario.com/2014/04/internet-censorship-is-an-invasion-of-privacy/</guid><description>&lt;p style="text-align: center;">
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Censorship.jpg"
 alt="internet censorship"
 
 loading="lazy"
 />&lt;/p>
&lt;/p>
With the on-going debacle about the Kangkung saga dying down, I thought it would be a good opportunity to write specifically about internet censorship and its implications to ordinary Malaysian citizens. As you may well know, many Malaysia Netizens reported of difficulty accessing one particular post of the BBC website that dealt with the Kangkung issues, causing many to cite that Telekom Malaysia was actually censoring the internet--but what does internet censorship actually entail for Malaysia?
&lt;p>Let&amp;rsquo;s first take a step back, and understand how and Internet Service Provider (ISP) like Telekom Malaysia, Maxis or Digi operate.&lt;/p></description></item><item><title>Is it Root-er or Rao-ter : The age old question for the pronunciation of the word router</title><link>https://keithrozario.com/2014/03/rao-ter-root-ter/</link><pubDate>Mon, 03 Mar 2014 22:15:20 +0000</pubDate><guid>https://keithrozario.com/2014/03/rao-ter-root-ter/</guid><description>&lt;p style="text-align: center;">
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/dir-615.jpg"
 alt="dir-615"
 title="Rao-ter or Root-er : Pronunciation"
 loading="lazy"
 />&lt;/p>
&lt;/p>
&lt;p>Here&amp;rsquo;s an age old question, is it pronounced router (as in rao-ter) or is it router (as in root-er).&lt;/p>
&lt;p>A lot of people seem to think it depends where you are, if you&amp;rsquo;re in the US, it&amp;rsquo;s rao-ter, and if you&amp;rsquo;re in the UK it&amp;rsquo;s root-er. But the internet is global, it doesn&amp;rsquo;t care where you are, it doesn&amp;rsquo;t matter which culture you&amp;rsquo;re from, there can only be one answer to this question, and it must be location agnostic.&lt;/p></description></item><item><title>Why Dato' Sri Shabery Really wants to censor the internet</title><link>https://keithrozario.com/2013/07/why-shabery-really-wants-censor-internet/</link><pubDate>Tue, 30 Jul 2013 09:18:29 +0000</pubDate><guid>https://keithrozario.com/2013/07/why-shabery-really-wants-censor-internet/</guid><description>&lt;p>[box icont=&amp;ldquo;chat&amp;rsquo;]The social media in Malaysia is being monitored and existing laws are sufficient to weed out troublemakers trying to test the limits of free speech, Communications and Multimedia Minister Ahmad Shabery Cheek said today&amp;hellip;&lt;/p>
&lt;p>&amp;ldquo;The laws that we make are not to defend the party alone - that&amp;rsquo;s wrong,&amp;rdquo; Ahmad Shabery, who is also an Umno supreme council member, said.&lt;/p>
&lt;/blockquote>
&lt;p>In an attempt to curb internet freedom in Malaysia, the government is beginning a series of concerted statements to signal that internet censorship in Malaysia is merely a question of &amp;lsquo;when&amp;rsquo; rather than &amp;lsquo;if&amp;rsquo;. Previously I&amp;rsquo;ve explored why &lt;a title="Internet Censorship won’t work in Malaysia" href="http://www.keithrozario.com/2013/07/internet-censorship-wont-work-malaysia.html" target="_blank">internet censorship doesn&amp;rsquo;t alleviate or even mitigate the risk of communal violence&lt;/a>, yet the government still presses on with trying to censor the internet, apparently jumping on the opportunity of Alvivi to make their case stronger.&lt;/p>
&lt;p>So why is the government so enamoured by the thought of internet censorship, when clearly it doesn&amp;rsquo;t work?&lt;/p></description></item><item><title>The Security Offences Bill 2012 -Technology Perspective</title><link>https://keithrozario.com/2013/07/security-offences-bill-2012-special-measures-technology-perspective/</link><pubDate>Tue, 09 Jul 2013 08:00:17 +0000</pubDate><guid>https://keithrozario.com/2013/07/security-offences-bill-2012-special-measures-technology-perspective/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/government-eavesdropping.jpg"
 alt="Government Eavesdropping on your conversations"
 title="Government Eavesdropping on your conversations"
 loading="lazy"
 />&lt;/p>
&lt;p>The &lt;a title="Security Offences Bill 2012" href="https://www.keithrozario.com/wp-content/special-uploads/SOSMA (original).pdf">Security Offences (Special Measures) Act 2012&lt;/a> and it&amp;rsquo;s &lt;a href="https://www.keithrozario.com/wp-content/special-uploads/Sosma-Amendment.pdf">new amendment&lt;/a>. that wonderful piece of legislation meant to repeal the archaic and &amp;lsquo;draconian&amp;rsquo; ISA may turn out to be even more archaic and draconian than the ISA it was meant to replace.&lt;/p>
&lt;p>While much of the legal fanfare has been focusing on the detention without trial sections of the bill, as a tech blogger, I wanted to focus on the technical aspects of it. Specifically let&amp;rsquo;s focus on how the new law would allow the government to eavesdrop onto your internet communication without the authorization of any Judge or Judicial oversight. Now while, the public prosecutor, or Attorney General in this country isn&amp;rsquo;t specifically part of the government&amp;ndash;he (or she) is appointed by the Yang Di Pertuan Agong on the &amp;lsquo;advice&amp;rsquo; of the Prime Minister.&lt;/p>
&lt;p>The sections of the bill that focus on the interception of communication is both all-encompassing and far-reaching, giving far too much power to the Public Prosecutor to intercept your private conversations and web surfing habits, which is a gross invasion of privacy.&lt;/p>
&lt;h2>Power to intercept Communications&lt;/h2>
The act grants exceeding  powers to the Public Prosecutor, including the ability to authorize any police officer to intercept your postal letters, your internet conversations, you email and even your web surfing habits. This includes a list of the website you visits, and which comments you're posting on Malaysiakini.
&lt;p>On top of this, the Public Prosecutor has the legal authority to compel an ISP to intercept and retain any communication you performed for an unspecified amount of time. Which could be forever.&lt;/p>
&lt;p>Basically he can begin to ask Maxis or Unifi for the list of websites you visit, and your detailed online communications,  access to your emails, your friend list on facebook, your tweets and even your online files. Not even your online porn stash will be free from the prying eyes of the Public Prosecutor &lt;em>(not that I have one though&amp;hellip;just saying, I know a friend who does)&lt;/em>.&lt;/p>
&lt;p>All this without ever having to go to a Judge for judicial oversight. More importantly, anything collected in this way is deemed admissible as evidence in court, and no one will have to explain how the evidence was obtained. For all you know they could have placed webcams in your home, but they would would never have to explain this in court.&lt;/p>
&lt;p>What&amp;rsquo;s worse is that a Police Superintendent is granted similar powers when &amp;ldquo;&lt;em>immediate action is required leaving no moment of deliberation&lt;/em>&amp;rdquo;.&lt;/p>
&lt;p>We all understand the need for the Police and Public Prosecutors to do their job well, and they require tools to catch the bad guys. However, this grants them way too much power with regards to their ability to invade the privacy of personal citizens. I don&amp;rsquo;t want the Public Prosecutor or a curious Police Superintendent snooping on my internet conversations, and yet the new Special offences act allows them to do that&amp;ndash;legally!&lt;/p></description></item><item><title>Should the government use Microsoft products?</title><link>https://keithrozario.com/2013/07/should-malaysia-government-use-microsoft-products/</link><pubDate>Tue, 02 Jul 2013 08:00:26 +0000</pubDate><guid>https://keithrozario.com/2013/07/should-malaysia-government-use-microsoft-products/</guid><description>&lt;p>[box icon=&amp;ldquo;chat&amp;rdquo;] I don’t think the US government should use operating systems made in China for the same reason that most governments shouldn&amp;rsquo;t use operating systems made in the US and in fact we just got proof since Microsoft is now known to be telling the NSA about bugs in Windows before it fixes them.&lt;/p>
&lt;p>&lt;em>-Richard Matthew Stallman founder of &lt;a title="Free Software Foundation" href="https://en.wikipedia.org/wiki/Free_Software_Foundation">Free Software Foundation&lt;/a>
(&lt;a title="RMS on the cloud" href="http://techrights.org/2013/06/27/techbytes-episode-79/" target="_blank">Techbytes interview&lt;/a>)&lt;/em>&lt;/p>
&lt;/blockquote>
&lt;p>In what appears to be open-season on the NSA and Tech Companies, &lt;a title="Bloomberg Microsoft bugs" href="http://www.bloomberg.com/news/2013-06-14/u-s-agencies-said-to-swap-data-with-thousands-of-firms.html" target="_blank">Bloomberg has joined in with a report of their own,&lt;/a> implicating that Microsoft provides US  intelligence agencies with information about bugs in its popular software before it publicly releases a fix. In other words, Microsoft grants special access to the likes of the NSA to poke around in the nearly 1 Billion users of Microsoft software via newly discovered bugs&amp;mdash;long before Microsoft report it to the public and eventually patch the bug.&lt;/p></description></item><item><title>Part 3: PRISM and Upstream</title><link>https://keithrozario.com/2013/06/prism-upstream-data-transit-rest/</link><pubDate>Fri, 28 Jun 2013 08:00:11 +0000</pubDate><guid>https://keithrozario.com/2013/06/prism-upstream-data-transit-rest/</guid><description>&lt;p>Initially I wrote about PRISM and how a lot of people felt it was a tool to&lt;a title="What is PRISM?" href="http://www.keithrozario.com/2013/06/what-is-prism.html" target="_blank"> intercept communication in flight&lt;/a> to companies like Google and Facebook, however slightly more details have emerged to debunk that claim.&lt;/p>
&lt;p>However, it&amp;rsquo;s of paramount importance that we understand what people are saying. No one is denying that communications aren&amp;rsquo;t being intercepted on their way to Google, Facebook or Apple, instead what they are denying is that the capability to perform that interception and storage is under purview of another program called Upstream, and that analyst like Edward Snowden at the NSA were encouraged to use &lt;strong>both &lt;/strong>PRISM and UPSTREAM.&lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/PRISM-and-Upstream.jpg"
 alt="PRISM and Upstream"
 
 loading="lazy"
 />&lt;/p>
&lt;p>What the crudely drawn powerpoint on the left is trying to describe is the distinct-ness of the programs and how each program would complement (rather than replace) the other.&lt;/p>
&lt;p>The release of this particular slide was done shortly after the initial news broke to&lt;em>, in the interests of aiding the debate over how Prism works. &lt;/em>&lt;/p>
&lt;p>The Guardian have intentionally redacted some of the program names from the slide, presumably in an effort to milk this story dry for all that it&amp;rsquo;s worth, but probably also to keep the momentum of the debate just in case people move on. However,&lt;a title="Guardian slide-41" href="http://www.guardian.co.uk/world/2013/jun/08/nsa-surveillance-prism-obama-live#block-51b36893e4b0cc6424372292" target="_blank"> in their own words&lt;/a> the slide:&lt;/p>
&lt;p>&lt;em>details different methods of data collection under the FISA Amendment Act of 2008 (which was renewed in December 2012). It clearly distinguishes Prism, which involves data collection from servers, as distinct from four different programs involving data collection from &amp;ldquo;fiber cables and infrastructure as data flows past&amp;rdquo;.&lt;/em>&lt;/p>
&lt;p>The of course points to separate approaches, one where information is accessed directly from the servers their stored in (data at rest), and one where information is collected while in transit (data in transit).&lt;/p>
&lt;p>This distinction resonated with me, simply because I read about this a couple of months back when another wanted man name Kim Schmitz was making the news instead of one Edward Snowden.&lt;/p></description></item><item><title>PRISM and Tempora</title><link>https://keithrozario.com/2013/06/prism-tempora/</link><pubDate>Wed, 26 Jun 2013 08:00:02 +0000</pubDate><guid>https://keithrozario.com/2013/06/prism-tempora/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/images4.jpg"
 alt="GCHQ Mastering the Internet"
 
 loading="lazy"
 />&lt;/p>
&lt;p>As Edward Snowden begins to look for more &amp;lsquo;accommodating&amp;rsquo; countries who wouldn&amp;rsquo;t mind playing host to a man that currently is more wanted than Osama bin Laden, Saddam Hussein and Kim Kardashian combined, more details slowly begin to emerge about PRISM, painting an ever clearer picture of the extent of the program both Stateside and abroad. Each individual piece of information that filters continues to sharpen the image we have on just what the NSA has (and probably still IS) been surveilling.&lt;/p>
&lt;p>However, we also need to acknowledge a separate project called Tempora, which is the British equivalent of PRISM&amp;ndash;or since we don&amp;rsquo;t know the full details of PRISM&amp;ndash;we can at least infer that both Tempora and PRISM share the same objectives, which was to spy on internet communications of netizens throughout the world. As of last year, the British had finished attaching probes to 200 fibre-optic cables each with a capacity of 10 gigabits per second. Which would have granted them &lt;a title="Project Tempora" href="http://siliconangle.com/blog/2013/06/24/project-tempora-how-the-british-gchq-helps-the-nsa-spy-on-us-citizens/" target="_blank">access to 21.6 petabytes  of data on a daily basis&lt;/a>. This we are told is just the half-way point!&lt;/p>
&lt;p>Basically the British government through the Government Communications Headquarters (GCHQ) was accessing a vast majority of data flowing into and out of its borders, most of which probably didn&amp;rsquo;t originate in the UK and was merely transiting through it. The GCHQ is itself a pseudo-military agency which traces its roots back to World War 1, when communications jamming involved shooting carrier pigeons. Which means that a military organization is looking at private citizen data of not just UK citizens, but possibly Europeans, Japanese and even Malaysians, as the internet traffic we use on a daily basis route through Europe and UK before finally landing on the US East Coast.&lt;/p>
&lt;p>The interesting though, is that Project Tempora is based in the UK, while PRISM is based in the US, and while local regulations prevent local agencies like GCHQ and the NSA to spy on their own citizens within their own borders, it is physically impossible for a person to be both in the UK and the US at the same time&amp;ndash;damn laws of physics&amp;hellip;.. Which essentially means that between Tempora and PRISM, both the UK and US government can spy on the whole world, and that&amp;rsquo;s probably what they&amp;rsquo;re doing.&lt;/p>
&lt;p>The UK is a favourite landing spot for all those undersea cables that transverse the atlantic, carrying internet traffic between Europe and the US, and if you&amp;rsquo;re wire-tapping the lines between the UK and the US, it&amp;rsquo;s almost a certainty that you&amp;rsquo;re tapping nearly all of Europe. Which would explain why the Germans aren&amp;rsquo;t too happy about the recent revelations of Project Tempora, and have &lt;a title="Germany seeks answers from UK on Tempora" href="http://inserbia.info/news/2013/06/germany-seeks-answers-from-british-gchq-regarding-project-tempora/" target="_blank">sent a list of questions to the British Embassy in Berlin&lt;/a>. If I were the German chancellor I&amp;rsquo;d be very interested in the details of the project, primarily around why it&amp;rsquo;s named after a Japanese delicacy&amp;ndash;oh wait that&amp;rsquo;s Tem-PU-ra.&lt;/p></description></item><item><title>What is PRISM?</title><link>https://keithrozario.com/2013/06/what-is-prism/</link><pubDate>Mon, 17 Jun 2013 08:00:08 +0000</pubDate><guid>https://keithrozario.com/2013/06/what-is-prism/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/images3.jpg"
 alt="Prism controversy"
 
 loading="lazy"
 />&lt;/p>
&lt;p>There&amp;rsquo;s a controversy brewing in the land of the free, one that will have implications for Americans, but also Malaysians and nearly every citizen of the world. We may look back at the moment Mr. Snowden leaked controversial (and ugly) slides about a program called &amp;lsquo;PRISM&amp;rsquo; as the start of a pivotal moment in internet history, a moment where we either begun a massive campaign to prevent illegal and unethical government wiretaps or a moment where we let governments turn the internet into a police state.&lt;/p>
&lt;h2>So let's recap what happened.&lt;/h2>
First, the Guardian newspaper broke a story on how the US Government had 'direct' access to the servers of the tech giants of the Silicon valley including Google, Youtube, Yahoo, Apple and Facebook. In short, the report claimed US Government had direct access to the emails, personal details and chat sessions of everything stored on in massive datacenters of the social networks that the tech giants ran.
&lt;p>There isn&amp;rsquo;t a person I know that doesn&amp;rsquo;t have either an iPad, Facebook account or Gmail address. Even my dad who vehemently refused to have a Facebook account, eventually succumbed to the social pressure but that was much after I setup his company email with Google Apps. So to say that the US Government had access to private details of nearly every single person in the world is not a stretch.&lt;/p>
&lt;h2>So what is PRISM really?&lt;/h2>
The theory is that US government officials, specifically from the National Security Agency(NSA) have direct access to the servers of 9 Tech giants. Details are scarce and denials abound....what&lt;strong> isn't&lt;/strong> debated is that the NSA has some sort of access to the server, even though the likes of Google and Facebook have repeatedly denied that they have created a backdoor.
