<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: csandreasen</title><link>https://news.ycombinator.com/user?id=csandreasen</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Tue, 28 Apr 2026 08:20:00 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=csandreasen" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by csandreasen in "New Emails in Clinton Case Came from Anthony Weiner’s Electronic Devices"]]></title><description><![CDATA[
<p>Don't apologize - factcheck.org is right; thehill.com is wrong.  Just go back to the original FBI report here:[1].  None of the e-mails were properly marked; three e-mails chains consisting of eight individual messages had at least one paragraph marked with a (C), but no header, footer, other portion marks, etc. to indicate classification.  The content of two of those e-mail chains were determined to be unclassified based on current classification guidance.<p>There were 81 e-mail chains from her server that should have been marked as classified because they contained classified information (and thus shouldn't have been sent over unclassified e-mail).  Quite a few outlets have made the mistake of conflating being marked as classified with containing classified information.  The thehill.com article links to another article using the phrase <i>'Twenty-two emails in eight different chains of messages were [marked as top secret]'</i>, but the article they link to says <i>'The Obama administration will entirely withhold 22 emails from Hillary Clinton’s private server because they have been classified as “top secret,”...'</i>.<p>The point of classification markings is to unambiguously identify that the document contains classified information, what parts are classified and how to protect it.  If it's not marked as such, there's the possibility that the recipient(s) won't realize that there's classified information in it.  The most likely reason that the e-mails with classified information were sent in the first place was most likely that the sender didn't realize that the information was classified, or there might be differences in opinion between multiple government organizations as to whether a particular is classified or to what degree it is classified.  An example is drone strikes in Pakistan and Yemen - according to CIA that information is classified, but you could read about it in the newspapers.<p>Based on the description from factcheck.org, I was able to find two of e-mails with the (C) portion marks: [2],[3] Note that [3] was not redacted because it was classified, but rather due to FOIA exemption (you can see that everything after the (C) was left unredacted).  [2] was redacted on account of both containing confidential information in the last paragraph as well as FOIA exemption.<p>[1] <a href="https://vault.fbi.gov/hillary-r.-clinton/hillary-r.-clinton-part-01-of-04/view" rel="nofollow">https://vault.fbi.gov/hillary-r.-clinton/hillary-r.-clinton-...</a> (page 20)<p>[2] <a href="http://graphics.wsj.com/hillary-clinton-email-documents/pdfs/C05796118.pdf" rel="nofollow">http://graphics.wsj.com/hillary-clinton-email-documents/pdfs...</a><p>[3] <a href="http://graphics.wsj.com/hillary-clinton-email-documents/pdfs/C05791537.pdf" rel="nofollow">http://graphics.wsj.com/hillary-clinton-email-documents/pdfs...</a></p>
]]></description><pubDate>Fri, 28 Oct 2016 23:49:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=12821734</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=12821734</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=12821734</guid></item><item><title><![CDATA[New comment by csandreasen in "Chinese hacked CNN (sportsillustrated.cnn.com)"]]></title><description><![CDATA[
<p>This is an installation banner, as in: "You've successfully installed LNMP"<p>From the LNMP GitHub page:<p>This script is written using the shell, in order to quickly deployLEMP/LAMP/LNMP/LNMPA(Linux, Nginx/Tengine/OpenResty, MySQL in a production environment/MariaDB/Percona, PHP), applicable to CentOS 5~7(including redhat), Debian 6~8, Ubuntu 12~15 of 32 and 64.<p><a href="https://github.com/lj2007331/lnmp" rel="nofollow">https://github.com/lj2007331/lnmp</a></p>
]]></description><pubDate>Fri, 03 Jun 2016 09:49:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=11829264</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11829264</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11829264</guid></item><item><title><![CDATA[New comment by csandreasen in "In Silicon Valley, a new emphasis on barriers to government requests for data"]]></title><description><![CDATA[
<p>CNN and the Washington Post both reported that WhatsApp and Telegram were found on several of the Paris attackers' phones, but that the content wasn't able to be recovered.<p><a href="http://www.cnn.com/2015/12/17/politics/paris-attacks-terrorists-encryption/" rel="nofollow">http://www.cnn.com/2015/12/17/politics/paris-attacks-terrori...</a><p><a href="https://www.washingtonpost.com/world/europe/paris-attack-planners-used-encrypted-apps-investigators-believe/2015/12/17/e798d288-a4de-11e5-8318-bd8caed8c588_story.html" rel="nofollow">https://www.washingtonpost.com/world/europe/paris-attack-pla...</a></p>
