Staggering Stories Podcast
on June 29th, 2008
Podcast: Download (51.2MB)
Show summary: Andy Simpkins, Adam J Purcell, Fake Keith and Tony Gallichan talk about the Doctor Who Season 4 episodes Midnight and Turn Left, Fight Club: Han Solo vs. Mal Reynolds, and a variety of other stuff, specifically:
- 00.00 – Intro and theme tune.
- 00.36 — Greetings, yes?
- 01.16 — Where Is Keith?
- 03.29 – News:
- 03.51 — Harold Bishop has left the building.
- 05:48 — A spate of accidental accidents.
- 08.38 – Fight Club: Han Solo vs. Malcolm Reynolds.
- 18.37 – Doctor Who:
- 19.09 — Midnight.
- 38:48 — Turn Left.
- 41:19 — Tin Dog Podcast Promo!
- 67:15 — Conjecture on the final two of Season Four!
- 73.42 – Letters and listener feedback.* Hit us yourself at show@StaggeringStories.net
- 76.40 – Goodbyeeeeeeeee!!
- 76.51 — End theme, disclaimer, copyright, etc.
on June 28th, 2008
Just so folks know, I am currently unable to edit due to circumstances beyond my control. Podcast 23 will be edited by Adam – and Id just like to thank him for coming to the rescue at such short notice.
Staggering Stories Podcast
on June 15th, 2008
Podcast: Download (44.6MB)
Show summary: Andy Simpkins, Adam J Purcell, Fake Keith and Tony Gallichan talk about the Doctor Who Season 4 episodes Silence In The Library and Forest of the Dead, Steven Moffat taking over Doctor Who, Fight Club: Gene Hunt vs. Jack Regan, and a variety of other stuff, specifically:
- 00.00 – Intro and theme tune.
- 00.52 — Greetings, yes?
- 01.20 – News:
- 01.20 — Tony’s Conventional Insult.
- 02.44 — Where Is Keith?
- 03.56 — Fake Keith’s Fake News.
- 04.34 – Fight Club: Gene Hunt vs. Jack Regan!
- 13.23 – Doctor Who:
- 13.23 — Silence In The Library and Forest of the Dead.
- 51.56 — Steven Moffat taking over from Russell T Davies.
- 59.21 – Letters and listener feedback.* Hit us yourself at show@StaggeringStories.net
- 60.03 – Viva El Presidente.
- 62.16 – The Taste Test: Stewie’s Domination Serum
- 65.29 – Goodbyeeeeeeeee!!
- 65.45 — End theme, disclaimer, copyright, etc.
Adam J Purcell
on June 14th, 2008
The whole Phorm debate has died down a little recently. It’s still coming coming, though, as are similar systems throughout the world. A while back I promised I’d note down some tools that I use to help protect my privacy online so you might do the same. So, here is my current setup:
- The best place to start with online privacy and safety is, I find, to use the Firefox Web Browser. The list of advantages over the default (on Windows) Internet Explorer browser are far too numerous for me to list here. The main point is that Firefox is just more secure. It also has a very good Extensions framework that we can use to plug in any manner of Add-Ons, such as:
- The all too numerous advert and web user tracking firms all use web browser cookies to remember who you are. A cookie is basically a tiny little text file that is saved on your computer by a website. The web is non-stateful, in other words every page request you make is unique and unassociated with any other. Think of the web as someone with no short term memory. You are on a walrus cleaning kit shop web site, you browse to the product that is correct for your particular walrus (it might have especially leathery skin). You click on ‘buy’. This causes the page to refresh, i.e. the web server serves another page to your browser. The web server knows what you’ve just clicked, as it is directly responding to it, so it can show you your new item in your basket. Click ‘check out’ and, whoops, your cleaning kit has gone! Why? Because it only knows about your last action, namely clicking ‘check out’. It has forgotten about the ‘buy’ you clicked the time before – it has no memory, it can only respond to your current action. That’s where cookies come in. The web server might assign you a unique ID (often a fantastically long random number). The web server can then request that cookie from your browser every time a page needs to be built. The server can then store, usually in a database on its end, a history of your actions. When it sees your cookie it knows who you are, can look you up in its database and can thereby remember what you’ve done already. Incredibly useful and even essential for many sites.
- Adblock or Adblock Plus
- This is a big leap from Firefox and add-ons, even I rarely use it. TOR stands for The Onion Router. All of the above ideas still pass pages and other data through your ISP’s systems in a fashion they can intercept. Your ISP still knows where you are going online and, potentially, what you are reading/watching and buying. I say potentially as some sites, particularly shops during the check-out phase, do encrypt the traffic so no one else can read it. They can still see where you are, however. The only way to avoid your ISP being able to snoop on your privacy is to encrypt all of the traffic on your computer before it goes out to your ISP, including the name/URL of your destinations. But how can your ISP send your requests onto the correct site when they don’t know where you want to connect? That’s where an onion routing network comes in. Think of an onion, any onion. In the centre is your data – the web page you are trying to read or data you are sending back to the web server. Around that are multiple layers of encryption. A series of machines, as part of the TOR network, are out on the Internet waiting for your traffic. You have a layer of encryption for each machine. Your computer sends the onion to the first computer in it’s list. That computer, and only that computer, can decrypt the first layer. Inside it sees another layer and an instruction of the next TOR computer to send the diminished onion on to. The next TOR computer does the same, passing on to the next computer and so on. Finally the onion will have only one layer left, it strips it off by decrypting it. There it finds the now unencrypted centre of the onion which may be, for example, a request for a web page. The machine grabs that page on your behalf (the web site not knowing that the TOR machine requesting the page isn’t where it will ultimately go). Then it creates a new onion that is sent on a reverse path back to you.
- The upshot of all this is that the ISP only sees encrypted traffic into the TOR network and has no idea the route through the TOR network it might take and especially not the final destination. Likewise the final destination doesn’t know the true source of the traffic, only the IP address of the exit point of the TOR network you are currently using (it is a random path, including entry and exit point, each session). Clever stuff. Not perfectly secure and I haven’t explained it particularly well or accurately but it will certainly stop your ISP and their Phorm buddies invading your online privacy. It is also often a little slow, for obvious reasons. That’s why I rarely use it but then Phorm isn’t active on Virgin Media yet (so far as we know…) It also requires a special proxy to be installed on your computer (or local network) and configuration of your web browser(s) to use it. It may well be worth all the trouble in the future, though…
That’s all the tools I currently use to stop strangers snooping on me (or, at least, make it a lot more difficult). Take this as a starting position, a place to begin your understanding. Everyone should have an understanding of the privacy tools on offer. I once heard someone equate your ISP to your doctor. Both know a lot of private details about you. Wouldn’t you be horrified to hear your doctor is selling those details to third parties? Potentially your ISP knows even more sensitive information about you. They should treat ‘patient’ confidentially with even more care. Instead they really are looking to betray those confidences for money. Don’t let them.