&lt;p>So is it possible that the NSA has a backdoor to Google without Google knowing about it? Turns out it&amp;rsquo;s not as far-fetched as it seems.&lt;/p>
&lt;p>Steve Gibson, a security guru with his own show on TwitTv seems to think so. He&amp;rsquo;s put together some high level analysis of the story, taking into account other similar stories and suggest that the NSA has a wire-tap on the entire world. A communications intercept targeting the likes of Google and Facebook, but one that the tech companies could be blissfully ignorant of. A wiretap strategically placed at the front door of Google, Facebook, Microsoft and Apple&amp;ndash;that collects and stores every data packet passing into and out of their servers.&lt;/p>
&lt;p>&lt;em>But communications intercepts don&amp;rsquo;t work&amp;ndash;because the data is usually encrypted&amp;hellip;isn&amp;rsquo;t it?&lt;/em>&lt;/p>
&lt;p>In most parts the communications that people like you and me use to connect to Google is encrypted, and we&amp;rsquo;re secure in the knowledge that our data in transit is protected from prying eyes by a minimum 128-bit encryption&amp;ndash;that&amp;rsquo;s encryption that probably won&amp;rsquo;t be broken for another 20 years.&lt;/p>
&lt;p>But not all data flowing into and out of Google is encrypted, some of it flows in plaintext&amp;ndash;ripe for any wiretap to pick up. Just like email.&lt;/p></description></item><item><title>Security Offences Bill vs. Universal declaration of Human Rights</title><link>https://keithrozario.com/2013/06/sospa-udhr-finspy-malaysia/</link><pubDate>Thu, 13 Jun 2013 08:34:25 +0000</pubDate><guid>https://keithrozario.com/2013/06/sospa-udhr-finspy-malaysia/</guid><description>&lt;p>This is what Article 12 of the Universal Declaration of Human Rights says:&lt;/p>
&lt;p>&lt;span style="font-size: 1.17em;">&lt;blockquote>&lt;/span>&lt;/p>
&lt;ul>
	&lt;li>&lt;strong>No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence&lt;/strong>, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.&lt;/li>
&lt;/ul>
&lt;/blockquote>
&lt;p>This is what security offences bill in Malaysia says:&lt;/p>
&lt;blockquote>
&lt;p>(1) Notwithstanding any other written law, the Public Prosecutor, if &lt;strong>he considers that it is likely&lt;/strong> to contain any information relating to the commission of a security offence, may authorize&lt;strong> any police officer&lt;/strong>—
(a) to intercept, detain and open any postal article in the course of transmission by post;
(b) &lt;strong>to intercept any message transmitted or received by any communication&lt;/strong>; or
(c) to intercept or listen to any conversation by any communication.&lt;/p>
&lt;/blockquote>
&lt;p>To me, the phrase &amp;lsquo;if he considers it is likely&amp;rsquo; is another way of saying arbitary.&lt;/p></description></item><item><title>Can you out-tech the government?</title><link>https://keithrozario.com/2013/06/can-you-out-tech-the-government/</link><pubDate>Mon, 10 Jun 2013 08:00:25 +0000</pubDate><guid>https://keithrozario.com/2013/06/can-you-out-tech-the-government/</guid><description>&lt;p>Over the past years we&amp;rsquo;ve seen a recurrent theme where Government agencies were attempting to curtail internet freedom in the name of &amp;lsquo;keeping the peace&amp;rsquo;. From Saudi telcos threatening security experts to help them hijack tweets to governments procuring tools like Finspy to spy on their citizens&amp;ndash;usually without any warrant or legal oversight. We&amp;rsquo;ve seen US federal agencies try to legislate mandatory technical backdoors into software and how the Syrian government treats internet access for its Citizens like candy for their children&amp;ndash;you only get it if you behave.&lt;/p>
&lt;p>In Pakistan, a wholesale blockade of youtube means their citizens are missing not just Gangnam Style, but Gentlemen as well (although that may not necessarily be a bad thing)&amp;ndash;and we all know how much censorship and surveillance is going on in China.&lt;/p>
&lt;p>A French court is now asking twitter to hand over account details to identify individual users that tweeted anti-semitic messages, both the Dutch and German police are users of spyware from companies that the are deemed &amp;lsquo;corporate enemies of the internet&amp;rsquo; by reporters without borders, and while you may agree that courts have a right to curtail hate speech, just ruminate for a moment how one-sided French law is when they aggressively pursue anti-Semitic messages  but forbid Muslims school girls from wearing a hijab to school because it is supposedly a symbol of oppression. These biases point to deep flaws in our belief that freedom of speech can somehow be regulated by governments&amp;ndash;the term regulated freedom of speech is an oxymoron to begin with.&lt;/p>
&lt;p>This of course doesn&amp;rsquo;t just affect the &amp;lsquo;bad&amp;rsquo;  countries, those with lifetime membership cards to the axis of evil, but countries we&amp;rsquo;d generally consider good guys as well, those we associate with a respect for personal privacy and citizen rights, so that we did end up like this? To truly appreciate where we are we need to go back to how it all starts.&lt;/p>
&lt;h2>A false sense of Insecurity&lt;/h2>
Throughout history it all starts in the name of national security, or keeping the peace. Government agencies ramp up the security concerns and threat levels to grant a false sense of &lt;strong>in&lt;/strong>security to its citizens--because it's only in this environment that citizens are willing to grant such unilateral powers to the government (and its agencies). People aren't too willing to allow for unilateral government interception of communications--unless of course they perceive that terrorist live among us, and the government requires these powers to protect the innocent.
&lt;p>The track records of governments has never been good. September 11 was a colossal failure of government intelligence, and it&amp;rsquo;s usually used an example of why governments should do better. What most people don&amp;rsquo;t know is that a company called Acxiom had data for 11 hijackers, and provided that data to assist in investigations post 9/11, it turns out had the government agencies used Acxiom, they may have had additional security on the planes that crashed into the WTC. The breadth and depth of the information provided to law enforcement has been kept secret&amp;ndash;and in the wake of such attacks nobody bothered to ask whether Acxiom was operating within legal limits of collecting and storing that data&amp;ndash;worse still people forget that Acxiom itself was hacked leaking private information of millions of Americans. Yes it may have help thwart the attacks on 9/11, but the Acxiom itself became a target of attack shortly after details of its information bounty were published, there are a lot of people who would pay for that kind of information.&lt;/p>
&lt;p>Even with the fundamental problems of the government storing such private information&amp;ndash;government agencies throughout the world continue to ramp up security concerns in the hope of scaring people into giving up their freedoms. Closer to home we continuously see the &amp;rsquo;threat of sedition&amp;rsquo; being used to deny individuals and private citizens their rights. The &amp;lsquo;possibility&amp;rsquo; of a repeat of May 13th, is now accepted as a &amp;lsquo;high probability&amp;rsquo; even though there is no data to suggest that a repeat is possible let alone probable. Just like courts in France we see a glaring bias in the execution of these sedition laws&amp;ndash;and the targets are often pro-opposition rather than pro-government.&lt;/p>
&lt;p>The Malaysian government is &lt;a title="I’m Sorry, the Malaysian Government IS spying on you" href="http://www.keithrozario.com/2013/05/the-malaysian-government-is-spying-on-you-finspy-fisher.html">now being accused of running spyware suites like Finfisher&lt;/a>, which incorporates a voyeuristic like ability on the malware owner to spy on the victims. The makers of Finfisher claim their software is only sold to governments&amp;ndash;without realizing it&amp;rsquo;s the governments themselves that are illegally spying on its citizens.&lt;/p>
&lt;p>Not since Tom Sawyer tricked his friends to paint his white fence has such levels of deception been seen.&lt;/p>
&lt;p>However, the level of deception isn&amp;rsquo;t what is troubling, it&amp;rsquo;s the level of apathy among the mainstream society to these revelations that send shivers down my spine. No one from the general public seems perturbed that the very technology that was supposed to advance democracy and free speech in Malaysia is now being used to suppress it.&lt;/p>
&lt;p>And we&amp;rsquo;re not the only ones spying on our citizens&amp;hellip;&lt;/p></description></item><item><title>Maxis blocks Torrent traffic</title><link>https://keithrozario.com/2013/05/maxis-torrent-traffic-blocked/</link><pubDate>Thu, 30 May 2013 07:00:47 +0000</pubDate><guid>https://keithrozario.com/2013/05/maxis-torrent-traffic-blocked/</guid><description>&lt;p>There&amp;rsquo;s a really cool tool called &lt;a title="Glasnost: Check if Maxis blocks torrents" href="http://broadband.mpi-sws.org/transparency/bttest.php" target="_blank">glasnost&lt;/a>, that can easily detect if your ISP is throttling certain traffic through its servers. It works amazingly well at detecting if your ISP is blocking that most sacred of all internet traffic&amp;ndash;BitTorrent.&lt;/p>
&lt;p>So running two test, one over my Unifi connection, and one more tethered over my Galaxy S3 on Maxis, and came to the conclusion that Maxis does indeed block torrents by default. However, just like how you have to call &lt;a title="How to enable VPN connectivity on Maxis Mobile" href="http://www.keithrozario.com/2012/07/maxis-vpn-mobile-setting-3g.html" target="_blank">Maxis to enable VPN access via your phone&lt;/a>, you have to call them to &lt;a title="Torrent traffic on Maxis" href="https://forum.maxis.com.my/forum_topic.asp?TOPIC_ID=6384&amp;amp;whichpage=2" target="_blank">allow torrent traffic as well&lt;/a>&amp;hellip;supposedly.&lt;/p></description></item><item><title>The Malaysian cybertrooper phenomenon or is it Botnet?</title><link>https://keithrozario.com/2013/05/malaysian-political-cybertrooper-botnet/</link><pubDate>Sat, 25 May 2013 07:00:17 +0000</pubDate><guid>https://keithrozario.com/2013/05/malaysian-political-cybertrooper-botnet/</guid><description>&lt;p>The Edge recently held a political poll on whether Anwar Ibrahim should quit as the Opposition leader&amp;ndash;But when the editor begun to see that the one-week survey attracted 12,736 responses and the responses were overwhelmingly one-sided, she smelt something fishy.&lt;/p>
&lt;p>Upon further checking with the IT team, &lt;a title="EDGE survey influenced by Cybertroopers" href="http://my.news.yahoo.com/edge-survey-edge-poll-anwar-121504135.html" target="_blank">they found that 6,354 of the responses came from &lt;strong>one&lt;/strong> IP address&lt;/a>, and about 1,700 came from several IP addresses within the same building. Another 2,000 responses came from seven different IP addresses.&lt;/p></description></item><item><title>DAP lodges report with MCMC over blocked sites</title><link>https://keithrozario.com/2013/05/dap-blocked-sites-tm-bluecoat-packetshaper-arbor-network/</link><pubDate>Thu, 23 May 2013 07:00:31 +0000</pubDate><guid>https://keithrozario.com/2013/05/dap-blocked-sites-tm-bluecoat-packetshaper-arbor-network/</guid><description>&lt;p style="text-align: center;">
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/blue_coat_packetshaper.png"
 alt="Blue Coat packetshaper"
 
 loading="lazy"
 />&lt;/p>
&lt;/p>
Two days ago, the Democratic Action Party (DAP) lodge a report to the MCMC on an 'internet blockade' targeting DAP related political websites that was allegedly being carried out by Telekom Malaysia (TM). As you may know TM is the largest ISP in Malaysia, and if TM suddenly blocks a website--a large chunk of the Malaysian public are automatically denied access to it.
&lt;p>The DAP IT manager (&lt;span style="color: #888888;">&lt;em>didn&amp;rsquo;t know the DAP had an IT team now did ya?&lt;/em>&lt;/span>), in his press statement said that :&lt;/p>
&lt;blockquote>In investigating the DPI filtering equipment location, I have found 1032 suspicious network equipment using same IP address family as the the Arbor Network Peakflow SP with TM branding. Since the login page of this network equipment bears TM logo, undoubtedly MCMC should haul up TM and conduct IT forensic investigation on all 1032 equipments without delay. I am fully prepared to assist MCMC in its investigations.
&lt;p>In light of this new evidence, MCMC must re-examine its 2nd May statement. MCMC should be politically impartial and hold the standard of government regulatory body that it should be. It must put the interest of all Malaysians first.&lt;/blockquote>
Now this isn&amp;rsquo;t really news, to be fair the Arbor Network Peakflow SP solution is meant primarily as a DDoS protection security suite with a slight tinge of DPI functionality added on the side. TM in their defence haven&amp;rsquo;t really denied they own the Arbor Network solution&amp;ndash;there&amp;rsquo;s even a joint &lt;a title="TMNET purchases Arbor Network Peakflow SP" href="http://www.arbornetworks.com/news-and-events/press-releases/2004-press-releases/883-arbor-networks-and-commverge-solutions-team-up-to-protect-tm-nets-ip-network-from-zero-day-worms" target="_blank">press release from 2004 to announce their purchase of it&lt;/a>.&lt;/p>
&lt;p>Unless TM operates like the government, in which they announce the purchase of something in 2004, but only start to using it in 2013&amp;ndash;I&amp;rsquo;m guessing they were using Arbor for other purposes before they decided to unleash its DPI functionality.&lt;/p>
&lt;p>But there could be a twist.&lt;/p></description></item><item><title>Microsoft is eavesdropping on your skype conversations</title><link>https://keithrozario.com/2013/05/microsoft-eavesdropping-skype-messages/</link><pubDate>Wed, 22 May 2013 07:00:59 +0000</pubDate><guid>https://keithrozario.com/2013/05/microsoft-eavesdropping-skype-messages/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/2314400543_acd79bd7fb.jpg"
 alt="Microsoft Eavesdropping on Skype messages"
 
 loading="lazy"
 />&lt;/p>
&lt;p>The guys over at H-online reported recently that they have some pretty good evidence that good ol&amp;rsquo; Microsoft is eavesdropping onto your Skype conversations, and the results are pretty damning.&lt;/p>
&lt;p>The method for detecting those sneaky little eavesdroppers was pretty ingenious though. The researchers sent two urls in their skype messages to each other. The urls pointed to servers that the researchers owned. For all practical reasons these urls were made specifically for the purpose of the test and should not be receiving any traffic from anywhere&amp;ndash;unless of course Microsoft was listening.&lt;/p>
&lt;p>Then they sat at wait at their servers to see if they received any traffic, and lo&amp;rsquo; and behold barely a few hours later they received some rather funky traffic from an IP address registered to Microsoft in Redmond. &lt;span style="color: #888888;">&lt;em>busted!&lt;/em>&lt;/span>&lt;/p>
&lt;p>The urls didn&amp;rsquo;t just end with the .com, but had sensitive material appended to it (or at least that&amp;rsquo;s what the researchers made it look like), and Microsoft used the url which meant they had to be eavesdropping on Skype messages and conversations. More importantly these urls were made to look like they held sensitive material, such as bank logins..etc etc, but Microsoft still used it, and worse even visited the sites to see what was on it.&lt;/p>
&lt;p>Even more shocking is that Microsoft isn&amp;rsquo;t even denying the charge&amp;ndash;yet, but they point out that they do scan urls once in a while to flag spam, but H-online isn&amp;rsquo;t buying it.&lt;/p></description></item><item><title>Censoring and spying--Malaysian Style</title><link>https://keithrozario.com/2013/05/malaysian-general-elections-ge13-finfisher-ddos-dpi-censoring-spyware/</link><pubDate>Sat, 04 May 2013 15:06:15 +0000</pubDate><guid>https://keithrozario.com/2013/05/malaysian-general-elections-ge13-finfisher-ddos-dpi-censoring-spyware/</guid><description>&lt;p>In 2 days time, the South-East Asian nation of Malaysia will go through its 13&lt;sup>th&lt;/sup> General Election since 1955. Some might look negatively on the number 13, but for the vast majority of Malaysians the coming few days will either raise our hopes or shatter them.&lt;/p>
&lt;p>Malaysia has had only 1 party in power since it&amp;rsquo;s independence—that&amp;rsquo;s a long time to be in power, and for the first time since 1955 the ruling party in Malaysia is under threat, not just to lose it&amp;rsquo;s 2/3rd majority in Parliament, but the entire elections altogether, and with it control of the Federal Government.&lt;/p></description></item><item><title>What is Finfisher capable of</title><link>https://keithrozario.com/2013/05/finfisher-finspy-finfly-isp-capable-of/</link><pubDate>Fri, 03 May 2013 22:15:36 +0000</pubDate><guid>https://keithrozario.com/2013/05/finfisher-finspy-finfly-isp-capable-of/</guid><description>&lt;p>Heard about the latest allegation accusing the &lt;a title="I’m Sorry, the Malaysian Government IS spying on you" href="http://www.keithrozario.com/2013/05/the-malaysian-government-is-spying-on-you-finspy-fisher.html">Malaysian BN government of using Finfisher on its own Citizens&lt;/a>?&lt;/p>
&lt;p>Well that allegation is true&amp;ndash;to me at least, and here&amp;rsquo;s a taste of what Finfisher can do in the hands of the government.&lt;/p>
&lt;center>&lt;iframe src="http://www.youtube.com/embed/Dejw2G83Moo" height="315" width="560" allowfullscreen="" frameborder="0">&lt;/iframe>&lt;/center>&lt;center>&lt;iframe src="http://www.youtube.com/embed/qc8i7C659FU" height="315" width="560" allowfullscreen="" frameborder="0">&lt;/iframe>&lt;/center></description></item><item><title>Kerajaan Malaysian Mengintip Rakyat Malaysia sendiri</title><link>https://keithrozario.com/2013/05/kerajaan-barisan-nasional-malaysia-mengintip-rakyat-warganegara-finspy-finfisher/</link><pubDate>Fri, 03 May 2013 09:30:40 +0000</pubDate><guid>https://keithrozario.com/2013/05/kerajaan-barisan-nasional-malaysia-mengintip-rakyat-warganegara-finspy-finfisher/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Malaysian_government_spying_on_citizens.jpg"
 alt="Big Brother is watching"
 
 loading="lazy"
 />&lt;/p>
&lt;p>Beberapa minggu lalu, saya telah menulis tentang sekeping artikel yang &amp;rsquo;tidak bertanggungjawab&amp;rsquo; oleh Malaysian Insider apabila &amp;lsquo;mendakwa&amp;rsquo; kerajaan Malaysia mengintip rakyat Malaysia - tanpa sebarang bukti. Saya amat kecewa bahawa wartawan tersebut membuat kenyataan tersebut tanpa apa-apa bukti&amp;ndash;apabila menulis blog tersebut saya kecewa dan saya marah!&lt;/p>
&lt;p>Tetapi yang lebih penting&amp;ndash;saya silap!&lt;/p>
&lt;p>Mengikut laporan dari Citizenlab semalam&amp;ndash;s&lt;strong>ekarang timbulnya bukti bahawa kerajaan Malaysia MEMANG mengitip rakyat&lt;/strong>&amp;ndash;terutama sekali Rakyat Malaysia yang mengunakan Bahasa Melayu.&lt;/p></description></item><item><title>I'm Sorry, the Malaysian Government IS spying on you</title><link>https://keithrozario.com/2013/05/the-malaysian-government-is-spying-on-you-finspy-fisher/</link><pubDate>Fri, 03 May 2013 09:06:52 +0000</pubDate><guid>https://keithrozario.com/2013/05/the-malaysian-government-is-spying-on-you-finspy-fisher/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Malaysian_government_spying_on_citizens.jpg"
 alt="Big Brother is watching"
 
 loading="lazy"
 />&lt;/p>
&lt;p>A couple of weeks ago, I wrote about an&lt;a title="Malaysian government using spyware against citizens? No, not really." href="http://www.keithrozario.com/2013/03/malaysian-government-using-spyware-against-citizens-irresponsible-journalism-by-the-malaysian-insider.html" target="_blank"> &amp;lsquo;irresponsible&amp;rsquo; piece of journalism by the Malaysian Insider&lt;/a> when the &amp;lsquo;claimed&amp;rsquo; the Malaysian government was spying on Malaysian citizens&amp;ndash;but they didn&amp;rsquo;t have any proof. I was very upset that a reporter would make such a bold statement and not back it up with any proof &amp;ndash;so obviously the post was written in a caustic  and emotionally charged way&amp;ndash;I was upset, annoyed, angry even!&lt;/p>
&lt;p>More importantly though&amp;ndash;I was wrong!&lt;/p>
&lt;p>On Labour day, Citizenlab released a second report detailing out more info from they&amp;rsquo;re Finspy research.&lt;/p>
&lt;p>I&amp;rsquo;ll let speak for themselves in an &lt;a title="CitizenLab: Finfisher in Malaysia" href="https://keithrozario.com/uploads/2013/05/shortbg-malaysia1.pdf" target="_blank">excerpt&lt;/a> they prepared specifically addressing MALAYSIA:&lt;/p></description></item><item><title>Telekom Malaysia is censoring the internet prior to GE13</title><link>https://keithrozario.com/2013/05/telekom-malaysia-t-is-censoring-the-internet-prior-to-ge13/</link><pubDate>Thu, 02 May 2013 10:17:35 +0000</pubDate><guid>https://keithrozario.com/2013/05/telekom-malaysia-t-is-censoring-the-internet-prior-to-ge13/</guid><description>&lt;p style="text-align: center;">&lt;iframe src="http://www.youtube.com/embed/rsqp3hMgM98" height="315" width="560" allowfullscreen="" frameborder="0">&lt;/iframe>&lt;/p>
I'm not a usual fearmonger, or a person who panics easily--yet you friendly local tech evangelist has a warning for Malaysian users out there. Unifi is censoring the internet in the run up to the hotly contested GE1--and that's what the data suggest.
