This is an old revision of this page, as edited by Tothwolf (talk | contribs) at 07:53, 4 June 2016 (→Mass surveillance and the crypto wars: Squeaky Dolphin). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.
Revision as of 07:53, 4 June 2016 by Tothwolf (talk | contribs) (→Mass surveillance and the crypto wars: Squeaky Dolphin)(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)Tothwolf is busy making fat stacks and may not respond swiftly to queries. |
DISILLUSIONED
When even ArbCom fails to stop disruptive behaviour, the project is abjectly failing and it is time for me to move on and spend my time on another project. It is sad that the name of the ArbCom case was chosen as it was as that created an inherit bias and may have been a significant factor in it not being properly addressed. I for one hope that I'm completely wrong about Misplaced Pages failing and things somehow turn around, but that may just turn out to be wishful thinking. --Tothwolf (talk) 22:44, 5 January 2010 (UTC)
- Updates as of August 2010-2011
Ravenswing was kind enough to point out the above link didn't give the full picture, so those interested should see these discussions for the bigger picture:
- Wikihounding and disruptive editing? (See also: Dueling pianos)
- Request to amend prior case: Tothwolf (C&C warning for parts of this discussion which turned into a WP:BOOMERANG)
- Down the Rabbit Hole (Material linked to during the above two discussions)
- Harassment of Tothwolf by Theserialcomma
- Blocked: personal attacks, baiting and hounding
- Blocked: loss of talkpage access
- Special:Contributions/Theserialcomma
- Misplaced Pages:Sockpuppet investigations/Theserialcomma/Archive
- On the subject of COI
- Personal experience with an editor gaming AE (Statement made during the AESH case, See also VPP discussion)
- What about the issue of "Block is AE block because I say so" (Additional comments made during the AESH case)
- One second blocks
- Case naming (Lengthy and contains many additional links)
- Thoughts on bullying, AfD, and the decline in contributors (February 2012)
- Partial summary of my bullying and cyberstalking experience (February 2012)
In a reply I made in the Dueling pianos discussion I also commented " If their behaviours are not addressed, even if I were to simply "disappear" entirely from Misplaced Pages, the behaviours that have been documented by both myself and others (both past and present) are going to continue (as they have even during this case) and will continue to be disruptive towards the goal of building the encyclopedia. " which was later documented in the above linked Wikihounding and disruptive editing? AN/I and Request to amend prior case: Tothwolf request made by one of the involved parties.
Much more information is available off-wiki, and those interested may contact me directly. (This is especially true in the case of the long term sockpuppetry from Theserialcomma, for which a large amount of info can also be found in the functionaries-en mailing list archives.) --Tothwolf (talk) 09:17, 13 June 2011 (UTC)
“ | Online hostility targeting adults is vastly underreported. The reasons victims fail to come forward include the belief that online hostility is an unavoidable and even acceptable mode of behavior; the pervasive notion that hostile online speech is a tolerable form of free expression; the perceived social stigma of speaking out against attacks; and the absence of readily available support infrastructure to assist victims. The problem of online hostility, in short, shows no sign of abating on its own. Establishing cybercivility will take a concerted effort. We can start by taking the following steps: First, and most importantly, we need to create an online culture in which every person can participate in an open and rational exchange of ideas and information without fear of being the target of unwarranted abuse, harassment or lies. Everyone who is online should have a sense of accountability and responsibility. Second, individuals appalled at the degeneration of online civility need to speak out, to show that this type of behavior will no longer be tolerated. Targets of online hostility should also consider coming forward to show that attacks can have serious consequences. |
” |
— Jimmy Wales, Keep a Civil Cybertongue |
1. Wales, Jimmy (December 29, 2009). "Keep a Civil Cybertongue". The Wall Street Journal. Retrieved January 13, 2010. {{cite web}}
