1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768 |
- <?php
- /**
- * <https://y.st./>
- * Copyright © 2015 Alex Yst <mailto:copyright@y.st>
- *
- * This program is free software: you can redistribute it and/or modify
- * it under the terms of the GNU General Public License as published by
- * the Free Software Foundation, either version 3 of the License, or
- * (at your option) any later version.
- *
- * This program is distributed in the hope that it will be useful,
- * but WITHOUT ANY WARRANTY; without even the implied warranty of
- * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- * GNU General Public License for more details.
- *
- * You should have received a copy of the GNU General Public License
- * along with this program. If not, see <https://www.gnu.org./licenses/>.
- **/
- $xhtml = array(
- 'title' => 'A mistake made and a plan to sign Web pages',
- 'body' => <<<END
- </p>
- It seems it was Jenny, not misted__, that <a href="/en/weblog/2015/03-March/17.xhtml">showed me the $a[PHP] functions on Sunday</a>.
- I have apologized, as well as added acknowledgement of the mistake to the correct weblog entry.
- </p>
- </p>
- I got distracted yesterday by research on canaries and forgot to mention that my <code>y.st.</code> hostmask was approved on <a href="ircs://irc.volatile.club:6697/">Volatile</a>, so when I am logged in, I look like I'm coming from my domain despite the fact that I'm actually coming from the $a[Tor] network.
- </p>
- </p>
- I decided to maybe add an automatic canary updater to my website's update script, though I don't know how that will be compatible with the decision to translate the update script to $a[PHP].
- Once I find the time to set this up, I'll know more.
- To insure that failing to update the canary is entirely passive (as to avoid breaking the law), I'll add a <code>--canary</code> or <code>--chirp</code> command line flag, and if not included when running the script, it simply won't update the canary.
- In order for the canary to not disappear from the site when not updated, it will likely need to have a separate compile directory that compiles it into the static files directory before doing anything else.
- Because automating the canary update process will require finding a way to $a[PGP] sign from within $a[PHP], I might as well sign all my pages at that time.
- It seems that there is no way to include the <code>-----BEGIN PGP SIGNED MESSAGE-----</code>, <code>-----BEGIN PGP SIGNATURE-----</code>, or <code>-----END PGP SIGNATURE-----</code> lines in $a[XHTML] comments and still have the page validate.
- This means that parts of the page will have to be outside the signed part of the page, which is unfortunate.
- I will likely sign only the content of <code><body/></code>.
- </p>
- </p>
- According to the <a href="https://canarywatch.org/faq.html">Canary Watch frequently-asked questions page</a>, the government allows an entity to disclose approved ranges of gag orders they have been served over six-month periods.
- These ranges are all ranges of one thousand and start at zero, for example, 0 - 999.
- You can guarantee that if I start posting a range of the number of gag orders I have received, that I have received at least one.
- This is because as long as I am not bound by one of these gag orders, I am free to ignore the ranges and admit that I have received exactly zero of them.
- The power to issue these gag orders has been abused by the government for a while now, and <a href="https://www.eff.org/issues/national-security-letters">the $a[EFF] is trying to raise awareness of it</a>.
- </p>
- </p>
- It seems <a href="https://gnso.icann.org/mailing-lists/archives/whois-tf2-report-comments/pdf00001.pdf">the $a[EFF] is concerned about the privacy implications of whois records in $a[DNS]</a>.
- I'm in total agreement, domain names should be allowed to be registered anonymously without need of a proxy (such as a whois privacy service).
- </p>
- </p>
- It has been brought to my attention that Iceweasel blocks Web browsing on port 22 as well as other ports.
- I forget who showed me this, as I didn't write this entry until a couple days after I should have.
- I think it was mistedwind, but that's not important.
- I'm not sure what the goal in doing this way, but supposedly, it's somehow for security.
- </p>
- </p>
- My last comment of the day is that I need to remember to stand up for everyone's rights, not just my own.
- I made a comment online about how I would be fine only being able to receive calls over $a[SIP] at my home server, as I never make any calls myself.
- Mistedwind reminded me that some people want to place calls from servers at their home addresses, and they have just as much right to place calls from home servers as I do to receive them from a home server.
- This was selfish of me, and I need to be more mindful of others in the future.
- </p>
- </p>
- My <a href="/a/canary.txt">canary</a> sings freely today, signafying that I am still not under a gag order.
- </p>
- END
- );
|