You heard that right folks, some of you suspected all along, and I apologize for not believing you earlier. I was initially skeptical that Unifi and Telekom Malaysia would go to such extents to censor our right to information, and I'm deeply upset that this is happening in my own country.
&lt;p>Usually most Internet Service Providers (ISP) don&amp;rsquo;t censor the internet, not because they don&amp;rsquo;t want to&amp;ndash;it&amp;rsquo;s simply because censoring the vast amount of online traffic is a monumental technical challenge. In the past we&amp;rsquo;ve seen Malaysia ISPs do this, for instance when they blocked Malaysia-Today in the run-up to the 2008 General elections, but censoring one entire website is a fairly straightforward thing to do&amp;ndash;&lt;a title="Bypass Unifi blocking and censoring using a DNS switch or VPN connection" href="http://www.keithrozario.com/2012/03/bypass-unifi-blocking-and-censoring-using-a-dns-switch-or-vpn-connection.html" target="_blank">an bypassing that censorship is equally straightforward&lt;/a>.&lt;/p></description></item><item><title>Malaysiakini twitter account hacked</title><link>https://keithrozario.com/2013/04/malaysiakini-twitter-account-hacked/</link><pubDate>Sun, 28 Apr 2013 15:17:32 +0000</pubDate><guid>https://keithrozario.com/2013/04/malaysiakini-twitter-account-hacked/</guid><description>&lt;center>
&lt;blockquote class="twitter-tweet">Sorry for inconvenience! let us manage your twitter account from now on,Untuk semua , For All, Wei Ren Ren, Ellowrukkum - SarkasSiber
&lt;p>— malaysiakini.com (@malaysiakini) &lt;a href="https://twitter.com/malaysiakini/status/328125545361580032">April 27, 2013&lt;/a>&lt;/blockquote>&lt;/p>
&lt;/center>In what appears to be an escalating amount of cyber-attacks on the online web portal, Malaysiakini reported that they're twitter account has been hacked by a group calling itself Sarkas-Siber.
&lt;p>Malaysiakini now follows in the footsteps of other notable newspapers who&amp;rsquo;ve had they&amp;rsquo;re twitter account hacked, hopefully twitters recent announcement for two-factor authentication may help reduce the high number of hacks the social network faces on a regular basis.&lt;/p></description></item><item><title>Government Network used to download porn : Privacy is dead</title><link>https://keithrozario.com/2013/04/malaysian-government-network-download-porn-privacy-dead/</link><pubDate>Wed, 24 Apr 2013 07:00:15 +0000</pubDate><guid>https://keithrozario.com/2013/04/malaysian-government-network-download-porn-privacy-dead/</guid><description>&lt;p>Just how private are your searches&amp;hellip;turns out they aren&amp;rsquo;t private at all.&lt;/p>
&lt;p>The wonderful people at Torrentfreak did an amazing piece of investigative journalism today. Upset over the passing of CISPA, &lt;a title="Torrent Freak: Exposing Pirates in the House" href="http://torrentfreak.com/cispa-anyone-exposing-pirates-a-the-u-s-government-130422/" target="_blank">they decided to do an internet check on how active the House of Representatives were&amp;ndash;on bit torrent&lt;/a>. It turns out with a couple of IP addresses, and some elbow grease you can pretty much find out how active a certain IP range is on bit-torrent or even &lt;strong>on searching porn!!&lt;/strong>&lt;/p>
&lt;p>So using the same techniques that Torrentfreak used, and applying them to the Malaysian e-Government official service provider &amp;ldquo;&lt;a title="Government Internet Telecommunication Network" href="http://www.gitn.com.my/#home" target="_blank">Government Integrated Telecommunication Network  (GITN)&lt;/a>&amp;rdquo;,  your friendly neighbourhood Tech Evangelist manage to find some &lt;em>pretty&lt;/em> interesting results!&lt;/p>
&lt;p>The GITN is owned by Telekom Malaysia and is dubbed the &amp;ldquo;official network provider for the e-Government&amp;rdquo; in Malaysia&amp;ndash;so let&amp;rsquo;s see what the official network for the e-government was being used for?&lt;/p>
&lt;p>First off, someone was using the GITN network to download torrents&amp;ndash;not exactly surprising, but judging by the variety of torrents (&lt;em>everything from Dark Skies to Naruto to Discovery Channel documentaries&lt;/em>) it looks like more than one person was doing the downloading.&lt;/p>
&lt;p style="text-align: center;">
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Government-Integrated-Telecommunication-Network-G-torrent-activity.png"
 alt="Torrent Activity on the Government Network"
 title="Government Integrated Telecommunication Network G torrent activity"
 loading="lazy"
 />&lt;/p>
&lt;/p>
Also equally interesting was that someone used the GITN network to download porn. I'm no expert, but I'm thinking Gangbanged.XXX isn't really a discovery channel documentary.</description></item><item><title>Datuk Maglin Dennis D'cruz in Klang : The non-updating Minister</title><link>https://keithrozario.com/2013/04/datuk-maglin-dennis-dcruz-n49-klang-kota-alam-shah/</link><pubDate>Sat, 20 Apr 2013 20:22:13 +0000</pubDate><guid>https://keithrozario.com/2013/04/datuk-maglin-dennis-dcruz-n49-klang-kota-alam-shah/</guid><description>&lt;p>So it&amp;rsquo;s official. Datuk Maglin D&amp;rsquo;Cruz will compete in N.48 Kota Alam Shah in Klang. Sadly this is true.&lt;/p>
&lt;p>I never liked Datuk Maglin, he&amp;rsquo;s the Deputy Information Communications and Culture Minister that was &lt;a title="MCMC looking to ‘control’ social media at GE13: A worrying trend" href="http://www.keithrozario.com/2013/03/mcmc-looking-to-control-social-media-at-ge13-a-worrying-trend.html">looking at ways to &amp;lsquo;control&amp;rsquo; social media&lt;/a>. I won&amp;rsquo;t go much further as to why this is a bad idea&amp;ndash;but it just goes to show how in touch Datuk Maglin is on the social media.&lt;/p></description></item><item><title>Malaysiakini goes free from 17th April for GE13</title><link>https://keithrozario.com/2013/04/malaysiakini-free-17th-april-ge13/</link><pubDate>Wed, 17 Apr 2013 12:26:00 +0000</pubDate><guid>https://keithrozario.com/2013/04/malaysiakini-free-17th-april-ge13/</guid><description>&lt;p>Got a note from Malaysiakini today, for all you stingy-porkers out there who read all the malaysiakini news reposted by various parties, but never really paid for the subscription&amp;ndash;here&amp;rsquo;s some good news.&lt;/p>
&lt;p>Malaysiakini will go free from 17th April onwards, to pave the way for MORE adverts (like we didn&amp;rsquo;t have enough) but also to allow Malaysiakini to respond to attacks more effectively. Having to cater to two customer models makes responding to DDOS attacks a bit harder&amp;ndash;though I can&amp;rsquo;t imagine why.&lt;/p>
&lt;p>It&amp;rsquo;s however good news all-around. Malaysiakini will extend the subscription if you were already paying, and if you never were a customer, you now have access to all the news from Malaysia no.1 &lt;span style="font-size: 13px; line-height: 19px;">Online News Portal.&lt;/p></description></item><item><title>My BN Spam SMS collection</title><link>https://keithrozario.com/2013/04/barisan-nasional-bn-spam-sms/</link><pubDate>Sun, 14 Apr 2013 23:44:29 +0000</pubDate><guid>https://keithrozario.com/2013/04/barisan-nasional-bn-spam-sms/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Screenshot_2013-04-13-11-19-05.jpg"
 alt=""
 title="Screenshot_2013-04-13-11-19-05"
 loading="lazy"
 />&lt;/p>
&lt;p>  &lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Screenshot_2013-04-13-11-18-57.jpg"
 alt=""
 title="Screenshot_2013-04-13-11-18-57"
 loading="lazy"
 />&lt;/p>
&lt;p>  &lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Screenshot_2013-04-13-11-18-43.jpg"
 alt=""
 title="Screenshot_2013-04-13-11-18-43"
 loading="lazy"
 />&lt;/p>
&lt;center>&lt;/center>&lt;center>&lt;/center>In the past 6 months, I've received more than 20 political SPAM sms' from the Barisan Nasional Yakini BN campaign, various political surveys and two from my local MP from PAS (Dr. Siti Mariah Mahmud).
&lt;p>Now obviously, I&amp;rsquo;m expecting the spam rate to increase exponentially as we approach GE13, and to me that&amp;rsquo;s really bad news. In fact over the last month alone, I&amp;rsquo;ve received 5 text messages from the Barisan Nasional Yakini BN campaign&amp;ndash;they know my FULL name, my contact number and even my place to vote. They know more about me than I&amp;rsquo;ve ever given out to ANYONE from any survey, and I consider this an invasion of my privacy.&lt;/p></description></item><item><title>MCMC screw up press release</title><link>https://keithrozario.com/2013/03/mcmc-screw-up-press-release/</link><pubDate>Wed, 20 Mar 2013 06:00:25 +0000</pubDate><guid>https://keithrozario.com/2013/03/mcmc-screw-up-press-release/</guid><description>&lt;p>So after the furore over the &lt;a title="Malaysian government using spyware against citizens? No, not really." href="http://www.keithrozario.com/2013/03/malaysian-government-using-spyware-against-citizens-irresponsible-journalism-by-the-malaysian-insider.html" target="_blank">Malaysian Insider article that wrongly accused the Government of using spyware on its citizens,&lt;/a> the MCMC rightly issued a press statement denouncing the article.&lt;/p>
&lt;p>Unfortunately, even the MCMC has to do some reading up a bit before it post up press releases. According to the MCMC press release which you can read in it&amp;rsquo;s entirety &lt;a title="MCMC press release" href="http://www.skmm.gov.my/skmmgovmy/media/General/pdf/130314_Press-Release-False-Reporting.pdf" target="_blank">here&lt;/a>:&lt;/p></description></item><item><title>Malaysian Cyberwar: Is it an external war or is it civil</title><link>https://keithrozario.com/2013/03/malaysian-cyberwar-is-it-an-external-war-or-is-it-civil/</link><pubDate>Mon, 18 Mar 2013 00:00:41 +0000</pubDate><guid>https://keithrozario.com/2013/03/malaysian-cyberwar-is-it-an-external-war-or-is-it-civil/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Cyber-War-Malaysia-PH.jpg"
 alt="The Cyber War between Malaysia and Philippines"
 title="Cyber-War-Malaysia-PH"
 loading="lazy"
 />&lt;/p>
&lt;p>A really piece written by &lt;a href="http://www.digitalnewsasia.com/insights/malaysia-philippines-cyberwar-time-for-our-agencies-to-step-up#" data-action="profile" data-user="30123397">Asohan Aryaduray&lt;/a> on DigitalNewsAsia some time back talked about how the&lt;a title="Cyberwar Malaysia Philippines" href="http://www.digitalnewsasia.com/insights/malaysia-philippines-cyberwar-time-for-our-agencies-to-step-up" target="_blank"> CyberWar between Malaysia and the Philippines was going on&lt;/a>, and how he wanted government agencies to step up the security of our digital assets (or at least start the discussion). Asohan claims that Malaysia perhaps has &lt;em>&amp;ldquo;the most number of government and quasi-government agencies looking into cyber-security for a country this size; it is time for them to put their heads together and harden the nation’s cyber-defenses.&amp;rdquo; &lt;/em>&lt;/p>
&lt;p>He ends with a rather poignant phrase: &lt;em>It’s war, gentlemen, and it’s time our agencies got cracking.&lt;/em>&lt;/p>
&lt;p>I&amp;rsquo;m not so sure it&amp;rsquo;s war&amp;ndash;even less sure we should get the government involved.&lt;/p>
&lt;p>If he calls the attacks by Malaysians on Pinoy websites (and vice-versa) a war, then what&amp;rsquo;s currently going on with the DAP website is a sign of not just war&amp;ndash;but a &lt;strong>digital civil war&lt;/strong>, with internal actors, attacking local sites.&lt;/p>
&lt;p>&lt;a title="DAP Website incapacitated" href="http://thestar.com.my/news/story.asp?file=/2013/3/15/nation/20130315151500&amp;amp;sec=nation" target="_blank">TheStar&lt;/a> last week reported that the:&lt;/p>
&lt;blockquote>
&lt;p>DAP has claimed that its websites have been attacked and forced to shut down since last Friday.&lt;/p>
&lt;p>National publicity secretary Tony Pua &lt;em>&lt;strong>(pix)&lt;/strong>&lt;/em>said the party&amp;rsquo;s official website, dapmalaysia.org, and its Malay portal, roketkini.com, were incapacitated by denial of service attacks (DDOS) on March 8, 10 and 13.&lt;/p>
&lt;/blockquote>
&lt;p>While TheStar doesn&amp;rsquo;t report it, but &lt;a title="DAP website under attack, Pua says politically motivated" href="http://www.themalaysianinsider.com/malaysia/article/dap-websites-came-under-fiercest-web-attack-says-pua">other newsportals claim Pua was blaming political foes for the attack&lt;/a>. For the most part this is quite common, we&amp;rsquo;ve seen&lt;a title="Malaysiakini down!" href="http://www.keithrozario.com/2012/04/malaysiakini-down.html"> Malaysiakini go down a few times&lt;/a>, and various other pro-opposition blogs have taken some hits. This of course is even more interesting because &lt;a title="Krebs gets DDOS and Swatted" href="http://krebsonsecurity.com/2013/03/the-world-has-no-room-for-cowards/" target="_blank">Krebsonsecurity.com blogged that he was a victim of not just a DDOS attack but Swatting as well&lt;/a>.&lt;/p></description></item><item><title>Malaysian government using spyware against citizens? No, not really.</title><link>https://keithrozario.com/2013/03/malaysian-government-using-spyware-against-citizens-irresponsible-journalism-by-the-malaysian-insider/</link><pubDate>Fri, 15 Mar 2013 01:01:00 +0000</pubDate><guid>https://keithrozario.com/2013/03/malaysian-government-using-spyware-against-citizens-irresponsible-journalism-by-the-malaysian-insider/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/FinSpy-Malaysia-insider-Lied.jpg"
 alt="FinSpy server found in Malaysia"
 title="FinSpy Malaysia"
 loading="lazy"
 />&lt;/p>
&lt;p>I&amp;rsquo;ve been pretty busy the past few months, and my post count has been pretty low, and although I just returned from a 2 week trip abroad and am now flushed full of work, I decided to burn a bit of the midnight oil today because the Malaysian Insider completely pissed me off.&lt;/p>