: Unknown parameter |coauthors=
ignored (|author=
suggested) (help)
Mass surveillance and the crypto wars
- The Gentleperson's Guide To Forum Spies (July 2012)
- Related: Joint Threat Research Intelligence Group (JTRIG), Squeaky Dolphin
- Revealed: how US and UK spy agencies defeat internet privacy and security (September 6, 2013)
- N.S.A. Able to Foil Basic Safeguards of Privacy on Web (September 5, 2013)
- The NSA’s Secret Campaign to Crack, Undermine Internet Security (September 5, 2013)
- Related: BULLRUN, Turbulence, Dual_EC_DRBG
- Snowden docs reveal British spies snooped on YouTube and Facebook (January 27, 2014)
- Related: Squeaky Dolphin
- The Latest Snowden Revelation Is Dangerous for Anonymous — And for All of Us (February 4, 2014)
- Snowden Docs Show UK Spies Attacked Anonymous, Hackers (February 5, 2014)
- Related: Joint Threat Research Intelligence Group (JTRIG), Rolling Thunder, Internet Relay Chat
- How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations (February 24, 2014)
- "The 4 D's: Deny / Disrupt / Degrade / Deceive"
- Related: Joint Threat Research Intelligence Group (JTRIG)
- Hacking Online Polls and Other Ways British Spies Seek to Control the Internet (July 14, 2014)
- Related: Joint Threat Research Intelligence Group (JTRIG)
- Farrell, Stephen; Tschofenig, Hannes (2014). Pervasive Monitoring Is an Attack. IETF. doi:10.17487/RFC7258. BCP 188. RFC 7258.
{{citation}}
: Unknown parameter|month=
ignored (help) - From Radio to Porn, British Spies Track Web Users' Online Identities (September 25, 2015)
- Related: Karma Police
- Crypt Discovery Joint Collaboration Activity 20 January 2011 (pub. September 25, 2015)
- "Our Internet Exploitation capability is built upon our ability to effectively conduct target development and target discovery from IP data. One target discovery strategy is to spot patterns of Internet activity (communications, web browsing, web searching, etc) from which analysts infer suspicious behaviour or intent. "
"The spread of encryption threatens our ability to do effective target discovery/development because pertinent metadata events will be locked within the encrypted channels and difficult, if not impossible, to prise out."
" as well as devising mitigations that will (hopefully) allow our Internet Exploitation strategy to prevail."
"4. Research new methods for maintaining an effective TD tradecraft and mitigating the threat of encrypted http traffic."
- "Our Internet Exploitation capability is built upon our ability to effectively conduct target development and target discovery from IP data. One target discovery strategy is to spot patterns of Internet activity (communications, web browsing, web searching, etc) from which analysts infer suspicious behaviour or intent. "
- Court documents reveal oversight body struggling to control GCHQ domestic hacking (December 1, 2015)
- REVEALED: Privacy International Releases Trove of Documents That Proves Staggering Reach of Surveillance Agencies (April 20, 2016)
This is a Misplaced Pages user talk page. This is not an encyclopedia article or the talk page for an encyclopedia article. If you find this page on any site other than Misplaced Pages, you are viewing a mirror site. Be aware that the page may be outdated and that the user whom this page is about may have no personal affiliation with any site other than Misplaced Pages. The original talk page is located at https://en.wikipedia.org/wiki/User_talk:Tothwolf. |
Welcome to my talk page!
- Please use the Reply button to reply to a message, or add topic (+) to start a new section.
- If I have left a message on your talk page, please DO NOT post a reply here, instead, reply there.
- Mention me using the "Mention a user" button in the Reply box or type out {{ping|Tothwolf}}.
- I will have your talk page on watch and will note when you have replied.
- If you prefer to manually edit the page to post:
- Use an accurate and appropriate heading.
- Indent your comment by using an appropriate number of colons ':'.
- Sign your post with four tildes (~~~~) at the end.
This is Tothwolf's talk page, where you can send them messages and comments. |
|
Archives: 1, 2, 3, 4, 5, 6Auto-archiving period: 7 days |
Archives |
This page has archives. Sections older than 7 days may be automatically archived by Lowercase sigmabot III. |