Romance, Historical, Contemporary, Paranormal, Young Adult, Book reviews, industry news, and commentary from a reader's point of view


Friday News: Wireless ISP allegedly blocks email encryption; Whisper v. Guardian on privacy; diversity in publishing; and 33 free Philip K. Dick stories

Friday News: Wireless ISP allegedly blocks email encryption; Whisper v. Guardian...

In the second instance, Golden Frog shows that a wireless broadband Internet access provider is interfering with its users’ ability to encrypt their SMTP email traffic. This broadband provider is overwriting the content of users’ communications and actively blocking STARTTLS encryption. This is a man-in-the-middle attack that prevents customers from using the applications of their choosing and directly prevents users from protecting their privacy.

This is scary. If ISPs are actively trying to block the use of encryption, it shows how they might seek to block the use of VPNs and other important security protection measures, leaving all of us less safe. Golden Frog provides more details of what’s happening in this case. . . –Tech Dirt

Among other things, Whisper Editor-in-Chief Neetzan Zimmerman says:

Whisper does not collect nor store any personally identifiable information (PII) from users and is anonymous. To be clear, Whisper does not collect nor store: name, physical address, phone number, email address, or any other form of PII. The privacy of our users is not violated in any of the circumstances suggested in the Guardian story. The Guardian staff, including its CEO and multiple members of the US editorial team, have met with, partnered, and worked with Whisper since February 2014 and published multiple stories utilizing Whispers, with full understanding of our guidelines. The Guardian’s assumptions that Whisper is gathering information about users and violating user’s privacy are false.

The Guardian insists:

The company behind Whisper, the social media app that promises users anonymity and claims to be the “the safest place on the internet”, is tracking the location of its users, including some who have specifically asked not to be followed.

The practice of monitoring the whereabouts of Whisper users – including those who have expressly opted out of geolocation services – will alarm users, who are encouraged to disclose intimate details about their private and professional lives.

Whisper is also sharing information with the US Department of Defense gleaned from smartphones it knows are used from military bases, and developing a version of its app to conform with Chinese censorship laws. –The Guardian

Let’s go back to some of those stats that Chris was throwing out. Do publishers just not think there’s an audience for work by writers of color?

[Chris] Jackson: No, I don’t think that’s true. I would say what’s happening in some of the larger publishing companies is that they’re publishing fewer books generally than they have in the past, and so they’re trying to publish those to audiences that they think they have mastered, they’ve already identified. And there’s a lot of data now in the way there wasn’t in the past, which can cut two ways. The olden days of “gut feelings” is passing away, and that’s not such a bad thing—gut feelings are often laced with implicit and untested biases. But my fear about more data-driven publishing is that it leads to companies engineered to sell books to people they’ve already identified.

And that means that it’s almost like, if you got on the boat already, you’re in. But if you’re not on the boat already…then the boat’s gone, and you’re not getting in. So lots of audiences that haven’t been as identifiable or easy to reach, or whatever, I think you have a lot more trouble with those kinds of books.

The good thing is that there are a lot of writers who are finding ways to get themselves out there without needing a publishing machine the way that they did in the past. –Scratch Magazine

If you’re not intimately familiar with his novels, then you assuredly know major films based on Dick’s work – Blade Runner, Total Recall, A Scanner Darkly and Minority Report. Today, we bring you another way to get acquainted with his writing. We’re presenting a selection of Dick’s stories available for free on the web. Below we have culled together 33 short stories from our two collections, 600 Free eBooks for iPad, Kindle & Other Devices and 550 Free Audio Books: Download Great Books for Free. The stories, it appears, are all in the public domain. –Open Culture

Dear Author

Pay No Attention to that Man Behind the Curtain!

Shades of Gray or, as I like to say, #666666, #333333, and #999999

Today I’d like to talk about anonymity. Should we have it? Why or why not? If you’d like to be anonymous, for good or ill, I’ll talk about ways you can achieve this.

Hypothetical Situation One

A woman writes a blog post in which she expresses opinions about the way gender roles are baked into our thinking and how that perpetuates actions that are harmful to women in their daily lives. People who believe a woman has no business pointing out such things escalate comments with vile language and threats unrelated to any of her theories. The reactions include threats of physical harm, backed up with evidence that some people making these threats have obtained her phone number, address and the addresses of family members.

These threats are easy to make because it is possible to make such contact without the commenter being directly linked his or her real identity. This precise situation has led some to suggest websites and blogs should no longer allow anonymous comments.

Hypothetical Situation Two

A young man in a government job observes misconduct on the part of his government. Human rights violations, lets say. He wants to alert others of the conditions and actions he has observed and documented, but if he does, his government will punish him and suppress the evidence. If he does nothing, egregious wrongs will continue unabated. Because of technology like Tor, he is able to post his evidence of this wrongdoing without his government being able to identify him as the source of the information.