&lt;p>It all started with an article from Lim Kit Siangs blog, which read &amp;ldquo;&lt;strong>Malaysia uses spyware against citizens, NYT reports&lt;/strong>&amp;rdquo;. The post was merely a cut-and-copy reproduction of a Malaysian Insider article that had the same headline. The headline really got my blood churning and it was followed up with an even more mouth watering opening paragraph:&lt;/p></description></item><item><title>Is the MCMC going to 'monitor and control' or is it going to 'censor'</title><link>https://keithrozario.com/2013/03/is-the-mcmc-going-to-monitor-and-control-or-is-it-going-to-censor/</link><pubDate>Tue, 12 Mar 2013 07:00:33 +0000</pubDate><guid>https://keithrozario.com/2013/03/is-the-mcmc-going-to-monitor-and-control-or-is-it-going-to-censor/</guid><description>&lt;p>A week ago, I wrote about the MCMC was &lt;a title="MCMC looking to ‘control’ social media at GE13: A worrying trend" href="http://www.keithrozario.com/2013/03/mcmc-looking-to-control-social-media-at-ge13-a-worrying-trend.html">planning to &amp;lsquo;monitor and control&amp;rsquo; the internet&lt;/a>, but just today I looked at my RSS subscription and notice that the Malay version of the press release used completely different words.&lt;/p>
&lt;p>While the&lt;a title="MCMC to Monitor and Control" href="http://www.skmm.gov.my/Media/Press-Clippings/MCMC-To-Monitor,-Control-Use-Of-Social-Media-In-Ge.aspx" target="_blank"> English version of the Press release&lt;/a> used words like &amp;lsquo;monitor and control&amp;rsquo;, the &lt;a title="SKMM Memantau dan Menyekat" href="http://www.skmm.gov.my/Media/Press-Clippings/SKMM-pantau,-sekat-blog-ada-unsur-fitnah.aspx" target="_blank">Bahasa version&lt;/a> used the term &amp;lsquo;memantau dan menyekat&amp;rsquo;. The term &amp;lsquo;memantau dan menyekat&amp;rsquo; more appropriately translates to &amp;lsquo;Monitor and Block&amp;rsquo; or &amp;lsquo;Monitor and Censor&amp;rsquo; rather than &amp;lsquo;Monitor and Control&amp;rsquo;.&lt;/p></description></item><item><title>MCMC looking to 'control' social media at GE13: A worrying trend</title><link>https://keithrozario.com/2013/03/mcmc-looking-to-control-social-media-at-ge13-a-worrying-trend/</link><pubDate>Sun, 03 Mar 2013 15:19:37 +0000</pubDate><guid>https://keithrozario.com/2013/03/mcmc-looking-to-control-social-media-at-ge13-a-worrying-trend/</guid><description>&lt;p>Bernama (an official government news channel) yesterday reported that the MCMC is &lt;a title="MCMC looking to monitor and control the use of social media at GE13" href="http://www.bernama.com/bernama/v7/ge/newsgeneral.php?id=931568" target="_blank">&amp;ldquo;looking at suitable methods to monitor and control the use of social media in the 13th General Election (GE13)&lt;/a>&amp;quot;. Deputy Information Communications and Culture Minister Datuk Maglin Dennis D’Cruz said this was &amp;ldquo;&lt;em>to ensure that the social media would not be abused by irresponsible quarters to achieve their own political agenda&lt;/em>&amp;rdquo;. Datuk Maglin then quickly goes on to shameless promote the BN by saying that &amp;ldquo;&lt;em>Therefore, the public, especially the young voters should be wise enough to do their parts in selecting the right government with vast experience in managing the country, so that their future will be secured&lt;/em>.&amp;rdquo;&lt;/p></description></item><item><title>Are your broadband meters accurate?</title><link>https://keithrozario.com/2013/02/broadband-bandwidth-quota-data-cap-metering/</link><pubDate>Mon, 18 Feb 2013 07:00:38 +0000</pubDate><guid>https://keithrozario.com/2013/02/broadband-bandwidth-quota-data-cap-metering/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/pitydafool.jpg"
 alt="Broadband meter caps"
 title="pitydafool"
 loading="lazy"
 />&lt;/p>
&lt;p>When Maxis, or Telekom or Digi claim that you&amp;rsquo;ve used all your bandwidth quota&amp;ndash;can you really trust them? A good article from consumerist reported that even American telcos are &lt;a title="Broadband meters" href="http://gigaom.com/2013/02/07/more-bad-news-about-broadband-caps-many-meters-are-inaccurate/" target="_blank">facing difficulty counting the bytes their users use&lt;/a>.&lt;/p>
&lt;p>For the most part this is OK if your ISP provides you unlimited quota, in which case it doesn&amp;rsquo;t matter how much you use. However, if your ISP is either charging you per byte (like Yes 4G prepaid) or capping your speeds once you exceed a certain threshold, then they&amp;rsquo;d better be sure that they&amp;rsquo;re accurately counting the number of bytes you&amp;rsquo;re using before they starting capping speeds. So if you&amp;rsquo;ve got a bandwidth quota or a data cap, it&amp;rsquo;s in your interest to ensure your ISP is measuring your usage accurately, otherwise you could potentially be billed for data you never used.&lt;/p>
&lt;p>It&amp;rsquo;s also interesting to note, that in some cases what the ISP measures as your data usage, is not what you will measure at home. A &lt;a title="How do you know if your broadband meters are working" href="http://gigaom.com/2012/11/14/how-do-you-know-if-your-broadband-meter-is-accurate/" target="_blank">GigaOm article&lt;/a> detailed out Chicago Area Resident, Ken Stox tried to simulate his ISPs metering his own meter at home. Stox installed a Linux application called Tomato, which basically is a Linux program installed on his router that allowed him to write programs to track his usage.&lt;/p>
&lt;p>Knox reported on Slashdot that:&lt;/p></description></item><item><title>Are Free Public WiFi initiatives safe? Or do they pose a Health Risk?</title><link>https://keithrozario.com/2013/02/is-wifi-safe-penang-free-wifi-public-health-risk-wireless-penang/</link><pubDate>Fri, 15 Feb 2013 07:00:51 +0000</pubDate><guid>https://keithrozario.com/2013/02/is-wifi-safe-penang-free-wifi-public-health-risk-wireless-penang/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/free-wifi-300x207.jpg"
 alt=""
 title="free-wifi"
 loading="lazy"
 />&lt;/p>
&lt;p>Techdirt recently reported on how&lt;a title="Canadian Schools ban Wifi based on Bad Science" href="http://www.techdirt.com/blog/wireless/articles/20130205/03222421885/canadian-schools-ban-wifi-based-bad-science.shtml" target="_blank"> Canadian Schools are Banning WiFi based on bad science&lt;/a>, and I was appalled by the complete lack of science we have operating in the minds of these clueless parents. No doubt they&amp;rsquo;re well-intentioned but their complete and utter disregard of the scientific evidence in favour of fearful knee-jerk reactions are actually causing more harm than good for the very children they intend to protect.&lt;/p>
&lt;p>Of course it doesn&amp;rsquo;t take much research to find out that &lt;a title="WiFi isn't Dangerous" href="http://www.ampedwireless.com/learningcenter/safety.html" target="_blank">WiFi isn&amp;rsquo;t dangerous&lt;/a>, and there&amp;rsquo;s &lt;a title="WiFi Health Risk" href="http://www.guardian.co.uk/technology/askjack/2012/sep/27/wi-fi-health-risks" target="_blank">no evidence to show that it is dangerous&lt;/a>. In fact, most studies suggest WiFi radiation is so weak, that a year of &lt;a title="A year of Wifi Radiation equals 20 minutes on a cell" href="http://www.techdirt.com/articles/20061212/080748.shtml" target="_blank">WiFi radiation equals to 20 minutes on a cell phone&lt;/a>. The most important thing of course is not to fall into the trap of thinking we&amp;rsquo;re &amp;lsquo;better safe than sorry&amp;rsquo; because we already are safe with WiFi and we have enough evidence to suggest what WiFi poses to health risk.&lt;/p>
&lt;h2>Wireless@PENANG : The Health risk of Public WiFi&lt;/h2>
I'm also reminded of Wireless@PENANG project, that took so long to launch due to pressures from public groups and NGOs similar to the Canadians parents. This includes flak from Anil Netto (a journalist I respect) , who wrote a couple of post about how the public were not consulted about the Wireless@PENANG and how the &lt;a title="Anil Netto: Germany warns of WiFi health risk" href="http://anilnetto.com/environmentclimate-change/germany-warns-citizens-of-wifi-health-risks/" target="_blank">European Parliament has begun to be wary of Wifi&lt;/a>.  All of this of course didn't bode well for the Penang Government, because they had to organize a&lt;a title="Town Hall: Wifi Effects Wireless@Penang" href="http://thestar.com.my/news/story.asp?file=/2008/10/5/nation/20081005150103&amp;amp;sec=nation" target="_blank"> town hall on the matter,&lt;/a> fortunately the science prevailed and Jeff Ooi (whom Lim Guan Eng branded as 'tech-savvy') announced that the project was back on track shortly after the town hall.
&lt;p>Unfortunately, the&lt;a title="Consumer Association of Penang Wireless@Penang" href="http://www.malaysiakini.com/letters/90679" target="_blank"> consumer association of Penang wrote a long open-letter to Lim Guan Eng&lt;/a>, chastising him for not engaging them enough. It was clear from the letter than the Consumer Association, while having the right intentions in mind&amp;ndash;were clearly misled in terms of the science. It was even clearer that all they wanted was for them to be engaged, but from my end I can&amp;rsquo;t see how a consumer association who has looked at the scientific data (and lack thereof) not conclude that the benefits of WiFi almost astronomically dwarf the &amp;lsquo;perceived&amp;rsquo; health risk&amp;ndash; quite frankly there are no health risk. More to the point, I would not even begin a conversation with them, till they point to some scientific proof of how WiFi is a health risk. At present there is no such data.&lt;/p></description></item><item><title>LGBT Movies Ban in Malaysia</title><link>https://keithrozario.com/2013/02/lgbt-movies-ban-in-malaysia/</link><pubDate>Mon, 11 Feb 2013 07:00:22 +0000</pubDate><guid>https://keithrozario.com/2013/02/lgbt-movies-ban-in-malaysia/</guid><description>&lt;p style="text-align: center;">
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Information-Ministry-LGBT-Movie-Ban.png"
 alt="Rais Yatim LGBT movie Ban, Lesbians Gays Transexuals and Bisexuals"
 title="Information-Ministry-LGBT-Movie-Ban"
 loading="lazy"
 />&lt;/p>
&lt;/p>
This is a bit of old and stale news, but in April of 2012, the Information Ministry released a 'directive' to ban all movies or films that featured gay characters. In their defence, the Ministry did later clarify that their facebook post wasn't a directive, but a topic for debate. Of course, there can't be much defending when the post itself starts with "&lt;em>Berkuatkuasa serta merta, stesen radio dan televisyen diminta menghentikan..&lt;/em>" which effectively translates to "&lt;em>With immediate effect, all radio and television stations are requested to stop..".&lt;/em>
&lt;p>However, this little directive provoked my thoughts, because I&amp;rsquo;ve always been intrigued by the &amp;lsquo;weeding&amp;rsquo; effect of censorship. The &amp;lsquo;weeding&amp;rsquo; effect is a simple analogy I came up with while I was &amp;ndash;you guessed it&amp;ndash; weeding my garden. You see I&amp;rsquo;ve got a small garden in my home, and every now and then I put a pair of pink rubber gloves and go weeding around by hand, it&amp;rsquo;s a tough job, but someone has to do it. Now for those of you who&amp;rsquo;ve weeded anything before you know those nasty little weeds tend to grow in between the grass, and it&amp;rsquo;s really difficult to pick them up without plucking a fair bit of non-weeds with them. In fact, if you&amp;rsquo;ve got a lawn like mine&amp;ndash;it&amp;rsquo;s almost impossible to get rid of the weeds without getting rid of the lawn grass as well. You most definitely want to avoid plucking out that expensive lawn grass you laid down.&lt;/p>
&lt;p>The same goes with censorship, every time you try to censor something like the word &amp;lsquo;Breast&amp;rsquo;, you may inadvertently censor out something entirely innocent and useful&amp;ndash;like Breast Milk, or Breast cancer, or Breast feeding. So while I really doubt the keyword Breast would lead to anything other than porn for the first 10,000 entries on Google, censoring the word Breast is really an ineffective solution because it could censor out a lot of really useful and relevant information.&lt;/p></description></item><item><title>Selangor Cyber Cafes made to retrieve personal data</title><link>https://keithrozario.com/2013/01/selangor-cyber-cafes-made-to-retrieve-personal-data/</link><pubDate>Tue, 01 Jan 2013 18:15:09 +0000</pubDate><guid>https://keithrozario.com/2013/01/selangor-cyber-cafes-made-to-retrieve-personal-data/</guid><description>&lt;p style="text-align: center;">
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/4199675334_66c3e3d61d_z.jpg"
 alt="Cybercafe operators made to retrieve MyKad information"
 title="Head in Hands"
 loading="lazy"
 />&lt;/p>
&lt;/p>
&lt;a title="selangor-cyber-cafes-to-register-patrons-mykad-information" href="http://www.goldfries.com/tech-news/selangor-cyber-cafes-to-register-patrons-mykad-information/" target="_blank">Goldfries today reports&lt;/a> that Selangor Cyber Cafes were given new regulations to make them 'healthier'. Among the new regulations put in place were:
&lt;blockquote>
&lt;p>&amp;gt;register their patrons&amp;rsquo; personal details based on their MyKad or MyKid identification cards.
&amp;gt;use transparent and untinted glass so that what happens inside can be monitored;
&amp;gt;have an open layout with no &amp;ldquo;blind spots&amp;rdquo; so that illegal activities like cyber gambling cannot be carried out without being easily noticed;
&amp;gt;have brighter lighting to give the perception of a &amp;ldquo;Healthy Cyber Cafe&amp;rdquo; instead of being dark and dingy;
&amp;gt;operate a minimum of 40 computers in urban areas, and 20 computers in rural areas.&lt;/p></description></item><item><title>Why the SKMM Rm200 smartphone rebate is a bad idea</title><link>https://keithrozario.com/2012/12/skmm-rm200-smartphone-rebate-pakej-kommunikasi-belia-pkb/</link><pubDate>Sun, 30 Dec 2012 07:00:47 +0000</pubDate><guid>https://keithrozario.com/2012/12/skmm-rm200-smartphone-rebate-pakej-kommunikasi-belia-pkb/</guid><description>&lt;p style="text-align: center;">
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Youth-Communication-Package-YCP-details.jpg"
 alt=""
 title="Youth-Communication-Package-YCP-details"
 loading="lazy"
 />&lt;/p>
&lt;/p>
The Malaysian Communications And Multimedia Commission (MCMC) or better known by its bahasa acronym SKMM, has recently announced that the government will be offering a 'rebate' of RM200 of a list of 'selected' smartphones for youthsaged 21 to 30 years old. The program called the 'Youth Communication Package' or Pakej Kommunikasi Belia (PKB) has come under tremendous scrutiny from both the general public, and even members of the ruling government as well.