]]></description><pubDate>Wed, 25 May 2016 07:01:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=11768113</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11768113</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11768113</guid></item><item><title><![CDATA[New comment by csandreasen in "Hidden Microphones Part of Government Surveillance Program in the Bay Area"]]></title><description><![CDATA[
<p>From your link:<p>(c) The term “confidential communication” includes any communication carried on in circumstances as may reasonably indicate that any party to the communication desires it to be confined to the parties thereto, but excludes a communication made in a public gathering or in any legislative, judicial, executive or administrative proceeding open to the public, or in any other circumstance in which the parties to the communication may reasonably expect that the communication may be overheard or recorded.</p>
]]></description><pubDate>Sun, 15 May 2016 12:30:26 +0000</pubDate><link>https://news.ycombinator.com/item?id=11700655</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11700655</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11700655</guid></item><item><title><![CDATA[New comment by csandreasen in "Tor exit node operator gets raided by police"]]></title><description><![CDATA[
<p>Absolutely. If a business is offering services that a customer is using to commit a crime, the police wouldn't be doing their jobs if they didn't go down and ask for logs.</p>
]]></description><pubDate>Tue, 05 Apr 2016 23:13:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=11435345</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11435345</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11435345</guid></item><item><title><![CDATA[New comment by csandreasen in "The Next Front in the New Crypto Wars: WhatsApp"]]></title><description><![CDATA[
<p>That's interesting. They've come pretty close to that line in the past...<p><a href="https://www.eff.org/deeplinks/2014/04/tea-party-taxes-and-why-patriots-wouldve-revolted-against-surveillance-state" rel="nofollow">https://www.eff.org/deeplinks/2014/04/tea-party-taxes-and-wh...</a></p>
]]></description><pubDate>Mon, 14 Mar 2016 02:45:24 +0000</pubDate><link>https://news.ycombinator.com/item?id=11280758</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11280758</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11280758</guid></item><item><title><![CDATA[New comment by csandreasen in "Brazil arrests Facebook executive in row over police access to data"]]></title><description><![CDATA[
<p>Probably about as much as you see from him on the subject of Russia and China.  The Intercept is about as unbiased as Fox News - lots of criticism directed towards the US and its allies, silence on every other country.</p>
]]></description><pubDate>Tue, 01 Mar 2016 18:24:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=11204813</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11204813</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11204813</guid></item><item><title><![CDATA[How Apple's fight with the FBI will hurt our privacy]]></title><description><![CDATA[
<p>Article URL: <a href="http://www.politico.com/agenda/story/2016/02/how-apples-fight-with-the-government-hurts-our-privacy-000055">http://www.politico.com/agenda/story/2016/02/how-apples-fight-with-the-government-hurts-our-privacy-000055</a></p>
<p>Comments URL: <a href="https://news.ycombinator.com/item?id=11186020">https://news.ycombinator.com/item?id=11186020</a></p>
<p>Points: 2</p>
<p># Comments: 0</p>
]]></description><pubDate>Sat, 27 Feb 2016 04:04:12 +0000</pubDate><link>http://www.politico.com/agenda/story/2016/02/how-apples-fight-with-the-government-hurts-our-privacy-000055</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11186020</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11186020</guid></item><item><title><![CDATA[New comment by csandreasen in "Justice Department Wants Data from About 12 Other iPhones"]]></title><description><![CDATA[
<p>A gaping "backdoor" already exists in the form of the software update mechanism.  By the same logic you're using, Apple can't keep their source code and signing key secure forever, which would be a much worse leak than them losing control of a modified iOS that would let someone brute force a PIN for a phone in their physical possession without the phone being wiped.</p>
]]></description><pubDate>Tue, 23 Feb 2016 11:26:16 +0000</pubDate><link>https://news.ycombinator.com/item?id=11158096</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11158096</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11158096</guid></item><item><title><![CDATA[New comment by csandreasen in "Justice Department Calls Apple’s Refusal to Unlock iPhone a ‘Marketing Strategy’"]]></title><description><![CDATA[