Hypothetical Situation Three

You have reason to believe the government is spying on you solely because you are brown and have a last name that sounds foreign. You’ve never made it through a TSA line without being taken aside for additional searches.

Hypothetical Situation Four

Someone has been kidnapped and the police need access to cell phone information in order to track the location of the missing person. Alas, the missing person has an iPhone 6 and all communications are encrypted natively.

Good or Bad?

If we were to do away with anonymity, people making threats against a woman who dares to speak out would not, the theory is, feel quite so free to engage in campaigns designed to silence her.

If we were to do away with anonymity, the world would not learn about human rights violations or other serious harmful, or criminal misconduct by others, be they companies, governments, or individuals.

Either the government can spy on any calls they want, or they can’t locate kidnapped children.

I feel I should pose the question of whether any situation is really that stark. Feel free to discuss in the comments.

Why You Might Want to be Anonymous

Suppose you are someone with personal knowledge of facts about malfeasance by a company. This company is publicly telling everyone that no such malfeasance is taking place. According to others with personal knowledge, these public statements contradict the facts they have. Further, this company is threatening to retaliate against anyone who reveals such facts.

The US warrantless wiretapping cases currently being litigated come to mind as an example of (alleged) corporate malfeasance, but it’s not hard to imagine other examples where a company denies wrongdoing despite evidence held by others. Eron, perhaps.

Perhaps there is a company that has actually retaliated against people who have pointed out facts that suggest something might be wrong. Again, not too hard to find such situations.

How would someone who wants to express an opinion or share facts about such cases, do so without risking retaliation? Well, anonymity is required.

About How to be Anonymous

Getting your internet traffic behind a service like Tor (The Onion Router) can help people maintain some degree of anonymity. Tor is a set of technologies that allow a user to obfuscate the origination of their traffic. Suppose you are sitting at your computer, and you are connected to the internet. You have an IP (Internet Protocol) address that might be a permanent one or that might be temporarily assigned for a session or series of sessions. In order to go to other sites on the internet, you must contact other IP addresses and say, hey, Hello! I have arrived at your IP address from this IP address and here is a packet header, please acknowledge I am well formed and can talk to you! The server at the other end checks the packet header and if it’s well-formed, agrees to talk to you. Voila. You are surfing Dear Author. You tell DA what page on the site you’d like to see, and DA sends you that page.

Under normal circumstances, your originating IP will come from your Internet Service Provider (ISP) who likely has a very large block of IPs to use. See IANA for a pretty good explanation. ( Quick example, if your IP address begins with 166 you’re traveling on the block of IPs originally assigned to AT&T.

An IP address is a good indication (but not always reliable) of where internet traffic is coming from.  If you pay attention to such things, you’ll know that entities who wish to find and punish pirates file legal actions based on an end-user’s supposed IP address. There are lots of reasons why IP address does not provide proof positive. (It does not, for example, prove who was sitting at the computer at the time. Nor does it speak to any malware that might be originating such connections. Or cached data on one end or the other such that the supposed link between the computer and the IP address is, in fact, outdated and therefore identifies the wrong end user.

So, in examining the IP address at one end of an internet connection, you may or may not end up with the person responsible for the traffic. Certain governments may have measures in place that make this more likely.

How to be Anonymous

The challenges shift depending on whether you’re on a computer or a mobile device, and no methods are foolproof. That said, here are some links to get you started:

The EFF has some very good documentation on the subject:  Tor and https has a great visualization of what data is visible when you are using Tor and/or https. Worth a click-through if you’re a visual learner.

PC World has a very good article about setting up Tor here.

Tech Republic: Everything you need to know about using Tor

Sending Anonymous email

Tor itself has some thorough documentation and discussion here: (

Do you want secure browsing and commenting? Download the Tor browser:

The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.

The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.

Note: There are important provisos. You MUST pay attention to what you are doing and when and how those actions may circumvent the anonymity of Tor with or without you knowing.

So long as you are aware, you could install the Tor browser and leave an anonymous comment on this post. Please consider giving it a try.

Want to help out with Tor? Run a relay.


This 2013 LifeHacker article is a pretty decent overview with some VPN recommendations. has this article about 2014 VPN applications

As with everything, do your due diligence. VPNs are not free.

For my phone, I’m still very happy with my test of Freedome. The iOS 8 updates make it even easier to use.

Not Free – But worth looking at

If you’re on an Android OS, check out Whispersystems for secure texting, phone calls and local encryption.

For iPhone compatibility, (Android, too) take a look at Silent Circle’s offerings for mobile and desktop. They also offer the Blackphone, which runs a secure fork of Android. I ask you, who wouldn’t want a phone called Blackphone?

The iPhone 6 and iOS 8

Read about the security and encryption baked in to iOS 8 here

So, what do you think? Where do you stand on the issue of anonymity? Let me know in the comments. Anonymously or otherwise.