&lt;div>&lt;a title="SKMM Press Release Rm200 Rebate" href="http://www.skmm.gov.my/skmmgovmy/media/General/pdf/Press-Release-PKB-GMBO.pdf" target="_blank">A press release from the SKMM&lt;/a> further elaborates:&lt;/div>
&lt;blockquote>Youths who qualify for the RM200 rebate will be able to purchase 'selected' 3G smartphones costing up to RM500 from &lt;span style="text-decoration: underline;">selected dealers and agents appointed by service providers&lt;/span>. With the rebate, they are expected to pay no more than RM300 to own a new 3G smartphone. “The idea is to spread the incentive across to those who do not yet use smartphones. We really want to help those who cannot afford to change phones to upgrade from their old 2G phones to a basic 3G smartphone.&lt;/blockquote>
The Malaysian cyberspace was immediately set abuzz when the announcement was made. The twitter outburst over the scheme is primarily on the price cap of Rm500 because when the Prime Minister announced this back when the budget was tabled, there was no mention about the RM500 price cap on the phone. Even UMNO youth chief Khairy got in on the action--&lt;a title="Khairy ask to not limit price of smartphone" href="http://rembau.com.my/2012/12/rebat-tidak-perlu-had-harga-telefon/" target="_blank">requesting the government not limit the price of the phones,&lt;/a> even after the SKMM 'clarified' why it was offering the rebate to only those purchasing phones under Rm500. &lt;em>(apparently we don't offer rebates to the rich)&lt;/em></description></item><item><title>Malaysia signs ITU</title><link>https://keithrozario.com/2012/12/malaysia-signs-itu/</link><pubDate>Sun, 16 Dec 2012 19:18:46 +0000</pubDate><guid>https://keithrozario.com/2012/12/malaysia-signs-itu/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/building-blocks-slide.png"
 alt=""
 title="building-blocks-slide"
 loading="lazy"
 />&lt;/p>
&lt;p>&lt;span style="color: #888888;">About 2,000 delegates representing major telecommunication industry players, experts and representatives from nearly 200 member countries of the International Telecommunication Union (ITU) assemble here to discuss the International Telecommunication Regulations (ITR) at theWorld Conference of International Telecommunications 2012 (WCIT).&lt;/span>&lt;/p>
&lt;p>&lt;span style="color: #888888;">Shouldering the responsibility as a member of the ITU Council for Asia- Pacific, Malaysia is expected to highlight the important issue of telecommunication network security and the right to protect the sovereignty of a country.&lt;/span>&lt;/p></description></item><item><title>Does the government have a right to shut down telecommunications services?</title><link>https://keithrozario.com/2012/11/does-the-government-have-a-right-to-shut-down-telecommunications-services/</link><pubDate>Fri, 30 Nov 2012 13:58:29 +0000</pubDate><guid>https://keithrozario.com/2012/11/does-the-government-have-a-right-to-shut-down-telecommunications-services/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/no_service-300x225.jpg"
 alt=""
 title="Disconnecting Mobile Phone Service"
 loading="lazy"
 />&lt;/p>
&lt;p>&lt;a title="Press.Tv" href="http://www.presstv.ir/detail/2012/11/23/274133/pakistan-suspends-mobile-phone-services/" target="_blank">Press.Tv reports that&lt;/a> Pakistan has suspended mobile phone services in several major cities to prevent terror attacks on minority Shia groups as they celebrate the holy month of Muharram. The rationale behind the suspension is that the terrorist use mobile phone services to detonate bombs and as a result the suspension of mobile phone services would help prevent such attacks. Meanwhile, Ihsanullah Ihsan, a spokesman for the militants&amp;rsquo; umbrella group, the Tehrik-e Taliban Pakistan (TTP), has claimed that suspending mobile phone services will not hold them back from carrying out their deadly attacks against the Shia Muslims.&lt;/p>
&lt;p>This is ultimately a case of the government having too much power, the real threat of terrorist using bombs somehow resulted in a &lt;strong>government issued&lt;/strong> communications blackout throughout the country&amp;ndash;which does little to prevent the terrorist who are hell bent on killing.&lt;/p>
&lt;p>I&amp;rsquo;m guessing that cellphones are picked as detonators for their ubiquity and range, however if you remove the cellphone from the equation you still have hundreds of possible detonation mechanisms, including timers (like the ones from early Mission Impossible shows), walkie talkies and even just a person standing by the bomb and detonating himself with it.&lt;/p>
&lt;p>While many of us are of the opinion that a government should do everything to protect it&amp;rsquo;s citizens, we often fail to to realize that the mechanisms the governments utilize to protect us has a cost&amp;ndash;a cost usually paid for by the very people they are supposed to protect.&lt;/p>
&lt;p>A full blown mobile service block, doesn&amp;rsquo;t just block the terrorist&amp;ndash;they block everyone. From a father frantically trying to locate his daughter, a hospital trying to locate next of kin in an emergency, or even a blood bank trying to contact its donors. This sort of carpet block is not an effective solution and the cost of it usually far outweigh the benefit, &lt;em>with the benefit being ZERO if the terrorist find some other way to detonate the bomb in spite of the block.&lt;/p></description></item><item><title>Anonymous downs Israeli web sites to protest web embargo</title><link>https://keithrozario.com/2012/11/anonymous-attacks-israel-for-censorshi/</link><pubDate>Sun, 18 Nov 2012 23:12:32 +0000</pubDate><guid>https://keithrozario.com/2012/11/anonymous-attacks-israel-for-censorshi/</guid><description>&lt;p>[blackbirdpie url=&amp;ldquo;https://twitter.com/YourAnonNews/status/269572459651555328&amp;rdquo;]&lt;/p>
&lt;p>In what can be described as a great battle for the freedom of the internet, Anonymous &amp;ndash; those self-proclaimed hacktivist &amp;ndash; have launched a series of attacks on Israeli websites owned by the Israeli Military or Government. The attacks come in the midst of a huge Israeli offensive on Gaza, but contrary to what &lt;a title="Anonymous targets Israeli websites" href="http://news.cnet.com/8301-1009_3-57551494-83/anonymous-targets-israeli-web-sites-in-protest-over-gaza/" target="_blank">CNet would have you believe&lt;/a>, the attack themselves were not in retaliation to the Gaza offensive, but rather a retaliation to the Israeli &lt;em>&amp;lsquo;threat&amp;rsquo;&lt;/em> of severing all internet communications in and out of Gaza.&lt;/p></description></item><item><title>Evidence Act: Anonymity before the internet</title><link>https://keithrozario.com/2012/11/evidence-act-anonymity-before-internet/</link><pubDate>Tue, 06 Nov 2012 08:00:35 +0000</pubDate><guid>https://keithrozario.com/2012/11/evidence-act-anonymity-before-internet/</guid><description>&lt;p>I read a brilliant article on the &lt;a title="Evidence Act by Zul Rafique and Partners" href="http://www.legal500.com/assets/images/stories/firmdevs/zul_presumption_of_guilt.pdf" target="_blank">Evidence act by Zul Rafique and Partners&lt;/a> that I think everyone should read. In it, the author compares the newly amended Evidence Act &lt;em>(supposedly amended to combat the evils of the internet)&lt;/em> to a sub-section of the original act meant to look into telegraphs. Now I must admit, that as an internet kid, I don&amp;rsquo;t quite understand the concept of a telegraph, but the point is that even before the internet &lt;strong>Anonymity was possible&lt;/strong>.&lt;/p>
&lt;p>The public perception that is reinforced by ignorant government statements, is that with the internet has&lt;strong> enabled anonymity which in turn has enabled crime&lt;/strong>.&lt;/p>
&lt;blockquote>According to Datuk Seri Mohamed Nazri Aziz, Minister in the Prime Minister Department, the amendments were tabled to address the issue of Internet anonymity since this very fact makes it extremely difficult, if not impossible, to trace the alleged offender.&lt;/blockquote>
&lt;p>That is a false statement.&lt;/p>
&lt;h2>Let me introduce you to snail-mail.&lt;/h2>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/2439736125_c4d1cfd6d1-300x225.jpg"
 alt=""
 title="Snail Mail Anonymous"
 loading="lazy"
 />&lt;/p>
&lt;p>In the past, long before the internet was around, people use to communicate via letters and postcards that were hand-delivered by postmen to your doorstep. This is a foreign concept to most children but it&amp;rsquo;s good to let them know just how hyper-connected they are in relation to their parents or grandparents.&lt;/p>
&lt;p>When you send a letter, you write a note on a piece of paper, sign it at the bottom (presumably with your name) and then place it into an envelope. You then write the name and address of the recipient on the envelope, afix a stamp (that acts as a proof of purchase)&amp;ndash;and then drop it off at any post office you see fit. The Post Office then somehow routes that letter to the recipient on the envelope&amp;ndash;physically hand delivered.&lt;/p>
&lt;p>Notice&amp;ndash;you never have to prove your identity when you send a letter or postcard. No where in the chain of events are you ever asked for your IC or phone number, in fact I could just as easily write a malicious letter, post it to the Prime Minister and sign it as Datuk Seri Mohamed Nazri Aziz. Would the Prime Minister then automatically assume his cousin sent him the letter just because it was signed in his name?&lt;/p>
&lt;p>I guarantee you it&amp;rsquo;ll be harder for the authorities to trace that physical letter as opposed to a similar digital email. Too many people watch CSI these days to believe that statement, but there&amp;rsquo;s a reason why kidnappers still use physical constructs&amp;ndash;because in the digital world you always leave a trace.&lt;/p>
&lt;p>If we apply the amended Evidence Act to the letter analogy, Datuk Seri Mohamed Nazri would be charge for sending that malicious letter to the Prime Minister&amp;ndash;even though he never wrote it. All of us understand the stupidity of assuming someone sent you a letter just because the letter was signed by that person, yet we seem to think nothing of it in terms of emails. In fact, if I wanted to get Nazri into a whole heap of trouble, all I&amp;rsquo;d have to do is send 1000 similar letters to 1000 different people, and sign it with his name&amp;ndash;in that way, he&amp;rsquo;d be charged 1000 different times in a 1000 different court proceedings and even though he might be deemed innocent on each count, it&amp;rsquo;s still a whole load of trouble I can cause for him for the price of 1000 stamps (roughly Rm500 which wouldn&amp;rsquo;t pay for even one hour of a lawyers time).&lt;/p></description></item><item><title>Auditor-General report 2011 : When can Malaysians expect Transparency in IT spend</title><link>https://keithrozario.com/2012/10/auditor-general-report-2011-malaysian-government-it-spend-transparency/</link><pubDate>Mon, 29 Oct 2012 08:00:49 +0000</pubDate><guid>https://keithrozario.com/2012/10/auditor-general-report-2011-malaysian-government-it-spend-transparency/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/putrajaya01-300x199.jpg"
 alt="How much does Putrajaya Spend on IT?"
 title="Putrajayas Spend on IT"
 loading="lazy"
 />&lt;/p>
&lt;p>As a tech blog in Malaysia, I thought it&amp;rsquo;d be interesting to see the latest Auditor-General&amp;rsquo;s report faired in terms of IT spend from the government. IT spend is a tricky thing, and most don&amp;rsquo;t understand just how tricky it is, particularly around big IT spend by governments&amp;ndash;they often fail. In fact, one of my favorite blogs is dedicated solely to IT failures, aptly titled&amp;ndash;&lt;a title="IT Project Failures" href="http://www.zdnet.com/blog/projectfailures/" target="_blank">IT Project failures.&lt;/a>&lt;/p>
&lt;p>However, even the &lt;a title="Auditors General Report : Synopsis 2011" href="http://www.intosaiitaudit.org/audit/federal_english.html" target="_blank">Synopsis report&lt;/a> of the AG report is a harrowing 87 pages long. It&amp;rsquo;s not just the length that puts of me off, but rather the sheer dry-ness of the language that is used. Interestingly, not a single diagram exist in the documentation filled with enough monotone text to put even the most ardent auditor to sleep, and I&amp;rsquo;m no auditor so I nearly dozed off after the 2nd page. I had to take a different approach if I was to get a synopsis of the synopsis, fortunately I work in IT (not auditing or law), and I know of function in Adobe Acrobat that let&amp;rsquo;s you quickly search a document&amp;ndash;it&amp;rsquo;s called the FIND function, and I was a deadly ninja in the art of the FIND.&lt;/p>
&lt;p>So, armed with the FIND function on Adobe Reader, I combed through the document looking for the word &amp;lsquo;system&amp;rsquo; and where it tied with an actual IT system too see just how well our government was in delivering IT systems in 2011. Below are just a few paragraphs pertaining to the AG&amp;rsquo;s report and below are 2 prime examples of the the magnitude of IT failures from Putrajaya.&lt;/p></description></item><item><title>Sumptuous Erotica and Barisan Nasional</title><link>https://keithrozario.com/2012/10/sumptuous-erotica-alvin-vivian-barisan-nasional/</link><pubDate>Tue, 23 Oct 2012 08:00:19 +0000</pubDate><guid>https://keithrozario.com/2012/10/sumptuous-erotica-alvin-vivian-barisan-nasional/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/alvin-vivian-interview-youtube.jpg"
 alt="Alvin and Vivian interview on youtube"
 title="Alvin and Vivian interview on youtube"
 loading="lazy"
 />&lt;/p>
&lt;center>&lt;/center>&lt;/center>In case you've been under a rock for the past week let me fill you on some details:
&lt;p>Alvin Tan and Vivian Lee&amp;ndash;both Malaysians started a little porn blog called Sumptuous Erotica attracted headlines both in Malaysia and across the causeway. However, unlike other couples who&amp;rsquo;ve been caught with their pants down before, both Alvin and Vivian seem indifferent to the controversy surrounding them, more importantly they seem quite confident that they&amp;rsquo;ve done nothing wrong and have nothing to apologize for to anyone.&lt;/p>
&lt;p>On the face of it&amp;ndash;they&amp;rsquo;re right. Whatever you think Alvin or Vivians parents have against their children posting pictures of themselves naked online&amp;hellip;that&amp;rsquo;s a matter for them to settle, not for you to be a busy body about.&lt;/p></description></item><item><title>Software piracy in China : Can the Yankees really complain?</title><link>https://keithrozario.com/2012/10/software-piracy-china/</link><pubDate>Sun, 21 Oct 2012 09:00:40 +0000</pubDate><guid>https://keithrozario.com/2012/10/software-piracy-china/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Yankee-Pirates-software-piracy.jpg"
 alt=""
 title="Yankee-Pirates-software-piracy"
 loading="lazy"
 />&lt;/p>
&lt;p>Did you know the term &lt;a title="The Pirates Delimma : Etyymology of Yankee" href="http://thepiratesdilemma.com/the-tao-of-pirates/etymology-of-a-yankee" target="_blank">&amp;lsquo;Yankee&amp;rsquo; is thought to be derived from the Dutch name &lt;em>Janke&lt;/em>, which means “little Jan” or “little John,” a nickname that can be traced back to the 1680s, when it was used as a slang term for pirates&lt;/a>. Yes, you heard that right, the Americans were regarded by the Europeans as Pirates. At least that&amp;rsquo;s what Matt Mason, author of &lt;a title="The Pirates Dilemma" href="http://thepiratesdilemma.com/" target="_blank">The Pirates Dilemma&lt;/a> suggest.&lt;/p>
&lt;p>Matt isn&amp;rsquo;t just an author of a book, but also the Executive Marketing Director of BitTorrent, so when he says something&amp;ndash;I listen. Things like:
[box icon=&amp;ldquo;chat&amp;rdquo;]&lt;/p>
&lt;p>But the term really gained steam during the Industrial Revolution. Europeans began using the term to refer to all North Americans as a result of America&amp;rsquo;s national policies towards European intellectual property. America only industrialized as rapidly as it did by counterfeiting European inventions, ignoring global patents and stealing intellectual property wholesale. Lax enforcement of the intellectual property laws was the primary engine of the American economic miracle writes Doron S. Ben-Atar in Trade Secrets. The United States employed pirated know-how to industrialize. Europeans saw America as a nation of bootleggers, which was a little unfair, as every major European country was also heavily engaged in piracy and industrial espionage at some point in the 18th century. Piracy was, in fairness, the only way the U.S. could keep up.&lt;/p>
&lt;/blockquote>
Of course, fast forward a couple hundred years, and now you see US companies accusing other countries, particularly China and other Asian nations of doing the exact same thing the US did to try to bridge the economical and technological gap it had with Europe. One would argue that part of the China miracle, is their lax enforcement and ignorance (or arrogance) of patent laws, but in all fairness within this space of of gross patent apathy, there exist large pockets of innovation that would otherwise be impossible if intellectual property laws were strictly enforced and followed.
&lt;p>Consider a very specific example of the &amp;lsquo;drop down&amp;rsquo; menu in the iOS. When I bought the iPhone4 for my wife 2 years ago, the only way you could get the &amp;lsquo;fancy&amp;rsquo; drop down menu that enable/disabled 3G and Wi-Fi was by jail-breaking your iPhone. Now it comes standard with iOS from Apple, so you could in theory argue that the worlds best design company got their que from the pirate market&amp;ndash;but you never hear apple admitting to this.&lt;/p></description></item><item><title>Cyberbullying in Malaysia</title><link>https://keithrozario.com/2012/10/cyberbullying-in-malaysia/</link><pubDate>Tue, 16 Oct 2012 07:00:11 +0000</pubDate><guid>https://keithrozario.com/2012/10/cyberbullying-in-malaysia/</guid><description>&lt;center>&lt;iframe src="http://www.youtube.com/embed/vOHXGNx-E7E" frameborder="0" width="560" height="315">&lt;/iframe>&lt;/center>
Tributes are pouring in for Amanda Todd,&lt;a title="Teenager commits suicide after cyberbullying" href="http://www.cbc.ca/news/canada/british-columbia/story/2012/10/11/bc-maple-ridge-suicide.html" target="_blank"> a teenager who committed suicide after posting the video above describing how she was tormented by bullies and struggling with depression&lt;/a>. Amanda's story was told little by little via post-it notes and it full detail about the extent of the bullying and torment and just how this poor 15-year old girl had experienced her version of hell on earth.
&lt;p>The story isn&amp;rsquo;t a typical one, but one that exist in a nuance variety even in Malaysia. Amanda was tricked into exposing herself in front of a webcam by an unknown person. Soon she was blackmailed and finally, photos or her were circulated to her entire school. What followed next was every bit as predictable as it is sad, she was ostracized by her friends and tormented by bullies, she even tells of how she switch schools&amp;ndash;multiple times&amp;ndash;even moving to a school in a different city!!&lt;/p>
&lt;p>Yet, the bullies and torments followed here (aided and enabled by social networks), and Amanda must have reached her limit and at some point she eventually chose to take her own life.&lt;/p>
&lt;p>Youtube has taken down the videos, but I felt Amanda&amp;rsquo;s story should be left for the world to see, as a stark reminder to all of us to look after our children, and I just hope you get to watch the embedded video before even this gets removed. I believe out of respect for Amanda&amp;ndash;we should listen to the story she so desperately wanted to tell.&lt;/p></description></item><item><title>Let's put the evidence act into action</title><link>https://keithrozario.com/2012/09/gopinanth-jayaratnam-evidence-act-114a/</link><pubDate>Fri, 28 Sep 2012 22:30:44 +0000</pubDate><guid>https://keithrozario.com/2012/09/gopinanth-jayaratnam-evidence-act-114a/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Gopinath-Jayaratnam-300x289.png"
 alt=""
 title="Gopinath Jayaratnam"
 loading="lazy"
 />&lt;/p>
&lt;p>So let&amp;rsquo;s say someone in Malaysia actually was stupid enough to post something insulting Islam and it&amp;rsquo;s Prophet on his Facebook page as a status message. Then let&amp;rsquo;s say that same person claimed that his Facebook page was hacked.&lt;/p>
&lt;p>Finally, we say there&amp;rsquo;s a huge backlash against this person on the internet, so even though the comment was deleted from Facebook, it has been screenshot-ed so many times, it&amp;rsquo;s now permanently etched online.&lt;/p>
&lt;p>This is exactly the sort of hypothetical situation the newly amended Evidence act is supposed to address, yet for the most part it doesn&amp;rsquo;t. In fact, the case really isn&amp;rsquo;t hypothetical, it&amp;rsquo;s actually something going on right now, and it&amp;rsquo;s a great test-bed to see if indeed the evidence act would help us address these issues.&lt;/p>
&lt;p>Gopinanth Jayaratnam from Klang, posted up a rather insulting statement online about Islam. Of course, a couple of people picked it up  and soon it went viral on Facebook. What followed was every bit as predictable as a bad hollywood movie, Police reports were lodged, the &amp;lsquo;suspects&amp;rsquo; personal details were published online and soon a group calling itself the Jemaah Fisabilillah Klang, launched an actual attack on his house. The gate of his house was rammed into and the car parked in the compound was damaged. Fortunately, there was no report of bodily harm, but one can imagine that&amp;rsquo;s probably not too far away.&lt;/p></description></item><item><title>One Visa files suit against TM : Is it a Human Rights abuse?</title><link>https://keithrozario.com/2012/09/one-visa-files-suit-against-tm-is-it-a-human-rights-abuse/</link><pubDate>Wed, 26 Sep 2012 22:00:16 +0000</pubDate><guid>https://keithrozario.com/2012/09/one-visa-files-suit-against-tm-is-it-a-human-rights-abuse/</guid><description>&lt;p>The Star today reported that a company called One Visa is suing Telekom Malaysia (TM) for providing telecom services and infrastructure to squatters on it&amp;rsquo;s land in Negeri Sembilan.&lt;/p>
&lt;blockquote>TM was alleged to have trespassed five pieces of One Visa's land by supplying the telco services to the illegal occupiers of its land.