<p>This is more like the FBI asking the storage unit owner to turn off the security system that he installed that incinerates the contents of the storage unit when someone tries to pick the lock, but only on the unit that the FBI has a warrant to search.  The storage unit owner then responds that although he could put an off switch on that particular unit, it's an outrage and sets a horrible precedent that the police should ever ask him to turn off his security incinerator.</p>
]]></description><pubDate>Sat, 20 Feb 2016 01:28:25 +0000</pubDate><link>https://news.ycombinator.com/item?id=11138151</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11138151</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11138151</guid></item><item><title><![CDATA[New comment by csandreasen in "Why Apple Is Right to Challenge an Order to Help the F.B.I"]]></title><description><![CDATA[
<p>By that same logic, Apple's source code and software update key could eventually leak, too, which would have even worse effect.  The FBI is handing the phone over to Apple to apply the modification, not asking Apple to them the means to do it themselves.  If Apple was really worried about this leaking, they could just delete it when they're done (though it would be more work for them to recreate it next time the FBI comes with a warrant to search another iPhone).</p>
]]></description><pubDate>Fri, 19 Feb 2016 12:11:52 +0000</pubDate><link>https://news.ycombinator.com/item?id=11133039</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11133039</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11133039</guid></item><item><title><![CDATA[New comment by csandreasen in "U.S. can't ban encryption because it's a global phenomenon, Harvard study finds"]]></title><description><![CDATA[
<p>Demanding keys would conflict with the 5th Amendment; in the few cases that I'm aware of[1][2] where a defendant was successfully compelled to decrypt their files, the suspect had either already demonstrated that the evidence was in their possession and thus given up their right to self- incriminate or been granted immunity.  Also, with end-to-end encryption law enforcement won't be able to decrypt regardless of whether or not they have a warrant, and they need a warrant to initiate a wiretap to begin with.<p>[1] <a href="https://news.ycombinator.com/item?id=9663447" rel="nofollow">https://news.ycombinator.com/item?id=9663447</a><p>[2] <a href="https://news.ycombinator.com/item?id=9663378" rel="nofollow">https://news.ycombinator.com/item?id=9663378</a></p>
]]></description><pubDate>Fri, 12 Feb 2016 23:34:10 +0000</pubDate><link>https://news.ycombinator.com/item?id=11091472</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11091472</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11091472</guid></item><item><title><![CDATA[New comment by csandreasen in "U.S. can't ban encryption because it's a global phenomenon, Harvard study finds"]]></title><description><![CDATA[
<p>I don't think that's an appropriate analogy. You may as well just say "In the 1700s, if you wrote an enciphered letter..." since cryptography isn't a new concept.  Various schemes have been used to protect military and diplomatic communications for centuries.  If you did so then or now, you wouldn't be under any obligation to reveal the contents, but you take on the additional burden of actually performing all of the necessary calculations, securely destroying the scratch paper you used in the process of encrypting the message, handling key management and distribution, securing the areas where the encrypting/decrypting is taking place (you wouldn't want the redcoats barging in the hour or so while you're in the middle of converting the plaintext to ciphertext), etc.<p>Nobody does that anymore. You're instead using a tool that someone else made, and either that tool or the other person is handling all of the hard work. Tools definitely can be regulated - I need a license to drive; I need to register my car; I need to go through a background check to own a gun; I can own a gun, but if I misuse it I go to jail; felons can't purchase guns legally; I can't buy a nuclear weapon or the fissile material needed to make own.<p>The questions that policymakers are fumbling through right now are things like "how (if at all) do we regulate tools and the companies that make/distribute them if those tools allow people evade law enforcement?"</p>
]]></description><pubDate>Fri, 12 Feb 2016 21:31:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=11090789</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11090789</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11090789</guid></item><item><title><![CDATA[New comment by csandreasen in "Denmark confirms US sent rendition flight for Snowden"]]></title><description><![CDATA[