&lt;p>One Visa had sought RM23.07mil as special damages being the total rental value of the land based on current market value rates calculated from March 22, 2011 and continuing until cessation of the telco services and the date of removal of TM&amp;rsquo;s infrastructure from the land.&lt;/p>
&lt;p>That&amp;rsquo;s right 23.07mil in &amp;lsquo;special&amp;rsquo; damages for the TOTAL rental value of the land, because TM had supplied telco services to the illegal occupiers.&lt;/blockquote>
Now, I&amp;rsquo;m no lawyer and I&amp;rsquo;m not familiar with the case, So I cannot comment on the legality (or illegality) of the squatters staying on the land. What I can comment on though is the utter ridiculousness of the suit to sue TM for the full rental of the land just because TM had supplied telco services. That&amp;rsquo;s like charging your neighbour rental for your entire house value, just because his mango tree has over-grown into your garden.&lt;/p></description></item><item><title>Ban Youtube in Malaysia?</title><link>https://keithrozario.com/2012/09/ban-youtube-in-malaysia/</link><pubDate>Tue, 18 Sep 2012 09:23:13 +0000</pubDate><guid>https://keithrozario.com/2012/09/ban-youtube-in-malaysia/</guid><description>&lt;p>&lt;img src="https://keithrozario.com/uploads/Ban_you_tube.png" alt="" title="Ban_you_tube" />&lt;/p>
&lt;p>Rais Yatim a Member of Malaysian Parliament and a Minister in Government, has threatened Youtube with legal action over their refusal to remove the video of Innocence of Muslims. Nevermind the fact that Youtube have tried their level best to restrict access to the video from Malaysian users, and also failing to recognize the fact that Youtube is merely a video sharing site.&lt;/p>
&lt;p>You have to sympathize with Google, they&amp;rsquo;ve drawn the line the sand and they&amp;rsquo;re getting the most flak of anyone in this debacle. Most people seem to forget that it was a Youtube user (not Youtube itself) that created and uploaded the film. It also may have slipped your mind, that the video clip is available on other less prominent video sharing sites like Vimeo. Yet Google is sticking to it&amp;rsquo;s guns under enormous pressure not just from Muslim Governments but from it&amp;rsquo;s own Government to take down the offensive video. At the very least they deserve commendation for their courage in the face of adversity.&lt;/p></description></item><item><title>Censoring Innocence of Muslims in Malaysia</title><link>https://keithrozario.com/2012/09/censoring-innocence-of-muslims-in-malaysia/</link><pubDate>Mon, 17 Sep 2012 15:21:38 +0000</pubDate><guid>https://keithrozario.com/2012/09/censoring-innocence-of-muslims-in-malaysia/</guid><description>&lt;p>&lt;img src="https://keithrozario.com/uploads/Innocence-of-Muslims-Muhammad-Movie-FULL-HD-YouTube.png" alt="" title="Innocence of Muslims Muhammad Movie FULL HD YouTube" />&lt;/p>
&lt;p>The Malaysian government has requested that Google take down the video Innocence of Muslims, and Google has since complied. As of today, anyone trying to access the clip from a Malaysian IP address would see a screen that reads &amp;ldquo;This content is not available in your country due to a legal complaint. Sorry about that.&amp;rdquo;&lt;/p>
&lt;p>The clip is most definitely offensive, and demeaning but what is quite obviously isn&amp;rsquo;t is&amp;ndash;serious. The first thing anyone notices from the clip is that it&amp;rsquo;s of low quality, there are multiple versions of &lt;a title="Malaysian Gangnam" href="http://www.youtube.com/results?search_query=gangnam+malaysia&amp;amp;oq=gangnam+malaysia&amp;amp;gs_l=youtube.3...15117.16004.0.16133.9.9.0.0.0.0.101.542.7j2.9.0...0.0...1ac.1.OBWxuJr7ncM" target="_blank">Malaysian Gangnam style &lt;/a>that are made with far higher quality than the clip, yet this one particular clip has managed to create such an uproar that people have killed for it. I&amp;rsquo;m not defending the clip, or opposing it.&lt;/p>
&lt;p>What I am against is Governments and Corporations coming together to censor something &amp;lsquo;on behalf&amp;rsquo; of the people. What I am against is a ineffectual censorship, which instead of preventing people from viewing the clip, actually nudge them towards actively searching for it online.&lt;/p>
&lt;p>In the end, we have to say that video clips don&amp;rsquo;t kill people&amp;ndash;people kill people and  in my view the censoring of the clip is both ridiculously short-sighted and terribly ineffective.&lt;/p></description></item><item><title>Evidence Act Technological Misconceptions: A response to Rocky and Fatimah</title><link>https://keithrozario.com/2012/08/evidence-act-114a-technological-misconceptions/</link><pubDate>Wed, 15 Aug 2012 12:56:16 +0000</pubDate><guid>https://keithrozario.com/2012/08/evidence-act-114a-technological-misconceptions/</guid><description>&lt;center>&lt;/center>The government has finally 'relented' and now wants to 'discuss' section 114A of the Evidence act 1950. Now it's great because it proves beyond a shadow of a doubt that:
&lt;ol>
&lt;li>
&lt;p>The internet can be used for fantastic good.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>The general Malaysian public can make a difference in the governance of the country.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>My website also had the pop-up banner, and according to Google Analytics, all 300+ people who visited yesterday were at least enlightened by it.&lt;/p>
&lt;p>However, there are some misconceptions about the act, or more specifically misconceptions about the technology behind the internet. The only reason, I&amp;rsquo;m writing this post is because yesterday morning &lt;a title="Section 114a according to Fatimah Zuhri" href="http://www.rockybru.com.my/2012/08/section-114a-according-to-fatimah-zuhri.html" target="_blank">RockyBru posted up content by a blogger named Fatimah Zuhri&lt;/a>, defending the act. Why on earth would a blogger defend the act is beyond me, but it became clear that her understanding of key internet concepts were way off the mark.&lt;/p>
&lt;p>From a technological perspective, she was advocating from a point of ignorance, and Rocky whose a popular (or unpopular) blogger/journo only served to spread these misconceptions. I hope to point out how it is very difficult to pinpoint the origin of an anonymous or malicious post, and how shifting that burden to the ordinary citizen is unjustified.&lt;/p>
&lt;p>So let&amp;rsquo;s start with the Post which you can read &lt;a title="Amendment to the Evidence Act 1950" href="http://fatimahzuhri.blogspot.co.uk/2012/08/amendment-to-evidence-act-1950.html" target="_blank">here&lt;/a>, although for your sake I wouldn&amp;rsquo;t suggest it. Partial contents of the post is quoted in here as well.&lt;/p></description></item><item><title>Personal Data Protection Act 2010 Malaysia</title><link>https://keithrozario.com/2012/07/personal-data-protection-act-2010-malaysia/</link><pubDate>Mon, 30 Jul 2012 06:00:19 +0000</pubDate><guid>https://keithrozario.com/2012/07/personal-data-protection-act-2010-malaysia/</guid><description>&lt;p>[box icon=&amp;ldquo;chat&amp;rdquo;]&lt;/p>
&lt;p>Data is the natural by-product of every computer mediated interaction.  It stays around forever, unless it’s disposed of.  It is valuable when reused, but it must be done carefully.  Otherwise, its after-effects are toxic. - &lt;a title="Bruce Schneier" href="http://news.bbc.co.uk/2/hi/technology/7897892.stm" target="_blank">Bruce Scheneier&lt;/a>&lt;/p>
&lt;/blockquote>
&lt;p>As society moves towards a &amp;lsquo;knowledge&amp;rsquo; based society, data naturally becomes a by product. Every action you perform leaves a tiny digital trail like breadcrumbs in the forest, and just like though breadcrumbs each individual data point is insignificant, but piece them together&amp;ndash;and you&amp;rsquo;ve found you way home.&lt;/p>
&lt;p>What we use to buy we cash, we now buy with credit cards &amp;ndash; with every swipe, digital data is created and stored, it records the amount of the transaction, where the transaction took place, and the banks bill the customer, which means it can tie it to an address a person, their age, their income and even their preferences.&lt;/p>
&lt;p>Photos were physical things we could only share in person,but now we share them digitally on social networks&amp;ndash;all those photos are stored&amp;ndash;permanently, and they&amp;rsquo;re tagged with meta data regarding the photos location and the names of people in the photo. A lot more data, and a lot more public. Even if you randomly stumbled across a photo on Facebook, chances are you could easily find out who the people in the photos were, and where the photo was taken&amp;ndash;that wasn&amp;rsquo;t the case before digital photography.&lt;/p>
&lt;p>When we use to pay toll booths in cash, we now use touch N&amp;rsquo; Go, so there is a full blown record of where we travelled and at what time. Coupled with the CCTV footage they can even identify which vehicle you used. Tie that with your credit card and we can determine where you fueled before you got on the highway, coupled with CCTV footage from the Fuel station we know how many people were in the vehicle. Look at the JPN records and we&amp;rsquo;ve got the car owners name, and contact information, a quick search on Google reveals his profession on LinkedIn, his favorite places from tripadvisor, his friends on facebook, and if we pay close enough attention to his tweets chances are we can find out which football team he supports or which political party he&amp;rsquo;s aligned to.&lt;/p>
&lt;p>What used to be something you&amp;rsquo;d only reserve for your close friends at the kopitiam now is public knowledge, provided some one takes the trouble to Google your name.&lt;/p>
&lt;p>And the list literally goes on and on, and all these add the amount of our personal data stored digitally online&amp;ndash;data that can be used to determine who you are, where you are, what you like, what your political beliefs and religious inclinations&amp;ndash;even your medical history and sexual orientation. I&amp;rsquo;m not kidding, there&amp;rsquo;s a story I love to link to which tells of a &lt;a title="How Target Found out teenager was pregnant before Father" href="http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/" target="_blank">supermarket who knew a teenager was pregnant before her father did&lt;/a>.&lt;/p>
&lt;p>One of the biggest abusers of personal data has been advertising companies and mail-order folks, the people that spam you day in and day out with emails about viagra and cheap housing loans, however as time goes on a lot of other people are getting on board, like insurance companies who want to know more about your medical history or driving records, banks who wish to determine if you&amp;rsquo;re really eligible for a loan&amp;ndash;even a supermarkets may have a direct interest in your personal data.&lt;/p>
&lt;p>It has become imperative that we as users look towards protecting our data online, but there also is an imperative for governments to regulate the way our data can be used&amp;ndash;even by governments themselves (or ESPECIALLY by the government).&lt;/p></description></item><item><title>Is your Wi-Fi safe?</title><link>https://keithrozario.com/2012/07/dlink-dir-615-wi-fi-password-unifi-hack/</link><pubDate>Sun, 01 Jul 2012 08:00:28 +0000</pubDate><guid>https://keithrozario.com/2012/07/dlink-dir-615-wi-fi-password-unifi-hack/</guid><description>&lt;p>With the newly enacted Evidence Bill Amendment, you would have been deemed to have published everything that originates from your IP address. What that means is that if someone hacks your Wi-Fi and then uses it to publish malicious or seditious statements online, you will be deemed to have published it, and the onus is on &lt;strong>YOU&lt;/strong> to prove you&amp;rsquo;re innocence rather than for the prosecution to prove your guilt.&lt;/p>
&lt;p>So obviously with the new law floating around, Wi-Fi security should be at the top of every Unifi Subscribers agenda&amp;ndash;if it isn&amp;rsquo;t already.&lt;/p>
&lt;h2>However, how secure is your Unifi Wi-Fi connection?&lt;/h2>
The short answer is not so secure.
&lt;p>The brilliant blog Lifehacker &lt;a title="Lifehacker: Hacking Wifi Passwords" href="http://lifehacker.com/5873407/how-to-crack-a-wi+fi-networks-wpa-password-with-reaver" target="_blank">recently posted an article on how you can hack Wi-Fi connections secured by a WPA or WPA2 password&lt;/a>. The post is quite detailed but even I have to admit the technical skills neccessary to pull this off is somewhere between intermediate and expert. At the end of the post is a link to a &lt;a title="Devices Susceptible to Wifi Hack" href="https://docs.google.com/spreadsheet/lv?key=0Ags-JmeLMFP2dFp2dkhJZGIxTTFkdFpEUDNSSHZEN3c" target="_blank">spreadsheet detailing all the devices that are susceptible to this hack&lt;/a>, and one of those devices is the DLink Dir-615 Wi-Fi router, if it doesn&amp;rsquo;t sound familiar let me refresh your memory&amp;ndash;it&amp;rsquo;s the router that Unifi gives out to all Unifi customers!!! &lt;em>(que bone-chilling Alfred Hitchcock Movie sound)&lt;/em>&lt;/p>
&lt;p>&lt;img
 src="https://keithrozario.com/uploads/dir-615-300x201.jpg"
 alt=""
 title="dir-615"
 loading="lazy"
 />&lt;/p>
&lt;p>Now taking aside the fact, that I could probably call all Unifi customers to request the Wi-Fi password printed at the bottom of their router, and 50% would probably provide that to me with no issue, this also means that for those people smart enough to hide their passwords &amp;ndash; I can still hack your Unifi Wi-Fi connection no matter what you do on your router. There&amp;rsquo;s literally nothing you can do, hiding SSIDs don&amp;rsquo;t work and neither will MAC address filtering. Of course this is all theory, and testing this theory took a lot more time than I had, &lt;strong>so I&amp;rsquo;m not sure.&lt;/strong>&lt;/p>
&lt;p>What I am sure is that Unifi have their own firmware for the DIR-615 router, and that&amp;rsquo;s a partially susceptible router, meaning some firmwares are susceptible some firmwares aren&amp;rsquo;t, and it&amp;rsquo;s a coin toss and whether your router at home is susceptible.&lt;/p>
&lt;p>Now, while I know of a few people who hack Wi-Fi passwords just for the fun of it,and there&amp;rsquo;s a lot of references and material online detailing the steps required&amp;ndash;so we all know this works. In fact you can buy &lt;a title="Crack Unifi Password" href="http://paramedik.bbfr.net/t8950-software-crack-password-wifi-include-unifi-dan-adapter-wifisky-2000mw" target="_blank">packages online that allow you crack the routers &lt;/a>easily :). This blog written in Malay claims that &lt;a title="http://mangnik.blogspot.com/2012/02/bruteforce-wifi-protected-setup-dengan.html" href="http://mangnik.blogspot.com/2012/02/bruteforce-wifi-protected-setup-dengan.html" target="_blank">they&amp;rsquo;ve successfully hacked a DLink Dir-615 router&lt;/a>, I&amp;rsquo;ve no doubt it&amp;rsquo;s possible, but it&amp;rsquo;s not easy and it takes time.&lt;/p>
&lt;p>Either way though, it&amp;rsquo;s always good to remember this. There is no such thing as impossible to crack, merely inconvenient and infeasible. Don&amp;rsquo;t believe me? Check out this story of how a group of &lt;a title="Drone Hacked with $1000" href="http://nakedsecurity.sophos.com/2012/07/02/drone-hackedwith-1000-spoofer/">University Students manage to hack a US Military Drone in mid-flight using nothing more than $1000 worth of equipment&lt;/a>, do you really think your Wi-Fi at home is more secure a &amp;lsquo;death from above&amp;rsquo; US Predator Drone? Every Wi-Fi access point hackable, it&amp;rsquo;s only a matter of how much time, effort and money is required.&lt;/p></description></item><item><title>Is Dowloading a banned ebook illegal?</title><link>https://keithrozario.com/2012/06/downloading-irshad-manji-ebook-illegal-malaysian-law/</link><pubDate>Fri, 22 Jun 2012 10:00:02 +0000</pubDate><guid>https://keithrozario.com/2012/06/downloading-irshad-manji-ebook-illegal-malaysian-law/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Banned_Books.jpg"
 alt=""
 title="Banned_Books"
 loading="lazy"
 />&lt;/p>
&lt;p>Let&amp;rsquo;s get straight to the point, the latest case where the Federal Territory Islamic Affairs Department (Jawi) is prosecuting a store manager is both disgusting and without merit. Not only is she just a Manager carrying out here duties&amp;ndash;t&lt;em>hereby making the bookstore liable instead of her&lt;/em>, but the raid on the bookstore was carried out BEFORE the book was banned by the Home Ministry. So here in Malaysia, not only will the Government be able to persecute you in a guilty until proven innocent manner, but apparently government agencies can persecute for possession of a book before it is banned.&lt;/p>
&lt;p>However, politics aside, let&amp;rsquo;s talk technology!!&lt;/p>
&lt;p>What if I used Technology to bypass all government censorship. So instead of buying the book from Borders (or MPH, Popular or Kinokuniya for that matter), I simply download the Kindle version of the book online?&lt;/p>
&lt;p>I did an online search, and indeed found that &lt;a title="Amazon Liberty and Love ebook" href="http://www.amazon.com/Allah-Liberty-and-Love-ebook/dp/B004INHA12/ref=tmm_kin_title_0?ie=UTF8&amp;amp;qid=1340264314&amp;amp;sr=8-1" target="_blank">Amazon has a Kindle version of the book retailing for $11.99&lt;/a>, if you already own a &lt;a title="Kindle in Malaysia : Buying and Using a Kindle in Malaysia" href="http://www.keithrozario.com/2012/04/kindle-malaysia-buying-ebooks-amazon.html" target="_blank">Kindle in Malaysia&lt;/a>, then you can bypass all this drama and simply download the book to your Kindle. Of course, there are &lt;a title="Is it legal to buy ebooks from Amazon?" href="http://www.keithrozario.com/2012/05/is-it-legal-to-buy-ebooks-from-amazon.html" target="_blank">legal concerns with just downloading regular books from Amazon&lt;/a>, much less banned books&amp;ndash;so be warned!!&lt;/p>
&lt;p>Now I wouldn&amp;rsquo;t recommend it and there are huge legal questions, but technically&amp;ndash;it can done, and it can done easily. I&amp;rsquo;m start to finish in 5 minutes&amp;ndash;it really is that easy.&lt;/p>
&lt;p>My point isn&amp;rsquo;t that the book should or should not be banned, my point is that the ban can be circumvented with ease using technology. So how effective can any ban be, when most Malaysians have access to the internet?&lt;/p>
&lt;p>On top of this is a very interesting question, Does a banning a &lt;span style="text-decoration: underline;">physical book&lt;/span> constitute internet censorship&amp;ndash;probably not. However, does banning an &lt;span style="text-decoration: underline;">electronic book&lt;/span> constitute internet censorship? Of course you may say the law makes no distinction between and e-book and an actual physical book, but the law makes no distinction between and ebook and webpage either (they&amp;rsquo;re all considered publications), and if banning a webpage is obviously internet censorship, isn&amp;rsquo;t banning an ebook internet censorship as well?&lt;/p>
&lt;p>The question I believe can be synthesized into &lt;strong>Does Banning and ebook constitute censoring the internet? &lt;/strong>I don&amp;rsquo;t have the answer, but I believe there are 2 aspects:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>The Traditional legal aspect as covered by the Printing and Publications act 1984.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>The goverment promise as outline in the MSC Bill of Guarantees to not censor the internet.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>If you&amp;rsquo;re a lawyer, I would love to hear your comments.&lt;/p></description></item><item><title>Internet Privacy with TOR: Should the internet be anonymous</title><link>https://keithrozario.com/2012/06/internet-privacy-tor-anonymous-tracking/</link><pubDate>Thu, 21 Jun 2012 07:42:54 +0000</pubDate><guid>https://keithrozario.com/2012/06/internet-privacy-tor-anonymous-tracking/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/6824169382_b4bdcd0bbc_n.jpg"
 alt=""
 title="Anonymous_Surfing"
 loading="lazy"
 />&lt;/p>
&lt;p>It&amp;rsquo;s an irony that while the internet was the first place you could create avatars and split personalities to impersonate others, it has now turned into a free for all buffet for private data. I previously shared on &lt;a title="How come the ads you see look like your previous searches?" href="http://www.keithrozario.com/2012/05/how-come-the-ads-you-see-look-like-your-previous-searches.html" target="_blank">how the ads you see on facebook were inherently tied to the Google searches you perform&lt;/a>, and &lt;a title="Target found girl was pregnant before her Father" href="http://articles.businessinsider.com/2012-02-16/strategy/31065696_1_pregnant-woman-coupons-target" target="_blank">how ad companies have probably gathered so much data on you that they can find out if you&amp;rsquo;re pregnant before even you do&lt;/a>.&lt;/p>
&lt;p>With that in mind, many people still have an antiquated concept of a fully private and anonymous internet, in fact in most cases its easier to track an internet connection than an actual physical person, and its actually quite possible that a confiscated computer from your home could prove your whereabouts for the last 2 years. Earlier this year, a 19 year old girl was strangled to death while she was asleep, her &lt;a title="Florida Couple charged with Murder" href="http://www.nydailynews.com/news/national/florida-couple-allegedly-googled-kill-girl-minutes-strangled-article-1.1090562" target="_blank">alleged killers were actual stupid enough to perform an internet search&lt;/a> on “chemicals to passout a person,” “making people faint,” “ways to kill people in their sleep,” “how to suffocate someone” and “how to poison someone”. Needless to say, the evidence seems rock solid, and these dumb criminals would go behind bars.&lt;/p>
&lt;p>On the other hand, some criminals aren&amp;rsquo;t so stupid. In fact, the FBI, Interpol and various other law enforcement agencies have entire departments looking and searching for online criminals who do everything from fake money Nigerian scams to trafficking child pornography on the internet. These guys have proven quite difficult to track because of something called TOR.&lt;/p></description></item><item><title>Black Day for Malaysians : New Evidence Bill Takes effect today</title><link>https://keithrozario.com/2012/06/evidence-act-amendment-malaysia/</link><pubDate>Fri, 01 Jun 2012 05:00:38 +0000</pubDate><guid>https://keithrozario.com/2012/06/evidence-act-amendment-malaysia/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Black-300x75.jpg"
 alt=""
 title="Black"
 loading="lazy"
 />&lt;/p>
&lt;p>Today marks a crucial point in the crusade against freedom on the internet in Malaysia. We&amp;rsquo;ve had SOPA in the US, ACTA in Europe and the TPP has brought the fight closer to our borders. Today in a brilliant tactical move by the enemy of Freedom,  Malaysians will be subjected to an amended evidence act that would shift the burden of proof from the accuser to the accused. It is a black day indeed, and the words John Fogerty ring in my ears&amp;ndash;I see a bad moon rising.&lt;/p></description></item><item><title>Scary Scary Privacy Concerns Online</title><link>https://keithrozario.com/2012/05/privacy-concerns-mozilla-collusion/</link><pubDate>Sun, 20 May 2012 15:40:39 +0000</pubDate><guid>https://keithrozario.com/2012/05/privacy-concerns-mozilla-collusion/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/All-300x225.jpg"
 alt=""
 title="All"
 loading="lazy"
 />&lt;/p>
&lt;p>Would you get freaked out if I told that from just 1 hour of internet browsing, your information could be shared with nearly 70 organizations, including advertisers who use it to target ads to you. Would you be angered if this information were sold to other 3rd parties including insurance providers and even governments to build profiles of you on their systems. Would you be annoyed that the internet which promised to be a bastion of democracy and anonymity, isn&amp;rsquo;t all it was cracked up to be? Well read on&amp;hellip;&lt;/p>
&lt;p>Recently I posted something about how Advertisers &lt;a title="How come the ads you see look like your previous searches?" href="http://www.keithrozario.com/2012/05/how-come-the-ads-you-see-look-like-your-previous-searches.html">track your data via the pages you visited&lt;/a>, and how the advertisers successfully build profiles of you based on information readily available online in addition to your browsing habits. What they then have is a treasure trove of information many of us consider private, these include your birthdate (and by extension your age)   your preferences, your affliations (both religious and professional) your likes and dislikes, your family members&amp;hellip;etc etc. If you&amp;rsquo;re a person who likes privacy, you might want to unplug your laptop&amp;ndash;right now!&lt;/p>
&lt;p>Remember the story of the &lt;a title="Supermarket finds out daughter pregnant before dad," href="http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html?pagewanted=all" target="_blank">supermarket who knew a teenage girl was pregnant before her dad did&lt;/a>, that&amp;rsquo;s nothing compared to the amount of data these networks have on your own children. If your children go online regularly, somebody has a pretty good profile on them. And if you would get freaked out if somebody followed your child everyday with a camera and notebook , you should worry about the amount of personal (and very private) information some companies are keeping on you &amp;ndash; and your loved ones.&lt;/p></description></item><item><title>Trans-Pacific Partnership Agreement : What is it?</title><link>https://keithrozario.com/2012/05/tpp-malaysia-chile/</link><pubDate>Tue, 15 May 2012 17:50:35 +0000</pubDate><guid>https://keithrozario.com/2012/05/tpp-malaysia-chile/</guid><description>&lt;p>&lt;img src="http://farm4.staticflickr.com/3129/2583620793_a41371bec1.jpg" alt="" />&lt;/p>
&lt;p>You may remember a&lt;a title="Copyright laws get dumber: Trans-Pacific Partnership (TPP) agreement" href="http://www.keithrozario.com/2012/02/copyright-law-malaysia-tpp.html"> previous post&lt;/a> about the Trans-Pacific Partnership (TPP) Agreement that the Malaysian Government (our Government) is looking to sign under the pretense of protecting intellectual property to  &amp;ldquo;encourage investments, innovation, research and development.&amp;rdquo; Read up &lt;a title="Trans-Pacific Partnership Agreement" href="http://thestar.com.my/news/story.asp?file=/2012/2/9/nation/10692529&amp;amp;sec=nation" target="_blank">this article&lt;/a> from the star to learn more.&lt;/p>
&lt;p>Like any other law regarding copyright, this one is complicated and hard to understand (at least for me). However, Techdirt recently had two brilliant articles regarding the TPP with regards to Chile. The &lt;a title="Countries In TPP Negotiations Begin To Wonder Why They Should Let The US Push Them Around" href="http://www.techdirt.com/articles/20120418/03562118539/countries-tpp-negotiations-begin-to-wonder-why-they-should-let-us-push-them-around.shtml" target="_blank">first article&lt;/a> outlines the fact that Chile (another tentative partner in the agreement) was questioning the benefits of joining the TPP, citing the high cost of complying to Intellectual Property obligations:&lt;/p></description></item><item><title>Is it legal to buy ebooks from Amazon?</title><link>https://keithrozario.com/2012/05/is-it-legal-to-buy-ebooks-from-amazon/</link><pubDate>Mon, 14 May 2012 11:46:41 +0000</pubDate><guid>https://keithrozario.com/2012/05/is-it-legal-to-buy-ebooks-from-amazon/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/rsz_1dsc022065_hu_9107c7add490193e.jpg"
 srcset="
 /uploads/rsz_1dsc022065_hu_de9b7df4792f1db9.jpg 480w,
 /uploads/rsz_1dsc022065_hu_9107c7add490193e.jpg 768w,
 /uploads/rsz_1dsc022065_hu_9047a09c694e575a.jpg 1024w,
 /uploads/rsz_1dsc022065.jpg 1632w"
 sizes="(max-width: 480px) 480px, (max-width: 768px) 768px, (max-width: 1024px) 1024px, 100vw"
 alt=""
 title="rsz_1dsc02206"
 loading="lazy"
 />&lt;/p>
&lt;p>In my previous post, I wrote about how I bought and Amazon Kindle, and how I can use gift cards to purchase ebooks from the Kindle store. So far the Kindle has been an amazing experience and I personally recommend you get yourself one. However, there is a downside, since there is &amp;rsquo;technically&amp;rsquo; no legal way to obtain ebooks for your Kindle device.&lt;/p>
&lt;p>Today I hope to explore the legality of downloading ebooks from Amazon, and how stupid copyright laws, badly behaving book publishers and a Malaysian Sales Tax  all contribute to making it impossible for you to purchase ebooks for your Kindle while still complying with any and all laws pertaining to them.&lt;/p></description></item><item><title>Malaysiakini down!</title><link>https://keithrozario.com/2012/04/malaysiakini-down/</link><pubDate>Fri, 27 Apr 2012 18:36:29 +0000</pubDate><guid>https://keithrozario.com/2012/04/malaysiakini-down/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Malaysiakini.png"
 alt=""
 title="Malaysiakini"
 loading="lazy"
 />&lt;/p>
&lt;p>&lt;em>&lt;span style="color: #888888;">*Update: Malaysiakini have confirmed the update on their facebook page, looks like you need to look for other sources of Bersih 3.0  news, this could take a while. It&amp;rsquo;s also note-worthy that 10 people &amp;rsquo;like&amp;rsquo; this on facebook, obviously over-looking the fact that nobody should &amp;rsquo;like&amp;rsquo; this.&lt;/span>&lt;/em>&lt;/p>
&lt;p>With barely 12 hours to go before Bersih 3.0 starts to swing into action, Malaysiakini servers appear to be down. I was trying to logon online to check the news only to notice that I couldn&amp;rsquo;t access the site, PINGs to the site seem to time out as well. Could this be a repeat of when Malaysiakini went offline in the run up to the Sarawak elections? Plus, I know this doesn&amp;rsquo;t affect me, because as a Google Chrome user I know &lt;a title="http://lifehacker.com/5590582/google-chrome-tells-you-when-sites-are-down-for-other-users" href="http://lifehacker.com/5590582/google-chrome-tells-you-when-sites-are-down-for-other-users" target="_blank">when other users are also experiencing problems accessing a site&lt;/a>.&lt;/p></description></item><item><title>MCMC can't solve your Unifi downtime but they're looking for Gays online</title><link>https://keithrozario.com/2012/03/mcmc-cant-solve-your-unifi-downtime-but-theyre-looking-for-gays-online/</link><pubDate>Mon, 12 Mar 2012 23:09:43 +0000</pubDate><guid>https://keithrozario.com/2012/03/mcmc-cant-solve-your-unifi-downtime-but-theyre-looking-for-gays-online/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/4019801997_2bfb5a8d7f-300x225.jpg"
 alt=""
 title="4019801997_2bfb5a8d7f"
 loading="lazy"
 />&lt;/p>
&lt;p>&lt;a title="Bernama Report" href="http://www.bernama.com.my/bernama/v6/newsgeneral.php?id=651733" target="_blank">Bernama reported&lt;/a> today that The Malaysian Communications and Multimedia Commission  (MCMC or the SKMM) together The Malaysian Islamic Development Department (Jakim) would begin &amp;ldquo;&lt;em>collaborating to monitor lesbian, gay, bisexual and transsexual (LGBT) activities in the country, particularly on the websites.&lt;/em>&amp;rdquo;&lt;/p>
&lt;p>Apart from the usual gung-ho activity of from Jakim, its Director General  Othman Mustapha said &amp;ldquo;I&lt;em>f we find that there are things that are unsuitable on the websites, information would be channeled to the committee for action to be taken,&lt;/em>&amp;rdquo;&lt;/p>
&lt;p>Now some of you may know that &lt;a title="SKMM on my Unifi Downtime" href="http://www.keithrozario.com/2012/02/skmm-on-my-unifi-downtime.html" target="_blank">I contacted the Multimedia Commission&lt;/a> some time ago about my Unifi Downtime and to investigate what compensation I could get from a 9 day down time above and beyond the pro-rated cost. In a nutshell their reply was &amp;ldquo;&lt;em>sorry can&amp;rsquo;t help you&lt;/em>&amp;rdquo;. It&amp;rsquo;s quite apparent why they couldn&amp;rsquo;t help me, they&amp;rsquo;re busy looking for Gays online.&lt;/p></description></item><item><title>SKMM on my Unifi Downtime</title><link>https://keithrozario.com/2012/02/skmm-on-my-unifi-downtime/</link><pubDate>Sat, 25 Feb 2012 10:43:28 +0000</pubDate><guid>https://keithrozario.com/2012/02/skmm-on-my-unifi-downtime/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/SKMM.jpg"
 alt=""
 title="SKMM"
 loading="lazy"
 />&lt;/p>
&lt;p>Did you know Malaysia has a Multimedia and Communication Commission that oversees the quality of service for telecommunications companies including the broadband services they provide. I also understand that they are the enforcers of the Communications and Multimedia Act 1998, with a determination on the mandatory standards for the Quality of Service (Broadband Access Service) .&lt;/p>
&lt;p>In not so many words, there are actually laws in place to ensure that your broadband provider meets a minimum standard in terms of uptime and service availability.&lt;/p>
&lt;p>However, after reading the a short snippet of the Act from the SKMM website here, I was surprised to find that while it did have a specific outline for the quality of service, it did not have an outline for the penalty imposed if the quality of service was not met.&lt;/p></description></item><item><title>Pinterest + Martin Luther King =</title><link>https://keithrozario.com/2012/02/pinterest-martin-luther-king/</link><pubDate>Thu, 23 Feb 2012 13:51:27 +0000</pubDate><guid>https://keithrozario.com/2012/02/pinterest-martin-luther-king/</guid><description>&lt;p>A couple of days back, I wrote about how copyright law was preventing a lot of us from listening the entire Martin Luther King &amp;ldquo;I have a dream&amp;rdquo; speech because it was protected by copyright, and in order to listen to it you had to pay Martin Luther Kings family royalty. Today I did some searching on pinterest, and found some rather remarkable works of art around Martin Luther King that were pinned in pinterest, these works of art would not be possible if the family had further copyrighted other aspects of MLKs life, and with newer stricter copyright laws that could very well be the case.&lt;/p>
&lt;p>Remember for a pinterest invite, just leave a comment on the post and I&amp;rsquo;ll send one to you as soon as I have the time. For now, enjoy!&lt;/p>
&lt;p>&lt;img src="http://media-cdn.pinterest.com/upload/258675572316612976_rQuoViJj_c.jpg" alt="" />&lt;/p>
&lt;div style="float: left; padding-top: 0px; padding-bottom: 0px;">
&lt;p style="font-size: 10px; color: #76838b;">Source: &lt;a style="text-decoration: underline; font-size: 10px; color: #76838b;" href="http://www.google.it/imgres?q=martin+luther+king&amp;amp;um=1&amp;amp;hl=it&amp;amp;sa=N&amp;amp;biw=1024&amp;amp;bih=485&amp;amp;tbm=isch&amp;amp;tbnid=5rpYvYfdsjqK4M:&amp;amp;imgrefurl=http://www.sentieriselvaggi.it/5/32366/Steven_Spielberg_e_Martin_Luther_King_We_Have_a_Dream.htm&amp;amp;docid=M1VCEKxni-lXyM&amp;amp;w=600&amp;amp;h=401&amp;amp;ei=KcB3ToHYJYnAtAbu1ayBCw&amp;amp;zoom=1&amp;amp;iact=rc&amp;amp;dur=808&amp;amp;page=3&amp;amp;tbnh=144&amp;amp;tbnw=169&amp;amp;start=21&amp;amp;ndsp=10&amp;amp;ved=1t:429,r:4,s:21&amp;amp;tx=84&amp;amp;ty=44">google.it&lt;/a> via &lt;a style="text-decoration: underline; font-size: 10px; color: #76838b;" href="http://pinterest.com/Effeluna/" target="_blank">Francesca Rufina&lt;/a> on &lt;a style="text-decoration: underline; color: #76838b;" href="http://pinterest.com" target="_blank">Pinterest&lt;/a>&lt;/p>
&lt;/div>
&lt;p>From pinterest User &lt;a title="Effeluna" href="http://pinterest.com/Effeluna/" target="_blank">Effeluna &lt;/p></description></item><item><title>More reasons Copyright sucks</title><link>https://keithrozario.com/2012/02/more-reasons-copyright-sucks/</link><pubDate>Wed, 22 Feb 2012 09:07:13 +0000</pubDate><guid>https://keithrozario.com/2012/02/more-reasons-copyright-sucks/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/3762597413_d820da2d19.jpg"
 alt=""
 title="3762597413_d820da2d19"
 loading="lazy"
 />&lt;/p>
&lt;p>Now for an artist to copyright a song or a piece of work, for that artist to then legally make a living of is fine.&lt;/p>