<p>First off, Martin Luthor King didn't kill himself, so you can't really say that the FBI compelled him to do so.<p>Secondly, you're using the actions taken by a domestic law enforcement agency more than half a century ago as evidence that a foreign intelligence agency is going to blackmail Americans, neglecting the difference in missions between the two agencies, the changes in legal authorities since the 60s, the fact that multiple generations of Americans with differing cultural values have come into and left government service, etc.<p>Thirdly, calling someone ignorant <i>is</i> an insult.  I'd suggest consulting the forum guidelines linked at the bottom of the page.</p>
]]></description><pubDate>Sat, 06 Feb 2016 03:45:22 +0000</pubDate><link>https://news.ycombinator.com/item?id=11046453</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11046453</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11046453</guid></item><item><title><![CDATA[New comment by csandreasen in "Denmark confirms US sent rendition flight for Snowden"]]></title><description><![CDATA[
<p>> Anyone who intends subversive action <i>can</i> be targetted. They <i>can</i> be approached and manipulated by an agent who knows everything about them. The would-be-subversive <i>can</i> be nudged, sabotaged or flat out blackmailed.<p>You've just highlighted why the average American is scared of terrorists but not the NSA: 3000 people <i>did</i> die on 9/11.  There is no evidence of the NSA targeting Americans, or nudging/sabotaging/blackmailing them.<p>The military <i>could</i> easily storm Washington DC, topple the government, execute every Congressman, impose martial law and announce the start of a new regime under the sole authority of the Chairman of the Joint Chiefs of Staff.  You'd have to be pretty nuts to worry that's actually going to happen.<p>Also, referring to people who disagree with you as ignorant isn't generally the best way to change their minds.</p>
]]></description><pubDate>Fri, 05 Feb 2016 23:07:02 +0000</pubDate><link>https://news.ycombinator.com/item?id=11045366</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11045366</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11045366</guid></item><item><title><![CDATA[New comment by csandreasen in "Denmark confirms US sent rendition flight for Snowden"]]></title><description><![CDATA[
<p>> The US government revoked his passport while he was in an international "no man's land" (i.e. the international side of Russian customs), effectively making him stateless.<p>This is a myth that keeps getting repeated. The US government didn't revoke his passport leaving him stranded in Russia, they revoked his passport the day before he left Hong Kong [1]. He traveled to Russia on what turned out to be an invalid travel document issued by the Ecuadorian embassy in London [2] (same one that Julian Assange is holed up in).<p>He was allowed by the Chinese to flee from a place that had an extradition treaty with the US and wound up in a place that doesn't. He put himself there. Honestly, the "It's the American government's fault I'm in Russia" argument that Snowden and his close supporters have been peddling isn't really much of an argument when it effectively translates to "If it weren't for the US government I'd be in Cuba or Ecuador right now."<p>> Also worth noting that the crimes Snowden has been charged with are two counts of violating the Espionage Act, a law passed just after the US entered WWI.<p>I keep seeing this argument being brought up, too.  The age of a particular law has no impact on whether or not someone should be accountable for breaking it.  If that were the case, I could quite literally get away with murder.<p>[1] <a href="http://bigstory.ap.org/article/ap-source-nsa-leaker-snowdens-passport-revoked" rel="nofollow">http://bigstory.ap.org/article/ap-source-nsa-leaker-snowdens...</a><p>[2] <a href="http://www.theguardian.com/world/2013/jul/02/ecuador-rafael-correa-snowden-mistake" rel="nofollow">http://www.theguardian.com/world/2013/jul/02/ecuador-rafael-...</a></p>
]]></description><pubDate>Fri, 05 Feb 2016 22:26:40 +0000</pubDate><link>https://news.ycombinator.com/item?id=11045130</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=11045130</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=11045130</guid></item><item><title><![CDATA[New comment by csandreasen in "Shadowy tech brokers that deliver your data to the NSA"]]></title><description><![CDATA[