&lt;p>It&amp;rsquo;s not fine if you need to pay royalties to use Martin Luther King Jr&amp;rsquo;s &amp;ldquo;I have a dream speech&amp;rdquo;, &lt;a title="Why I have a dream is still copyrighted" href="http://motherboard.vice.com/2012/1/16/copyright-king-why-the-i-have-a-dream-speech-still-isn-t-free" target="_blank">because his family own the copyright to a speech that is a part of US history&lt;/a>. They later sold those rights to EMI, and now a recording company owns the rights to the speech that encapsulates the civil rights movement, and that same recording company is patrolling the online alleys to &lt;a title="EMI copyright" href="http://www.thisislondon.co.uk/standard/article-23663617-emi-copyright-deal-to-protect-martin-luther-king-speeches.do" target="_blank">catch the copyright infringers&lt;/a>.&lt;/p></description></item><item><title>Copyright laws get dumber: Trans-Pacific Partnership (TPP) agreement</title><link>https://keithrozario.com/2012/02/copyright-law-malaysia-tpp/</link><pubDate>Sat, 18 Feb 2012 21:22:28 +0000</pubDate><guid>https://keithrozario.com/2012/02/copyright-law-malaysia-tpp/</guid><description>&lt;p>&lt;img src="http://farm4.staticflickr.com/3129/2583620793_a41371bec1.jpg" alt="" title="Copyright is for losers" />&lt;/p>
&lt;p>A recent article from the Star noted that Malaysia was about to sign a new Trans-Pacific Partnership agreement that would make subject local copyright laws to those imposed by the US. Now according to &lt;a title="Strict IP Policy mulled" href="http://thestar.com.my/news/story.asp?file=/2012/2/9/nation/10692529&amp;amp;sec=nation" target="_blank">the article from the star &lt;/a>the purpose of us looking into a stricter Intellectual property law was to &amp;ldquo;encourage investments, innovation, research and development&amp;rdquo;. That is a false premise.&lt;/p>
&lt;p>The laws by themselves are useless if enforcement isn&amp;rsquo;t there, and if you can&amp;rsquo;t even enforce the current IP law, then why bother changing the laws if there is no plan to up the enforcement? Also this premise that we will encourage research and development with a strict law is both flawed and without basis. There is no empirical evidence to suggest that innovation thrives when Intellectual property is strictly enforced, in fact innovation is effectively crippled when you&amp;rsquo;re afraid that anything you produce might infringe on someone else&amp;rsquo;s copyright. It would lead to a point where corporations would spend more checking on copyright infringement then they would actually innovating and producing.&lt;/p></description></item><item><title>Unauthorized withdrawals hit DBS and POSB customers, withdrawals done in Malaysia</title><link>https://keithrozario.com/2012/01/unauthorized-withdrawals-dbs-posb-malaysia/</link><pubDate>Fri, 27 Jan 2012 18:47:12 +0000</pubDate><guid>https://keithrozario.com/2012/01/unauthorized-withdrawals-dbs-posb-malaysia/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/4205206962_6c0004a828-300x225.jpg"
 alt=""
 title="4205206962_6c0004a828"
 loading="lazy"
 />&lt;/p>
&lt;p>According to a &lt;a title="Unauthorized Withdrawals" href="http://www.channelnewsasia.com/stories/singaporelocalnews/view/1174972/1/.html" target="_blank">report from Channel News Asia&lt;/a>, a total of nearly 200 DBS and POSB customers in Singapore have been hit by unauthorized withdrawals averaging S$1000 each. The withdrawals were done in Malaysia &amp;ldquo;while the ATM cards were with them safely in Singapore&amp;rdquo;. Which begs the question what does &amp;lsquo;safely in Singapore&amp;rsquo; mean?&lt;/p>
&lt;p>Channel News Asia goes on to report that withdrawals were made in Kuala Lumpur (not neighboring Johor Bahru) and done approximately the same time as &amp;lsquo;valid&amp;rsquo; withdrawals. &lt;a title="ZDNet reports POSB fraud" href="http://www.zdnetasia.com/ncr-debuts-self-healing-atms-in-sea-62040853.htm" target="_blank">ZDNet has reported&lt;/a> DBS is working together with its IT vendor, NCR to understand the issue and investigate further. It&amp;rsquo;s also suspended all suspected cards and are contacting customers to give them what it says would be a full refund. NCR also happen to make almost 90% of all ATMs in Malaysia, and according to &lt;a title="Yahoo News" href="http://sg.news.yahoo.com/photos/dbs-press-conference-photo-1325850911.html" target="_blank">Yahoo! news&lt;/a>, this was &amp;ldquo;&lt;em>a security breach to its anti-skimming devices installed on ATM machines&lt;/em>&amp;rdquo;, so I&amp;rsquo;m just wondering why this wasn&amp;rsquo;t done to Malaysian accounts of local banks? &lt;/p></description></item><item><title>Censorship in Malaysia: SOPA told through Malaysian Eyes</title><link>https://keithrozario.com/2012/01/censorship-in-malaysia-sopa/</link><pubDate>Tue, 24 Jan 2012 10:15:53 +0000</pubDate><guid>https://keithrozario.com/2012/01/censorship-in-malaysia-sopa/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/6728069627_2da38e152d-300x300.jpg"
 alt=""
 title="6728069627_2da38e152d"
 loading="lazy"
 />&lt;/p>
&lt;p>There&amp;rsquo;s been a recent surge of Anti-SOPA and Anti-PIPA sentiment over in the Unites States, Wikipedia blacked out it&amp;rsquo;s entire webpage and Google, Twitter and Facebook all joined in the fray. I&amp;rsquo;ve even received multiple emails from the Mozilla foundation on how to combat SOPA and recent a congratulatory cum Thank you note from Mozilla for joining the fight. Make no mistake, SOPA isn&amp;rsquo;t dead, it&amp;rsquo;s just been shelved for the time being, get ready people round2 starts soon.&lt;/p>
&lt;p>In Malaysia though there has been little reporting on the issue, while some local blogs did mention SOPA, and a few newspapers briefly covered it, not much has been discussed on either of the laws. It&amp;rsquo;s typical of the Malaysian media to report less on matters that actually matter, and more on frivolous material like &lt;a title="Unity is Priceless" href="http://www.nst.com.my/top-news/unity-is-priceless-pm-1.36262" target="_blank">this article from the New Straits Times&lt;/a> that read &amp;ldquo;Unity is Priceless: PM&amp;rdquo;. Really? Cause the rest of us thought Unity was worth around about Rm2.75 . I mean apart from pointing out the obvious, the article has absolutely no content, apart from the big picture with the &amp;ldquo;We Love the PM&amp;rdquo; nonsense.&lt;/p>
&lt;p>That being said, there were a few articles on SOPA and PIPA, however those articles for censored to a certain degree, and here&amp;rsquo;s how.&lt;/p></description></item><item><title>SOPA: What Trey Ratcliff and Uri Geller have to say</title><link>https://keithrozario.com/2011/12/sopa-stop-online-piracy-act-trey-ratcliff/</link><pubDate>Wed, 28 Dec 2011 10:24:45 +0000</pubDate><guid>https://keithrozario.com/2011/12/sopa-stop-online-piracy-act-trey-ratcliff/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/The-Bell-Towers-M.jpg"
 alt=""
 title="The-Bell-Towers-M"
 loading="lazy"
 />&lt;/p>
&lt;p>Trey Ratcliff is a professional photographer who photographs ooze with talent, he also blogs at &lt;a title="http://www.stuckincustoms.com" href="http://www.stuckincustoms.com" target="_blank">stuckincustoms.com&lt;/a>. It&amp;rsquo;s an amazing blog, but what&amp;rsquo;s even more amazing is that Trey chooses to release his works of art under the creative commons non-commercial license, which has it&amp;rsquo;s restrictions but a&lt;span style="text-decoration: underline;">llows free usage of the photos as long as its used for non-commercial purposes&lt;/span>. Now that&amp;rsquo;s like a programmer offering free programs, or a writer offering free-content. It&amp;rsquo;s not unheard off, but it&amp;rsquo;s rare. However, in todays economy more and more professionals are taking this step towards similar licensing of their works.&lt;/p>
&lt;p>Treys photos aren&amp;rsquo;t customized for a specific purpose, he post them on his blog and if you like them you can use them. It&amp;rsquo;s not customized in the sense that he didn&amp;rsquo;t take the photograph of you or for you. Similarly a lot of programmers are offering free programs they wrote as a challenge or a dare and shared not just the program, but the source code that any other programmer can build further upon. They didn&amp;rsquo;t build it for a specific purpose, just something general that they thought would be best shared rather than sold. So in that sense, Trey can use photos of a holiday or a scenery and offer that for free.&lt;/p>
&lt;p>I mention Trey not because I love his work (although it IS amazing), and not because Trey is a top level photographer that he shares his work online. I mention Trey because he has synthesized in &lt;a title="Trey Ratcliff on Online Piracy" href="https://plus.google.com/u/0/105237212888595777019/posts/Da1wjfvrLxq" target="_blank">short post on Google+ &lt;/a>what he thinks of Online Piracy, and it really has struck a chord with people, especially since Trey is on a different end of the piracy war and he&amp;rsquo;s saying that pirates aren&amp;rsquo;t bad people. WHAT?&lt;/p></description></item><item><title>Computing Professionals Bill: Final Verdict</title><link>https://keithrozario.com/2011/12/computing-professionals-bill-final-verdict/</link><pubDate>Wed, 21 Dec 2011 22:46:02 +0000</pubDate><guid>https://keithrozario.com/2011/12/computing-professionals-bill-final-verdict/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/SimonSinek_read-148x300.png"
 alt=""
 title="SimonSinek_read"
 loading="lazy"
 />&lt;/p>
&lt;p>In what I hope is my last post about this ridiculous bill, I hope to ask and answer an important question I&amp;rsquo;m surprised no one has asked yet&amp;hellip;&lt;/p>
&lt;h3>Why do we need such a bill?&lt;/h3>
In essence do we need to raise standards, or provide assurance to employers regarding hired professionals. I believe the answer is NO. It all stems from a brilliant book I read "start with Why" by Simon Sinek, and you catch his amazing TedTalk &lt;a title="Simon Sinek" href="http://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action.html" target="_blank">here&lt;/a>. He goes on to say, that if you mess up the WHY of any action, no one will follow you, because &lt;em>"People don't buy what you do, they buy Why you do it"&lt;/em>
&lt;p>Now I understand that we&amp;rsquo;d always need to raise standards, and provide assurances, but in the greater scheme of things is it really that necessary to do it now, or can we expend our energies and effort elsewhere for the IT community to get the value from our actions. This should be at the core of the discussions, this is the &lt;strong>WHY&lt;/strong> of the bill, if I don&amp;rsquo;t believe in the &lt;strong>WHY&lt;/strong> of the bill, then there&amp;rsquo;s no need talk about the who, what,where and how.&lt;/p>
&lt;p>If the objective of the bill isn&amp;rsquo;t agreed upon, then it doesn&amp;rsquo;t matter how we achieve the objective. I feel a lot of IT professionals have bypassed this and zoomed down immediately to the details, pointing out flaws in the bill and a lack of clarity and specifics, however I&amp;rsquo;m not even sold at the high level of the bill let alone the specifics, and I struggle to understand why the bill is around in the first place, let alone how it will achieve it&amp;rsquo;s WHY.&lt;/p></description></item><item><title>Computing Professionals Bill: 10 reasons to kill the bill</title><link>https://keithrozario.com/2011/12/computing-professional-bill-kill/</link><pubDate>Thu, 15 Dec 2011 11:53:39 +0000</pubDate><guid>https://keithrozario.com/2011/12/computing-professional-bill-kill/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/3844909605_99e776724d-300x173.jpg"
 alt=""
 title="3844909605_99e776724d"
 loading="lazy"
 />&lt;/p>
&lt;p>So there&amp;rsquo;s a lot being said about the new Computing professional bill, even on this blog. For now though, if you&amp;rsquo;re really interested in finding out about the legal implications of the law, check out this amazing article &lt;a title="Computing Professionals Bill: Bar Council" href="http://www.keithrozario.com/2011/12/computing-professionals-bill.html" target="_blank">here from the Bar Council Website written by &amp;lsquo;The Awesome&amp;rsquo; LoyarBurok&lt;/a>. Or if you&amp;rsquo;re in the mood for some petition, try signing this petition &lt;a title="Petition" href="http://www.change.org/petitions/mosti-stop-computing-professionals-bill-2011-cpb2011" target="_blank">here&lt;/a>, they&amp;rsquo;re aiming for 2000 signatures, so far they&amp;rsquo;re about half way through.&lt;/p>
&lt;p>You might also want to digest a point by Tony Pua (opposition MP from PJ Utara):&lt;/p></description></item><item><title>Computing Professionals Bill: This is IT</title><link>https://keithrozario.com/2011/12/computing-professionals-bill/</link><pubDate>Tue, 13 Dec 2011 23:22:39 +0000</pubDate><guid>https://keithrozario.com/2011/12/computing-professionals-bill/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/Presentation_Overview-300x199.jpg"
 alt=""
 title="Presentation_Overview"
 loading="lazy"
 />&lt;/p>
&lt;p>Some laws you have to fight wars to keep&amp;hellip;.others you have to fight wars to be repealed. This is one of those laws you have to fight to prevent from ever being made a law&amp;hellip;&lt;/p>
&lt;p>On April 12th , 1861 Confederate forces attacked Union Military installation named Fort Sumter in South Carolina. The attacked marked the beginning of the American Civil War, and the United States of America would never be the same. The war was about more than just a secession from a Union, it was about preserving the right that every man was created equal and that no man or woman would ever be &amp;lsquo;owned&amp;rsquo; again. In just over 140 years later, the United States of America elected their first Black president.If ever there was a war worth fighting for, it was the American Civil War. The Abolition of slavery was a law worth fighting for, it was worth preserving, even till death.&lt;/p></description></item><item><title>Computing Professionals Bill 2011: Not again!!</title><link>https://keithrozario.com/2011/12/computing-professionals-bill-2011/</link><pubDate>Sat, 10 Dec 2011 01:13:55 +0000</pubDate><guid>https://keithrozario.com/2011/12/computing-professionals-bill-2011/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/4199675334_66c3e3d61d_z-300x200.jpg"
 alt=""
 title="Head in Hands"
 loading="lazy"
 />&lt;/p>
&lt;p>The Malaysian government is a crazy bunch, just today I saw two bits of news that left me squirming with disgust. First a short piece on&lt;a title="Malaysian Insider" href="http://www.themalaysianinsider.com/litee/malaysia/article/tis-the-season-to-be-jolly-with-a-police-permit/" target="_blank"> Christmas Carollers requiring Police Permits to go Carolling&lt;/a> (not just permits but full details of every activitiy) and then later today there is a new &lt;a title="Computing Professional Bill" href="http://thestar.com.my/news/story.asp?file=/2011/12/9/nation/20111209203020&amp;amp;sec=nation" target="_blank">Computing Professionals Bill 2011&lt;/a>.&lt;/p>
&lt;p>Why would a government want to regulate the computing Industry? It&amp;rsquo;s not like we&amp;rsquo;re bankers or something? Why is there a need to regulate an industry that first off is too broad to define under an umbrella called computing, and secondly isn&amp;rsquo;t exactly a threat to national security.&lt;/p>
&lt;p>Lowyat has done a great deal to summarize the bill and post it up for reading &lt;a title="Lowyat" href="http://www.lowyat.net/v2/index.php?option=com_content&amp;amp;task=view&amp;amp;id=5800&amp;amp;Itemid=2" target="_blank">here&lt;/a>..&lt;/p>
&lt;p>But where we should be really intrigued is a part of the bill (according to Lowyat) that says:&lt;/p></description></item><item><title>What is SOPA?</title><link>https://keithrozario.com/2011/12/what-is-sopa/</link><pubDate>Sun, 04 Dec 2011 22:14:54 +0000</pubDate><guid>https://keithrozario.com/2011/12/what-is-sopa/</guid><description>&lt;p>&lt;img
 src="https://keithrozario.com/uploads/what-is-sopa-273x300.png"
 alt=""
 title="what-is-sopa"
 loading="lazy"
 />&lt;/p>
&lt;p>A couple of days ago, I stumbled onto a website by mozilla claiming &amp;ldquo;The internet we know and love is at risk&amp;rdquo;. Now I&amp;rsquo;m not one to panic but this was some serious stuff here, Mozilla is a company I admire and respect, so if it tells me something serious is going down, I stand up and pay attention.&lt;/p>
&lt;p>Further reading brought on a couple of key points, namely that Mozilla was talking about the new Stop Online Piracy Act (SOPA) that was designed to stop online piracy, but what it would effectively do was make give copyright holders essentially too much control over their copyrighted material. Now copyright holders undoubtedly have legal rights to their work, but giving them the right to shut down YouTube because someone sang their song and posted a video takes that a bit too far.&lt;/p>
&lt;p>Mozilla also claim:&lt;/p>
&lt;blockquote>The fact is that this legislation as written won't stop piracy. But it would pose a serious threat to social media and user generated content sites (like YouTube) across the internet. It could also undermine some of the core technical systems underlying the internet, creating new cybersecurity risks.
&lt;p>As a non-profit committed to keeping the web open and accessible to all, &lt;strong>Mozilla wants to ensure that this legislation does not jeopardize the foundational structure of the Internet.&lt;/strong>&lt;/blockquote>
Unfortunately, I&amp;rsquo;m not a US-Citizen so I can&amp;rsquo;t join in the calling to US members of Congress, but you probably can. Over here in Malaysia we&amp;rsquo;ve got our &lt;a title="Peaceful Assembly Bill" href="http://globalvoicesonline.org/2011/11/29/malaysia-protesting-the-peaceful-assembly-bill/" target="_blank">own laws we need fighting&lt;/a>. Visit &lt;a title="SOPA" href="https://donate.mozilla.org/page/s/SOPA?source=sopa_page" target="_blank">here&lt;/a> if you wish to join Mozilla and their cause against SOPA.&lt;/p></description></item></channel></rss>