<p>There's a huge difference between those links and showing systemic abuse.  When I actually go and read the stories behind your links, what you state is that 13 people in 10 years abusing their position at the NSA to spy on their significant others (and subsequently being fired, resigning or being relieved of their positions[1]) is a stone's throw away from having a federal agent being assigned to watch me personally have intercourse.  This says to me that the average American should be about as worried about being spied on by the NSA as they are worried about being struck by lightning on a clear day. The odds might go up slightly if they had a jealous ex working at the NSA.<p>I have better odds of getting shot by a government agent than being spied on, and I generally manage to get through my day without worrying that I'll die at the hands of the US government.  I think that's probably the biggest reason that so few people outside of HN/Reddit/etc. care about Snowden leaks.  I can find plenty of people that are upset about police brutality, and there's lots of discussion about implementing body cameras, discrimination in law enforcement, etc. because I can find new, documented evidence of someone getting shot by a cop every other week.  It's still not at the level where I worry that I'm going to get shot by a cop.  Snowden showed potential for abuse, not actual abuse.  That's why "I have nothing to hide" persists.<p>[1] The source document for the LOVEINT stories (not linked from either of those articles) is <a href="https://www.nsa.gov/public_info/press_room/2013/grassley_letter.pdf" rel="nofollow">https://www.nsa.gov/public_info/press_room/2013/grassley_let...</a></p>
]]></description><pubDate>Sun, 24 Jan 2016 21:27:43 +0000</pubDate><link>https://news.ycombinator.com/item?id=10964094</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=10964094</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10964094</guid></item><item><title><![CDATA[New comment by csandreasen in "Shadowy tech brokers that deliver your data to the NSA"]]></title><description><![CDATA[
<p>To which I would ask "Under what circumstances would the government pay a federal agent to watch me have sex for the next 10 years?"  This and the similar comparisons that I often see raised in response to the "I have nothing to hide" argument are ridiculous hypotheticals that are raised without taking into account who is violating the subject's privacy and why.  When someone says "I have nothing to hide" it's generally short for "I have committed no crimes and I trust law enforcement officials to a) only invade someone's privacy when they have reasonable grounds (implying that they got a warrant); and b) use any data collected only in pursuit of actual criminal investigations (e.g. they're not going to steal my credit cards and broadcast naked pictures all over the internet).<p>If you're going to change people's minds with that argument, you need to be able to demonstrate that people's data is being routinely searched without just cause and/or police are routinely abusing the fruits of those searches.</p>
]]></description><pubDate>Sun, 24 Jan 2016 19:32:07 +0000</pubDate><link>https://news.ycombinator.com/item?id=10963664</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=10963664</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10963664</guid></item><item><title><![CDATA[New comment by csandreasen in "NSA Cheerleaders Discover Value of Privacy Only When Their Own Is Violated"]]></title><description><![CDATA[
<p>To put this into perspective, it's worth noting that this was an issue of almost unprecedented contention between the US and Israel over whether or not to lift sanctions against Iran in exchange for nuclear disarmament.  What Israel does to advance its foreign policy objectives is definitely within the purview of a foreign intelligence agency, and in this case the Israeli government was very actively lobbying congress.  It seems pretty clear to me that the goal was to find out what Israel was doing, not spy on Congress.<p>The folks over at Lawfare had a much different breakdown of the issue: <a href="https://www.lawfareblog.com/why-do-conservatives-suddenly-sound-intercept-over-nsa" rel="nofollow">https://www.lawfareblog.com/why-do-conservatives-suddenly-so...</a><p>Relevant quote:<p>Was the activity properly disclosed to the intelligence committees? Actually, NSA’s behavior with respect to Israel appears to have been briefed to Congress, as one would hope. “Convinced Mr. Netanyahu would attack Iran without warning the White House, U.S. spy agencies ramped up their surveillance, <i>with the assent of Democratic and Republican lawmakers serving on congressional intelligence committees”</i> (emphasis added).</p>
]]></description><pubDate>Thu, 31 Dec 2015 16:00:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=10818105</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=10818105</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10818105</guid></item><item><title><![CDATA[New comment by csandreasen in "Juniper hack has U.S. fearing foreign infiltration"]]></title><description><![CDATA[
<p>If code was added to leak the state of the PRNG, then whether or not Dual EC is used becomes a non-issue.  The person who created the backdoor could leak the state regardless of which PRNG was used.</p>
]]></description><pubDate>Mon, 21 Dec 2015 01:13:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=10769037</link><dc:creator>csandreasen</dc:creator><comments>https://news.ycombinator.com/item?id=10769037</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=10769037</guid></item></channel></rss>